intel

Results 301 - 325 of 4170Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Sep 13, 2007
File servers continue to proliferate, and email has moved from a basic tool for exchanging documents to an inherent part of an organization’s communication and collaboration portfolio. With such ad-hoc information sources now being a mission critical function, the need for data management and archival is becoming critical.
Tags : 
information management, servers, storage, quocirca
    
Quocirca
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense"
    
McAfee
Published By: Corrigo     Published Date: Sep 12, 2019
We’re living in a new era defined by data, analytics, and intelligence. It can sound overwhelming, but once you understand how to make all this information work for you, it becomes really exciting. The Intelligence Economy has already changed our day-to-day lives, and it’s revolutionizing the world of facilities management. The best FMs don’t just understand this change – they embrace it. With a better handle on intelligence, you will see immediate results. From warranty enforcement to asset repair vs. replacement decisions, Corrigo’s collective intelligence can improve your bottom line and make you better at your job. Read on to learn how Corrigo makes the Intelligence Economy work for you.
Tags : 
    
Corrigo
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
Read this white paper sponsored by HP and Intel® for an overview of the HP Cloud Discovery Workshop and to understand how it can help clarify your company's cloud vision -- through costs, potential and innovations.
Tags : 
adapt technology, cloud, organization of cloud, cloud infrastructure, it infrastructure, cloud implementation, intel
    
Sponsored by HP and Intel®
Published By: McAfee     Published Date: Apr 25, 2014
McAfee® Threat Intelligence Exchange and the McAfee Security Connected Platform can help integrate workflows and data to overcome siloed operations and shift the security model to agile, intelligent threat prevention. This paper describes three use cases to illustrate the benefits.
Tags : 
advanced malware, security, suspicious files, dynamic sandboxing, static analytics, threat prevention, mcafee network security, mcafee web gateway, mcafee email gateway
    
McAfee
Published By: Akamai     Published Date: Mar 08, 2017
This solution needs to reach audiences reliably wherever they are, scale as fast as they grow, and adjust intelligently to dynamic network environments for the highest viewing quality possible. Missteps in online video strategy can have a long-lasting effect on audience perceptions, not only of the video experience – but also on the brand being represented.
Tags : 
video, online video strategy, video experience, engagement, customer engagement, online audience
    
Akamai
Published By: IBM     Published Date: Apr 18, 2012
Integrated Services Management, or ISM, is a major evolutionary force guiding management technology and practice progress in enterprises today. The implications of ISM are broad, but the essence of the initiative is a re-thinking of how IT delivers value to the organization it serves, and a re-framing of all IT contributions around the concept of services.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, technology platform
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base. High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-centric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
customer analytics, data matching, big data, competitive advantage, customer loyalty
    
IBM
Published By: Intel Corp.     Published Date: Nov 21, 2017
this Whitepaper will provide an overview on personalizing customer experiences to pinpointing undetected fraud, to identifying business efficiencies, Intel's Saffron Natural Intelligence Platform helps financial institutions increase revenue and prevent loss.
Tags : 
    
Intel Corp.
Published By: Esker     Published Date: Feb 03, 2017
Order processing is most efficient when manual touch points are minimized. But when orders come in by fax or email, what’s the best way to handle them? Read our eBook, Addressing Manual Order Management, to learn how 100% electronic order processing can be achieved via one universal automation platform. Download this eBook to discover how to: Make every order electronic Allow customers to send fax/emails Increase speed, visibility & accuracy Eliminate manual data entry Manage growth without adding staff
Tags : 
best practices, business optimization, business management, productivity, business intelligence, business process automation, business process management
    
Esker
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: Lenovo UK     Published Date: Nov 07, 2018
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity, mobility, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity, mobility, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Intel     Published Date: Dec 13, 2018
In today’s world, advanced vision technologies is shaping the next era of Internet of Things. However, gathering streaming video data is insufficient. It needs to be timely and accessible in near-real time, analyzed, indexed, classified and searchable to inform strategy—while remaining cost-effective. Smart cities and manufacturing are prime examples where complexities and opportunities have been enabled by vision, IoT and AI solutions through automatic meter reading (AMR), image classification and segmentation, automated optical inspection (AOI), defect classification, traffic management solution—just to name a few. Together, ADLINK, Touch Cloud, and Intel provide a turnkey AI engine to assist in data analytics, detection, classification, and prediction for a wide range of use cases across a broad spectrum of sectors. Learn more about how the Touch Cloud AI brings cost savings, operational efficiency and a more reliable, actionable intelligence at the edge with transformative insi
Tags : 
    
Intel
Published By: Zebra Technologies     Published Date: Jul 06, 2017
Gestione sin esfuerzo su flota de impresoras térmicas de códigos de barras para un control más estricto y mayores resultados. Este artículo cubre desafíos como aprovisionamiento problemático, dolores de cabeza de seguridad y monitoreo confuso.
Tags : 
printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy, inventory accuracy, price management accuracy
    
Zebra Technologies
Published By: Extreme Networks     Published Date: Feb 14, 2017
La tecnología es hoy día el mejor aliado de cualquier Administración Pública para acercarse al ciudadano. Muchos organismos públicos están desplegando tecnologías de “edificación inteligente” tanto para para ofrecer al ciudadano una amplia gama de servicios on-line en sus sedes como para gestionar de forma más eficiente sistemas y servicios dentro de los edificios públicos. En este documento se analizan los retos y estrategias más adecuadas para el despliegue de este tipo de tecnologías.
Tags : 
    
Extreme Networks
Published By: Adobe     Published Date: Mar 07, 2013
Our eighth Digital Intelligence Briefing, in association with Econsultancy highlights key digital marketing trends for 2013, and outlines the challenges and opportunities which organisations are (or should be) paying close attention to this year.
Tags : 
digital marketing trends, adobe, social media engagement, targeting and personalisation, mobile optimisation
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2014
Social media is more than friends and likes, tweets and followers, pins and mentions. According to the Q4 2013 Adobe Digital Index Social Intelligence Report, it’s time for marketers to take social advertising seriously. With higher click-through rates and lower prices, the pressure is on to bring social into your overall media mix. Adobe can help manage, forecast, and optimize all your ads.
Tags : 
adobe, social intelligence, social media, social media marketing, social advertising, click through rate, ctr, digital marketing, online advertising, internet marketing, media mix, forecasting, social engagement
    
Adobe
Published By: McAfee     Published Date: Mar 31, 2017
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics from diagnostic and descriptive to prescriptive and proactive, leading to faster and more accurate detection.
Tags : 
machine learning, advanced analytics, advanced threats, sandbox, zero-day, malware, mcafee labs, dynamic endpoint
    
McAfee
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: SAP     Published Date: Nov 22, 2011
Analytics has moved from the specialty of a dedicated few to a necessity for broad groups of business professionals to do their job. This white paper considers the use of analytics and business intelligence in the banking industry for improving decision making and the benefits of prebuilt analytic applications for achieving this objective across many functions in a banking organization.
Tags : 
idc, finance, technology, business, banking, analytics, decision making
    
SAP
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet
    
Intel Security
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: SAP     Published Date: Nov 22, 2011
Learn how SAP BusinessObjects BI OnDemand offers complete, integrated business intelligence that extends your reporting and analysis of data in the Salesforce application from salesforce.com. This software-as-a-service (SaaS) solution is free to try and requires no dedicated hardware or software installation.
Tags : 
sap, business objects, technology, salesforce, bi ondemand, free trial, reporting
    
SAP
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.