Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

signal

Results 1 - 25 of 85Sort Results By: Published Date | Title | Company Name
Published By: ASME     Published Date: Oct 03, 2019
One of the most frustrating aspects of the measurement of severe pyroshock events is the acceleration offset that almost invariably occurs. Dependent on its magnitude, this can result in large, low-frequency errors in both shock response spectra (SRS) and velocity-based damage analyses. Fortunately, recent developments in accelerometer technology, signal conditioning, and data acquisition systems have reduced these errors significantly. Best practices have been demonstrated to produce offset errors less than 0.25% of Peak-Peak value in measured near-field pyrotechnic accelerations: a remarkable achievement. This paper will discuss the sensing technologies, including both piezoelectric and piezoresistive, that have come together to minimize these offsets. More important, it will document the many other potential contributors to these offsets. Included among these are accelerometer mounting issues, cable and connector sources, signal conditioning amplitude range/bandwidth, and digitizi
Tags : 
    
ASME
Published By: Relevance     Published Date: Mar 03, 2016
Rackspace is achieving the identified goals through an integrated approach of increasing both on-page relevancy and earned media signals. These strategies are aimed at influencing search and directing traffic to its website.
Tags : 
relevance, bright edge, rackspace, traffic, marketing, search, earned media, relevancy
    
Relevance
Published By: Oracle     Published Date: Feb 24, 2015
To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Tags : 
oracle, digital marketing, b2b, rfp, feedback, signals, data, behavior
    
Oracle
Published By: InsideView     Published Date: Aug 17, 2015
Whether you’re a marketer, a salesperson, or otherwise contributing to revenue growth, learning a few social selling techniques will help you fill your deal funnel with more–and better–leads. But it’s not as simple as creating a few tweets and browsing through LinkedIn. Put social media at the core of your lead-to-revenue process and get real tips you can use to grow revenue in our webinar, “5 Steps to Using Social Selling to Fill Your Funnel.” This short 30 minute webinar will show you how social selling will help you: Find the best targets Recognize “I’m ready to buy” signals Uncover relevant, real-time insights
Tags : 
    
InsideView
Published By: Cisco Spark     Published Date: Jun 22, 2017
The most successful businesses are greater than the sum of their parts. When individuals work together well, they fill in each other's blind spots and build on each other's great ideas. These conversations ultimately help teams be more productive, reduce time-to-market and come up with more innovative ideas. But if your teams are spread across different offices, or working from home, can you create the same collaborative magic? Web-based collaboration tools claim to break down the collaboration barriers that distance can build. Everyone agrees they can reduce the time and cost of travel. And yes, these tools can stream your colleagues' voices, facial expressions, and slide decks into your meeting room, so you can get a clearer picture of verbal and behavioral signals. But if you're researching collaboration platforms, you'll hear skepticism, too. Naysayers declare that: People won’t participate because they’re afraid of digital change. You just can’t trust the security of collaborati
Tags : 
    
Cisco Spark
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon
Published By: Dell     Published Date: Oct 24, 2014
The end of support for Windows Server 2003/R2 could signal the beginning of a new stage in your organization’s evolution, and taking advantage of the Microsoft datacenter transformation vision can help you reach that next stage.
Tags : 
infrastructure security, migration process, datacenter transformation, server support
    
Dell
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of today’s market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
    
Dun & Bradstreet
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Oracle     Published Date: Nov 14, 2016
Finding the signals in data has long been the realm of a select few. Not anymore. For one thing, it’s impossible for a small group of people to keep up with the amount of data that’s available, just as it’s impossible to keep up with the number of questions people want to answer.
Tags : 
    
Oracle
Published By: Deluxe     Published Date: Mar 15, 2017
Best-in-class FI marketers have embraced the power of signals. Through their everyday actions, consumers and businesses continually create signals for marketers like you. A signal is an indication of intent or behavior. Examples of activities that produce signals include making a purchase, searching online for information about a financial product, clicking on an ad, applying for a loan, and paying off debt. Each signal can be tracked, monitored, and acted upon. Reaching customers at the critical moment, in the right channel with the right message, requires keen insights about the signals they’re producing. Signals aren’t new to marketing. In fact, you may already be using new mover lists or even search engine marketing. Today, though, there is so much more valuable data available — if you know where to look and what to do with it.
Tags : 
    
Deluxe
Published By: ServiceNow     Published Date: May 14, 2019
Learn how ServiceNow has been applying machine learning and analytics with AIOps to help you cut through event noise to create actionable signals, identify service outages and degradations, remediate service and infrastructure issues accurately, and drive continuous improvement in service quality
Tags : 
servicenow, business, services, ops, analytics
    
ServiceNow
Published By: Capita     Published Date: Jun 26, 2019
Connectivity is the beating heart of today’s enterprise – critical to its very survival. The key metric of its strength or weakness is ECG: Enterprise Connectivity Grading, and the effects of an unhealthy one will be felt in every corner of the business. Download the infographic and discover how; the key warning symptoms that may be signalling that your ECG isn’t on the pulse, and the wide-ranging ripple effect that could be having as its impact radiates outwards. Learn more>>
Tags : 
    
Capita
Published By: Gigamon     Published Date: Feb 20, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Lucidworks     Published Date: Dec 14, 2016
Download this whitepaper to learn about the benefits and trade-offs of contextual and data-based analysis. Recommendations and answers are provided by the next generation of enterprise applications that use search-based features and capabilities to improve performance and add value.
Tags : 
    
Lucidworks
Published By: Gigamon     Published Date: Dec 13, 2018
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: iPass     Published Date: Feb 12, 2009
Unlike Wi-Fi access, 3G mobile broadband is available anywhere users have a mobile phone signal-from. From taxis, to trains, to remote stretches of road - your workforce will have access to critical data. If your company is even considering about deploying mobile broadband to its workforce, read this guide now!
Tags : 
wifi, wi-fi, ipass, mobile, broadband, security, workforce, wireless communications
    
iPass
Published By: TE Connectivity     Published Date: Apr 13, 2018
Whether you’re designing to efficiently charge-up a laptop, distribute power from a battery pack, keep signals uninterrupted in industrial machinery or a thousand other products, TE Connectivity offers reliable solutions that bring power & signal to your applications. TE Connectivity’s (TE) extensive connector and sensor solutions provide the essential connectivity you need for your daily interactions at home and in the workplace. Whether you are looking to design next generation display panels and internal LED lighting or you’re designing-in for the latest door alarms and pressure sensors, TE has the essential products you need for always-on connectivity.
Tags : 
power, signal, connect, solutions, display, workplace, industrial
    
TE Connectivity
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : 
strategy, ddos, spam, technology, solutions
    
F5 Networks Inc
Published By: KPMG     Published Date: Jul 10, 2018
Working out what consumers want – and why – is getting harder. Transactional data and traditional market research and demographic profiles no longer do the job. Our ‘Five Mys’ report proposes a radical new framework for navigating complex consumer decision-making. Read the report to find out: • what the ‘Five Mys’ are and how they affect spending decisions • how to get better at predicting consumers’ changing needs • where different generations are directing their spending • how changing life patterns are creating new opportunities for businesses that can pick up on signals from consumers
Tags : 
    
KPMG
Start   Previous   1 2 3 4    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.