Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

standards

Results 1 - 25 of 319Sort Results By: Published Date | Title | Company Name
Published By: Anixter     Published Date: Nov 23, 2015
This report tackles the challenges, standards and best approaches to thermal efficiency in existing facilities largely due to them being more prevalent when compared to a new facility. You will be introduced to four best practices that are absolutely critical to achieving an optimal thermal environment. The report also explores the future of datacenter cooling and introduces emerging technologies.
Tags : 
thermal efficiency, data centers, anixter, data center
    
Anixter
Published By: HERE Technologies     Published Date: Sep 26, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: • Find out why de-identification does not always mean anonymity • Understand how privacy by design can be used for standards and product or service creation • Discover how gathering just data you need will minimize the privacy impact of collection • Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
AWS worked with FedRAMP to develop a set of standards under which highly sensitive government data could securely migrate into cloud environments. If ever you doubted that cloud computing was the new frontier for federal data and software management, look around
Tags : 
    
Amazon Web Services EMEA
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
Get a step-by-step walkthrough of what it takes to take your organization to the next level of compliance, focused on ASPICE for automotive engineering. Join Michael Halder from IBM to learn how you can integrate ASPICE compliance into your engineering workflow
Tags : 
    
Group M_IBM Q4'19
Published By: Deltek     Published Date: Sep 26, 2019
Still unraveling the mystery that is Federal Acquisition Regulation (FAR) and Cost Accounting Standards (CAS) compliance? The exemptions, standards and disclosures can often feel like a puzzle never to be solved. Until now. Get the basics of the “allocability” and “allowability” that define FAR and CAS adherence and keep the momentum of your government business moving forward. Learn: Definitions of when and to what extent government contract costs can be recovered Accounting system edicts and standards Cost-specific mandates and need-to-knows Why timing is everything in keeping compliant.
Tags : 
    
Deltek
Published By: Avetta     Published Date: Sep 17, 2019
With companies and executives being held accountable for incidents in the workplace, the issue of workers’ health and safety has become a persistent concern for organizations around the world. And with varying standards across borders, confusion about what companies need to do is rampant. This need for an international consensus standard on workplace health and safety prompted the proposal of ISO 45001 in 2013. The standard, passed in March 2018, now serves as the international guide on occupational health and safety (OH&S) and outlines relevant methods and benchmarks. With insight from expert leadership, this whitepaper gives you the complete guide on how to work with the new standard. You'll learn: • Why ISO 45001 matters and its impact upon your business • The benefits and pathway to becoming certified • Important considerations for the contractor selection process
Tags : 
    
Avetta
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: Red Hat     Published Date: Jun 26, 2019
When any organization starts planning for cloud-native applications, it is important to consider the entire time span: from selecting a development platform until an application is truly production-grade and ready for delivery in the cloud. It can be a long journey, with many decisions along the way that can help or hinder progress. For example, at the beginning of a move to cloud-native development, it is easy for inefficiencies to occur if developers begin selecting tools and frameworks before they know where the application will be deployed. While enterprise developers want choice of runtimes, frameworks, and languages, organizations need standards that address the entire application life cycle in order to reduce operational costs, decrease risks, and meet compliance requirements. Organizations also want to avoid lock-in, whether it is to a single provider of cloud infrastructure or the latest architectural style. In addition, given the steep learning curve in cloud development, con
Tags : 
    
Red Hat
Published By: Panasonic     Published Date: Oct 10, 2019
Thousands of federal employees are issued mobile devices every year to carry out their agency’s mission. The government has strict security standards for such devices, but a new poll by Government Business Council (GBC) suggests that employee perceptions may be at odds with organizational priorities regarding security of these mobile devices.
Tags : 
    
Panasonic
Published By: AWS     Published Date: Oct 07, 2019
While monitoring is critical for any business, it is especially imperative for highly regulated industries such as healthcare. With patient data to protect and regulatory standards to meet, you need to make sure your teams are building solutions that comply. If you’re not compliant, you need to be able to quickly remediate issues, so you can still get your products out to market and deliver better patient care.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: ASME     Published Date: Oct 22, 2019
Compressed air is a concern within manufacturing, mining and processing environments. Without proper planning, producing and using compressed air can lead to serious injury and high expense. Improper use of compressed air can easily exceed OSHA's noise exposure and dead-end pressure standards, causing noise induced hearing loss and other serious injuries. Learn how to be sure you are OSHA compliant and how EXAIR's Intelligent Compressed Air products can help you. Sometimes known as "the fourth utility," generating compressed air can be unnecessarily costly if it's paired with the wrong tools. See how much you could save by using EXAIR's Intelligent Compressed Air products.
Tags : 
    
ASME
Published By: Cherwell Software     Published Date: Apr 07, 2016
Recently awarded Best Sandwich Menu Variety from NRN’s Consumer Picks Survey, Jason’s Deli is known for providing healthy menu options and excellent customer service to millions of customers each year. Their goal is to delight customers and create a positive experience every time. The Jason’s Deli IT department is no different. IT sets the same high standards for service delivery as Jason’s Deli does in their restaurants. IT partners with all areas of the business and wants to be “easy to do business with.”
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection, cifn, snap management, snapprotect, security
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications
    
Commvault
Published By: Red Hat     Published Date: Aug 22, 2018
What does a digital transformation look like? It varies from organization to organization, of course, since they have invested in countless systems and applications over the years. Digital transformation consists of building new applications and next-generation architectures on today’s open standards, using on-demand resources. For many organizations, digital transformation also means optimizing existing systems and application resources – integrating, replacing, or abstracting key pieces of their infrastructures into services.
Tags : 
    
Red Hat
Published By: Financial Force     Published Date: Dec 01, 2017
Download this guide to review three major pain points that companies are facing as they prepare for the new revenue recognition standards-ASC 606 and IFRS 15- as they are fast approaching.
Tags : 
    
Financial Force
Published By: HPE     Published Date: Feb 11, 2015
One of the top priorities for enterprises today is modernizing their data center to transform from the inefficiencies of siloed infrastructure to a modular, efficient, standards based infrastructure.
Tags : 
    
HPE
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Eaton     Published Date: Jul 09, 2018
Our industry has made numerous technological advances designed to protect homeowners, businesses and electrical workers. That makes every fatal electrocution in the home all the more distressing. Between 2010 and 2013, the U.S. saw an estimated average of 48 electrocution fatalities associated with consumer products per year, with large and small electric appliances chief among them1. Tragedies like these can be avoided, especially when the ground fault circuit interrupter (GFCI) technologies needed to prevent dangerous events are readily available. As the principle NEMA representative at the National Electrical Code (NEC) Code-Making Panel Two, I saw public input asking for increased GFCI protection for the home during the 2017 code cycle. The code panel expanded the GFCI requirement for facilities other than dwelling units as part of section NEC 210.8(B). However, residential standards improvements were sidelined.
Tags : 
    
Eaton
Published By: Salesforce     Published Date: Oct 10, 2019
With unprecedented choice and access to information, today’s customers demand an overall experience that matches their standards for product quality. In the Fourth Industrial Revolution, the definition of a “good” experience has changed. Customers demand not only relevant offers, but to feel truly known and understood as individuals. In a culture of immediacy, they also expect engagement at their exact moment of need. What’s more, this level of engagement is viewed as standard across the entire customer journey, prompting marketers to think well beyond their traditional domain.
Tags : 
    
Salesforce
Published By: SAS     Published Date: Apr 16, 2015
As big data shifts away from a more theoretical concept (only adopted by those on the leading edge), the fun can really begin. How do you prepare for more information than you’ve ever collected before? How can you manage this information with the same standards you applied in the past? These are questions that are causing both IT and business sides to start actively preparing for – and implementing – big data.
Tags : 
    
SAS
Published By: HPE     Published Date: Mar 23, 2015
This Porter Consulting report analyzes enterprise campus networking solutions from Aruba Networks, Cisco, HP and Ruckus Wireless. The paper examines key business and technology trends affecting enterprises with 500-5000 employees. We identify fundamental requirements IT decision makers should consider when evaluating campus networking solutions including: • Ensuring simple, secure and cost-effective user access • Supplying adequate bandwidth and quality of service • Streamlining deployment and operations • Supporting emerging standards and technology requirements Our goal is to provide business and technical decision makers with a guide to the key players and their strengths.
Tags : 
    
HPE
Published By: Schneider Electric     Published Date: Sep 19, 2017
When your power system has aging switchgear, you need to work harder to maintain safety and reliability. But easy-to-install options are available to upgrade aging switchgear to bring safety and reliability up to modern standards. Find out how switchgear modernization works in the comprehensive "Answer Guide: Make Aging Switchgear Last Longer and Perform Better." The guide includes information like the 4 Big Wins of Modernization, embedded demonstration videos, an FAQ on how to modernize and links to other modernization resources.
Tags : 
switchgear modernization, mv circuit breakers, lv circuit breakers, switchgear upgrades, electrical distribution equipment, schneider electric, circuit breaker upgrade, obsolete switchgear
    
Schneider Electric
Published By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.