Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

computers

Results 1 - 25 of 159Sort Results By: Published Date | Title | Company Name
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
The future of work means a new IT balancing act No matter what the work of your organization, today it’s likely done… …As much out of the office as in it …As much on mobile devices as traditional computers …And much more through cloud applications for core business activities and collaboration with customers and partners. The future of work has arrived, and with it comes a complex new balancing act for IT. On one side of the scale are high expectations for how IT can enable digital transformation and innovation in the business. On the other side is more accountability for mitigating risk, even as growing adoption of new technologies means more apps, more devices, and more mobile employees. This balancing act is driven by current challenges and trends in four areas.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Jamf     Published Date: Aug 12, 2019
Since its origin, Mac has been an instrumental tool in helping K-12 schools provide the right resources to students and staff. As the must-have technology for teachers and computer labs, Mac and its wealth of available apps help ensure success in elementary schools all the way through high school graduation. Now, with more Mac computers making their way into school environments than ever before, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy.
Tags : 
    
Jamf
Published By: SAS     Published Date: Jul 22, 2019
Text is the largest human-generated data source. It grows every day as we post on social media, interact with chatbots and digital assistants, send emails, conduct business online, generate reports and essentially document our daily thoughts and activities using computers and mobile devices. Increasingly, organizations want to know how all of that data can be used to drive improvements. For many, unstructured text represents a massive untapped data source with great potential for producing valuable insights that could result in significant business transformations or spur incredible social innovation. This paper looks at how organizations in banking, health care and life sciences, manufacturing and government are using SAS text analytics to drive better customer experiences, reduce fraud and improve society.
Tags : 
    
SAS
Published By: Expert System     Published Date: Jul 18, 2019
Although computers are better when it comes to processing and making calculations, they haven’t been able to accomplish some of the most basic human tasks, until now. Thanks to cognitive computing, machines are bringing human-like intelligence to many business applications, including big data. So, what is cognitive computing? According to Forbes, “cognitive computing comes from a mashup of cognitive science—the study of the human brain and how it functions—and computer science.” This definition is a good place to start. However, to really understand what cognitive computing is, we have to go a little deeper.
Tags : 
    
Expert System
Published By: Zebra Technologies (Bulldog)     Published Date: Jul 11, 2019
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
    
Zebra Technologies (Bulldog)
Published By: Mist Systems     Published Date: Jun 19, 2019
For centuries, new technologies have ushered in entirely new eras of progressive change in all facets of life, and have revolutionized countless industries. The invention of the steam engine brought about the industrial revolution and expanded trade and transportation. Quantum physics was the foundation of the electronics revolution that brought us transistors, TV, radio, and computers. And the Internet has brought about a stunning information and communication revolution, which is still sending shock waves across virtually every industry, and to the very core of our cultures and lifestyles.
Tags : 
    
Mist Systems
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
    
MalwareBytes EMEA
Published By: Veeam '18     Published Date: May 01, 2019
Financial services organisations face increasing pressure to comply with rapidly evolving regulatory requirements for data integrity and security. In addition, valuable stored data continues to grow at exponential rates. Meanwhile, customers expect around-the-clock access to their account information from their computers and mobile devices. In fact, many banks have developed customised mobile applications that enable 24/7/365 account transactions, including deposits and transfers of funds.
Tags : 
    
Veeam '18
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy
    
Rubrik EMEA
Published By: Oracle     Published Date: Mar 01, 2019
When computers learn about humans
Tags : 
    
Oracle
Published By: Zebra Technologies     Published Date: Feb 01, 2019
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
    
Zebra Technologies
Published By: Oracle     Published Date: Jan 08, 2019
When Computers Learn About Humans
Tags : 
    
Oracle
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
The creation of an immersive virtual setting requires students to understand the immersive visual and audio environment of the world they intend their characters to inhabit. Development of a digital story arc requires an understanding of sequence, causality, and communication of meaning to digital story viewers. An immersive digital story can be created and viewed on mobile devices, tablets, and computers by students as early as elementary school. Virtual Digital Storytelling sits at the convergence point of empathy, social and emotional learning, engagement with community, and learning with emerging technologies. Download today to find out how Fujitsu's suit of Augmented and Virtual Reality tools can help your business.
Tags : 
    
Fujitsu America, Inc.
Published By: insightsoftware     Published Date: Oct 19, 2018
Over the past few decades, technology has advanced by leaps and bounds, altering how we live and work. As machines take over certain jobs for safety or improved accuracy, some are concerned that technology will eventually replace people. But as businesses incorporate machines and technology deeper into workplaces, it is evident that a mindset shift needs to occur. The working world must find ways to incorporate technology so that people do what people do best, while allowing computers to do what computers do best. It’s time to think differently about technology. It’s time to make technology part of the team. To download this white paper, please complete the following form.
Tags : 
    
insightsoftware
Published By: insightsoftware     Published Date: Oct 19, 2018
Developers and users alike need to find ways to incorporate technology in a way that allows people to do what people do best while also allowing computers to do what computers do best.
Tags : 
    
insightsoftware
Published By: Zebra Technologies     Published Date: Oct 17, 2018
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover.
Tags : 
    
Zebra Technologies
Published By: Google     Published Date: Aug 23, 2018
Today’s smart computers can beat board game champions, master video games, and learn to recognize cats. No wonder artificial intelligence has captured the imaginations of business and IT leaders. And indeed, AI is starting to transform processes in established industries, from retail to financial services to manufacturing. Read this guide from Google Cloud and learn how you can unlock the transformational power of information and get useful insights from a vast and complex landscape of data.
Tags : 
    
Google
Published By: Shell     Published Date: Aug 15, 2018
Shell Lubricants technical experts suggested that the company implement a field trial to compare the fuel economy benefits of Shell Rimula R4 L 15W-40 to Shell Rimula R5 LE 10W-30. Six Volvo trucks running more or less the same duties were selected for the trial, which took place over a period of six months. Three trucks started with Shell Rimula R4 L 15W-40, the other three with Shell Rimula R5 LE 10W-30. After 3 months, this was switched to prevent any possible truck-specific deficiencies. Throughout the trial, fuel consumption was closely monitored by Volvo Fleet management on-board computers.
Tags : 
shell, efficient, fleets, fuel economy, oil drain intervals, maintenance, trucking
    
Shell
Published By: Zebra Technologies     Published Date: Aug 09, 2018
The exponential growth of omnichannel shopping and ever-burgeoning demand for faster merchandise deliveries is redefining the supply chain’s distribution of consumer products goods. A seminal shift in how shoppers increasingly buy via multiple touch points — online from desktop computers, mobile devices and in-store — has created the need for the “smarter” warehouse to serve today’s connected consumer. As retailers look to merge their brick-and-mortar and online operations to cut costs and boost efficiency, warehouse management systems must keep pace. For this report, Zebra Technologies analyzed the state of the warehousing marketplace among firms in the US and Canada with at least $15 million in annual revenues. The online survey asked IT and operations personnel in the manufacturing, retail, transportation and wholesale market segments to share their insights and business plans over the next five years, in light of a rapidly changing industry.
Tags : 
fulfillment, vision, study, technology, manufacturer
    
Zebra Technologies
Published By: Epson     Published Date: Jun 22, 2018
Imaging technology has dramatically aff ected the experience of K-12 teaching and classroom dynamics. From a time when the primary ways to relay information were verbal, via a blackboard or overhead projector, to the current array of computers, tablets, fl at screens and projectors – deciding what to select can be complicated. Today there is a lot of focus on fl at panels and projectors. However the big dilemma isn’t which technology to select, but how to support the right visual environments that help teachers teach and students learn. Whether the pedagogical style is sage on a stage, guide by the side, fl ipped classrooms, display-based or constructivist, getting everyone on the same page and keeping focus are key components in supporting student comprehension.
Tags : 
    
Epson
Published By: Infosys     Published Date: May 21, 2018
June 28 is Ukrainian Constitution Day. It is also one of the longer days of the year - and in 2017, for the staff at one multinational corporation, it certainly felt that way. They arrived at work to find computers locked by the Petya ransomware. Would the company grind to a halt? Would they be held to ransom? How could they prevent it from happening again? These were the questions. Infosys was hired to provide the answers.
Tags : 
ransomware, security, computer, corporation, business, enterprise
    
Infosys
Published By: Zebra Technologies     Published Date: May 14, 2018
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
mobile, shipping, manufacturing, warehouse, global, shopping, fulfillment
    
Zebra Technologies
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.