intel

Results 4201 - 4225 of 4343Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Jan 20, 2011
In this session, attendees will explore the new features of Red Hat Enterprise Linux 6 performance. John Shakshober (Shak) will share the scalability optimizations for larger SMP systems, > 1TB of memory, new transparent hugepage support, multi-q network performance of 10Gbit and Infiniband, and KVM enhancements that went into Red Hat Enterprise Linux 6. Shak will also share benchmark data from industry standard workloads using common applications such as database servers, Java engines, and various financial applications on the latest Intel and AMD x86_64 hardware.
Tags : 
red hat, enterprise, linux 6 performance, memory, storage, database servers
    
Red Hat
Published By: Oracle     Published Date: Mar 07, 2019
AI, machine learning and predictive analytics are already driving big performance gains for CFOs and their teams. The ability for cognitive tools to learn at speed helps Finance progressively improve company intelligence and efficiency, including proactive identification of late- and non-paying customers. Get up to speed on the potential of cognitive, with Finance thought-leaders from Oracle and AICPA (American Institute of Certified Public Accountants).
Tags : 
    
Oracle
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence
    
Webroot Inc
Published By: Webroot UK     Published Date: Dec 20, 2013
The Webroot® Intelligence Network (WIN) is a key component of a revolutionary approach to next-generation malware protection. Together, WIN and Webroot is combined with Webroot’s ultra-efficient endpoint agent — Webroot® SecureAnywhere™ Business - Endpoint Protection ensure that both known and... that both known and unknown infections are removed before they do harm.
Tags : 
webroot, passmark software, webroot security, endpoint protection, performance benchmark, testing, endpoint security
    
Webroot UK
Published By: Symantec.cloud     Published Date: Oct 11, 2012
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and records thousands per second.
Tags : 
symantec, internet security, malware, identity theft, data security
    
Symantec.cloud
Published By: Symantec     Published Date: Nov 30, 2015
Symantec has the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Über 41,5 Millionen Angriffssensoren, die pro Sekunde mehrere Tausend Ereignisse registrieren – mit dem Symantec™ Global Intelligence Network verfügt Symantec über einige der umfassendsten Informationsquellen zu Bedrohungen aus dem Internet.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Symantec cuenta con la fuente de datos más completa que existe sobre las amenazas en Internet: Symantec ™ Global Intelligence Network, un sistema compuesto por más de 41,5 millones de sensores de ataque que registra miles de incidencias por segundo.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Symantec dispose du système de cyberveille le plus exhaustif de la planète. Son nom : Symantec™ Global Intelligence Network. Doté de plus de 41,5 millions de détecteurs d’attaques, cet observatoire enregistre des milliers d’événements à la seconde.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Symantec vanta la più completa fonte di dati relativi alle minacce Internet, un sapere collettivo raccolto dalla Symantec™ Global Intelligence Network, una rete costituita da oltre 41,5 milioni di sensori di attacco in grado di registrare migliaia di eventi ogni secondo.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
A Symantec possui a mais abrangente fonte de dados do mundo sobre ameaças na Internet, com a Symantec™ Global Intelligence Network, composta por mais de 41,5 milhões de sensores de ataque e capaz de registrar milhares de eventos por segundo.
Tags : 
    
Symantec
Published By: Optify     Published Date: Sep 13, 2012
Discover what visitor and lead intelligence details are available to B2B marketers, and how to use that info to help sales win more often.
Tags : 
website visitor intelligence, lead intelligence, lead generation, leveraging data, lead scoring, internet marketing
    
Optify
Published By: IBM Corporation     Published Date: Sep 20, 2010
IBM Software Group performed a study that compared the performance of several WebSphere deployment configurations on Intel hypervisor environments.
Tags : 
ibm caching and cloud, test environment, websphere virtual enterprise, static cluster, wve
    
IBM Corporation
Published By: Webtrends     Published Date: Jun 20, 2011
Marketers, managers and technologists all need real-time performance insights at their fingertips. Webtrends invites you to experience the award-winning Analytics 10, unified analytics uniquely made for digital marketing professionals in this webinar featuring Logitech and 3M.
Tags : 
webtrends, cmo, digital marketing, process, partnerships, go-to-market, customer experience, multi-channel marketing
    
Webtrends
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Um mit der zunehmenden geschäftlichen Mobilität Schritt halten zu können, ohne ihren potenziellen Risiken zum Opfer zu fallen, muss die IT komplexe Angelegenheiten effizient bewältigen können. Dazu gehören beispielsweise Servicebereitstellung, Gerätebeschaffung und Sicherheitsüberwachung. Warum? Informationsorientierte Mitarbeiter müssen mit verschiedenen Geräten auf oftmals vertrauliche Informationen aus zahlreichen Anwendungen zugreifen – und das unabhängig von ihrem Aufenthaltsort. Anders ausgedrückt: Sicherheits- und Datenschutz-Policies, die die Endnutzerproduktivität nicht behindern, befähigen Mitarbeiter und steigern ihre Leistung. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lösungen mit Intel® Technologie zu erhalten.
Tags : 
    
Dell EMC EMEA
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
McAfee
Published By: Dell EMEA     Published Date: Oct 30, 2019
Niemand kan tegen Dell op wanneer het op duurzaamheid aankomt. Onze apparaten hebben niet alleen de capaciteit, beheerbaarheid en beveiligingsfuncties die door IT worden vereist, maar gaan ook langer mee, waardoor de hoeveelheid afval en de kosten voor recycling worden verminderd. Geen wonder dat ze al zo lang bestaan. Dat is het verleden, maar hoe zit het met de toekomst? Latitude 7400 2-in-1 gebruikt de nieu-we ExpressSign-in van Dell om gebruikersaanwezigheid te detecteren, het systeem binnen on-geveer een seconde in te schakelen en te scannen voor gezichtsherkenning om de gebruikers in te loggen met Windows Hello. Gebruikers kunnen gewoon aan hun bureau gaan zitten en beginnen met werken, zonder control-alt-delete of zelfs maar de aan-uitknop aan te raken. In feite is het de eerste pc ter wereld die gebruikmaakt van een nabijheidssensor met Intel® Context Sensing Technology. Wanneer gebruikers even pauze nemen, zal Latitude herkennen dat ze weg zijn gegaan en zichzelf vergrendelen
Tags : 
    
Dell EMEA
Published By: SAP Concur     Published Date: Aug 07, 2019
"If you’re automating routine Accounts Payable tasks such as matching payments and invoices, that’s a great start, but you’re only scratching the surface. Learn how to take your AP team to the next level by grabbing your copy of this SAP Concur sponsored CFO eBook on artificial intelligence for AP management. By deploying AI strategically for AP processing, you will: - Reduce the headaches of manual processing, lost invoices and other barriers - Achieve greater visibility into data to improve cash forecasting - Augment human decision-making to position your company for growth"
Tags : 
    
SAP Concur
Published By: Qlik     Published Date: Oct 13, 2015
Data discovery appeals strongly to business users, but some business intelligence leaders are reluctant to ensure adoption. Data discovery is filling the gap between traditional BI and advanced analytics, and this research explains why and how BI leaders should support its use.
Tags : 
qlik, data discovery, business intelligence, analytics, user produced content
    
Qlik
Published By: Workday     Published Date: Feb 01, 2019
"Are you spending more time aggregating and reconciling data than analyzing it? We uncovered the main roadblocks that are keeping finance and analytics apart, and they’ll have you rethinking the role of finance at your organization. View the infographic to get insight from more than 670 finance leaders on data intelligence."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Datastax     Published Date: Apr 04, 2017
Today’s customers expect a seamless, intelligent and personalized experience that operates at the speed of the cloud and is continuously available regardless of location or platform. To deliver an optimal customer experience that will enable you to stay ahead of competitors you need a distributed, responsive and intelligent architecture which is only possible when the right database is in place. Read this eBook to learn how your database technology decisions can affect your ability to deliver either a transformational customer experience or a lackluster, dissatisfying encounter that benefits your competitors, not your bottom line.
Tags : 
datastax, technology decisions, customer experience, customer loyalty
    
Datastax
Published By: Financial Force     Published Date: Dec 01, 2017
Mention artificial intelligence (AI) to a person on the street, and you'll conjure up Hollywood visions ranging from the humanity-crushing Skynet of the Terminator series to the robot love interests in Her or Ex Machina. Perspectives on the tangible impact of AI similarly range from Elon Musk's declaration of AI as "the greatest risk we face as a civilization" to IBM Chief Science Officer Dr. Guruduth Banavar's belief that "we've never known technology that can have a greater benefit to all of society than artificial intelligence". The reality, especially in the short term, likely lies somewhere between these extremes.
Tags : 
    
Financial Force
Published By: FinancialForce     Published Date: Dec 01, 2017
Mention artificial intelligence (AI) to a person on the street, and you'll conjure up Hollywood visions ranging from the humanity-crushing Skynet of the Terminator series to the robot love interests in Her or Ex Machina. Perspectives on the tangible impact of AI similarly range from Elon Musk's declaration of AI as "the greatest risk we face as a civilization" to IBM Chief Science Officer Dr. Guruduth Banavar's belief that "we've never known technology that can have a greater benefit to all of society than artificial intelligence". The reality, especially in the short term, likely lies somewhere between these extremes.
Tags : 
    
FinancialForce
Published By: Expert System     Published Date: Jul 18, 2019
Although computers are better when it comes to processing and making calculations, they haven’t been able to accomplish some of the most basic human tasks, until now. Thanks to cognitive computing, machines are bringing human-like intelligence to many business applications, including big data. So, what is cognitive computing? According to Forbes, “cognitive computing comes from a mashup of cognitive science—the study of the human brain and how it functions—and computer science.” This definition is a good place to start. However, to really understand what cognitive computing is, we have to go a little deeper.
Tags : 
    
Expert System
Published By: IBM     Published Date: Jul 27, 2016
IBM i2 Enterprise Insight Analysis helps analysts and investigators turn large data sets into comprehensive intelligence, in near real-time. With the help of advanced analytics and visual analysis capabilities, analysts can uncover hidden connections, patterns and trends buried in disparate data. Equip analysts and those on the front line with the tools they need to generate actionable intelligence, with mission critical speed.
Tags : 
ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence
    
IBM
Start   Previous    160 161 162 163 164 165 166 167 168 169 170 171 172 173 174    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.