UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Charting the future of efficient energy production and usage

by IntelMay 29, 2015

The energy industry finds itself facing a range of transformational developments, from fluctuating demand and the generation decentralization, to system integration and the Internet of Things. Automation specialist B&R and Intel are helping the energy industry, and system integrators that serve them, respond and make the most of new opportunities. In this webinar, we will explore: Energy issues spanning security, predictive modeling and calculations, and future-proof scalability? Achieving


Real-Time Jitter Measurements: Methods and Theory

by Rohde & SchwarzMay 29, 2015

Overview:
Jitter measurements are commonly made taking small snapshots in time. Yet systems often experience jitter from sources that occur over relatively long time intervals, which may not be accounted for using short time interval measurements methods. In this webinar we will present the application of a real time, digital clock recovery and trigger system to the measurement of jitter on clock and data signals. Details of the measurement methodology will be provided along with

  • Methodology
  • Test & measurement
  • Details

Mid-Market Mayem: Cybercriminals Wreak Havoc Beyond Big Enterprises

by ThreatTrack SecurityMay 29, 2015

Breaches at large enterprises grab headlines, but cybercriminals are developing a taste for smaller businesses. The mid-market (companies with 500 to 2,500 employees) is becoming fertile ground for cybercriminals looking to exploit unsuspecting organizations with valuable data to steal and much more to lose.

  • ThreatTrack Security
  • Security Monitoring
  • Security Management & Analytics
  • Details

Stop Malware, Stop Breaches? How to Add Value Through Malware Analysis

by ThreatTrack SecurityMay 29, 2015

The shortage of qualified security personnel, increases in the costs for safeguarding networks, and the exponential increase in Web-based attacks dictate a shift in the ways malware defense must be organized and then carefully administered.

  • ThreatTrack Security
  • Security Monitoring
  • Risk Management/Security
  • Details

Isolation Architectures for Motor Control Systems

by Analog Devices IncMay 27, 2015

Webcast Overview:
This webcast discusses different system isolation topologies, such isolated current sense, driving high performance isolated gate drivers and overall system partitioning of the isolation architecture used in motor control. It highlights the advantages and board offerings covering motor control systems such as servo solutions with a focus on high performance. The presenter shows how ADI's board and system services speed up overall design flow. Who should attend:

  • Industrial/Robotics/Motor Control
  • Details

How to Use Continuous Delivery to Accelerate Speed to Value

by CA TechnologiesMay 27, 2015

Survival in the application economy means delivering innovative, high-quality applications, faster and more frequently. This can be a chaotic and complex process, particularly if your application delivery systems and processes were designed to only push out one or two releases a year.Continuous delivery is about overcoming these obstacles, streamlining the delivery pipeline to provide the business with the apps that they need at the pace they demand.? This means removing critical dependencies


Alert Logic Cloud Security Report

by Alert LogicMay 27, 2015

In early 2012, Alert Logic launched the first in a series of reports on cloud security, with the goal of creating the IT industry's first assessment of security in the cloud for businesses considering the use of cloud computing platforms. Alert Logic's approach to these assessments, based on data associated with a large concentration of cloud workloads-i.e., the Alert Logic customer base- has proven to be a pragmatic way of gaining insight into the evolving state of security in the cloud.


The People Problem: Cyber Threats Aren't Just a Technology Challenge

by ThreatTrack SecurityMay 26, 2015

Let's face it. Humans are the weakest link in cybersecurity. Human error contributes to at least 95% of all security incidents. This paper explores the challenges with managing the human element and outlines seven steps you can take to improve your security posture.

  • ThreatTrack Security
  • Security Monitoring
  • Security Management & Analytics
  • Details

Building the Business Case for Tablets in the Enterprise

by Dell / Intel®May 26, 2015

Despite an initially strong acceptance of tablet PC's in the consumer market, growth rates have recently tapered due to the emergence of large-screen smartphones and inexpensive notebooks. But enterprise adoption of tablets appears poised for a surge with research indicating that tablets can, and do, drive worker productivity in a variety of vertical industries. Take a look at how these lightweight but fully-featured devices powered by Intel® Core™ vPro™ processors can deliver

  • Dell
  • Mobile Devices
  • Mobile Application Management
  • Details