Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

internet things

Results 326 - 350 of 410Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean management’s approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Let’s explore how agile can be applied in light of these differences.
Tags : 
ibm, continuous engineering, watson, iot, internet of things, agile, product development, software development, productivity, project management
    
IBM
Published By: IBM     Published Date: May 09, 2016
Reliable Transportation For Dummies, IBM Limited Edition, shows you what you need to know about what it takes to keep a fleet operating efficiently while keeping maintenance expenses in check. In other words, this book provides information and ideas about what you can do to have a reliable fleet operation that doesn’t break the bank with either unforeseen breakdowns or out-of-control maintenance expenditures.
Tags : 
ibm, watson, internet of things, iot, transportation, reliable transportation, operational efficiency, knowledge management, data management
    
IBM
Published By: IBM     Published Date: May 09, 2016
Understanding the impact and value of enterprise asset management: Implementing IBM Maximo Asset Management to enable success across your smarter infrastructure
Tags : 
ibm, watson, iot, internet of things, enterprise asset management, ibm maximo asset management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
Download to learn: - What continuous engineering is - How to continuously improve complex product designs - How to anticipate and respond to markets and clients - How to get the most out of your engineering resources
Tags : 
ibm, watson, iot, internet of things, product development, devops, engineering, networking, software development, knowledge management
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
Download this paper to learn: - What systems engineering is - How systems engineering can help you develop smart, connected products - Help expedite time-to-market, ensure business agility, and deliver high-quality smart products - How to cut costs
Tags : 
ibm, watson, iot, internet of things, product development, devops, systems engineering, engineering, networking, software development, knowledge management
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
Discover how to transform your engineering processes and tools to gain a competitive advantage from the Internet of Things
Tags : 
ibm, watson, iot, continuous engineering, internet of things, product development, devops, engineering, networking, software development, knowledge management
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
Forrester survey: global IT leaders plan their transition to consolidated, cognitive smartphone, tablet, laptop, and IoT security by 2020.
Tags : 
iot security, internet of things, mobility
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
IBM MaaS360 provides unified endpoint management (UEM) across desktops, laptops, tablets, smartphones, and the Internet of Things (IoT).
Tags : 
internet of things, uem, unified endpoint management, iot
    
Group M_IBM Q1'18
Published By: SAS     Published Date: Aug 28, 2018
Data integration (DI) may be an old technology, but it is far from extinct. Today, rather than being done on a batch basis with internal data, DI has evolved to a point where it needs to be implicit in everyday business operations. Big data – of many types, and from vast sources like the Internet of Things – joins with the rapid growth of emerging technologies to extend beyond the reach of traditional data management software. To stay relevant, data integration needs to work with both indigenous and exogenous sources while operating at different latencies, from real time to streaming. This paper examines how data integration has gotten to this point, how it’s continuing to evolve and how SAS can help organizations keep their approach to DI current.
Tags : 
    
SAS
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco
Published By: Cisco     Published Date: Aug 28, 2015
A growing number of enterprises are adopting both private and public cloud computing models. While virtualization, cloud, mobility, data analytics, and the Internet of Things (IoT) are providing tremendous opportunities for businesses, they are also creating new challenges for IT departments.
Tags : 
cloud, hybrid, iot, public cloud, application integration, itil, data warehousing, cloud computing
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
This white paper describes a software system that provides the framework for the Internet of Things (IoT). It dramatically simplifies the task of creating sophisticated IoT systems.
Tags : 
    
Cisco
Published By: Adecco     Published Date: May 14, 2015
In this white paper, we examine how smarter and more connected personal devices are spreading connectivity outward, eventually marrying personal data and services with information from the wider world.
Tags : 
personal devices, connectivity, personal data, information, internet of things, networking, it management, electronics
    
Adecco
Published By: Lenovo and Intel®     Published Date: Nov 03, 2017
Internet of Things. Cloud. Augmented reality. Virtual reality. Technologies like these are changing the face of all industries, across manufacturing, financial services, healthcare, education, agriculture, logistics, and more. These transformative technologies define new paradigms of business productivity, customer centricity, and quality & compliance management. This infographic features the opportunities these technologies can o er as they begin incorporating them into their business models. Download the infographic now.
Tags : 
    
Lenovo and Intel®
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Jan 09, 2015
This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.
Tags : 
security solutions, it security, security risks, threat intelligence report, malware, botnet infections, security, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
Future proof your investment with IBM WebSphere - Your gateway to cloud, mobile and Internet of Things.
Tags : 
ibm, websphere, cloud, mobile, analytics, iot, tibco, migrate, solutions, mobile computing, middleware, content integration, content management system, information management, productivity, cloud computing
    
IBM
Published By: AdMob     Published Date: Jul 20, 2009
Devices like the iPhone have made the mobile Internet a massively valuable new advertising medium, with a worldwide audience of 546 million consumers and 10 times higher brand awareness and 10 times higher click-through rates than online advertising. The mobile Internet is changing the face of advertising, and marketers must adapt to stay ahead of the competition. This White Paper is an introduction to mobile advertising and the key things marketers need to know to run successful mobile campaigns. What you'll learn: 1) The Basics: An introduction to mobile advertising; 2) Who you can reach: Demographics and statistics; 3) Spotlight on the iPhone: What it means for marketers; 4) Results you can expect with mobile advertising; 5) Case studies: Examples of Brand and Performance mobile campaigns; 6) What you need to know to extend your campaigns to mobile.
Tags : 
iphone, mobile, internet, pda, mobile phone, cpc, cost per click, blackberry, mobile advertising, cpm, click through rate, ctr, click through rates, sms
    
AdMob
Published By: SAS     Published Date: Mar 31, 2016
The Internet of Things is much talked about and fast becoming a fixture in some industries. And the technologies for transformative business applications are at hand. Yet many companies are slow to recognize and act on the opportunities. To explore those business opportunities, the associated implementation challenges, and how companies can accelerate their progress, IIA spoke with Jason Mann, Director of Industry Product Management at SAS.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business activity monitoring, business analytics, content delivery, content integration, content management system
    
SAS
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search