intel

Results 4176 - 4200 of 4351Sort Results By: Published Date | Title | Company Name
Published By: VMTurbo     Published Date: Mar 25, 2015
In this paper, we outline the need for “Software-Driven Control” – the intelligence or “control plane” that can take advantage of these new software-defined capabilities, enabling enterprises and service providers to bridge the gap between software-defined flexibility and the true business potential of the Software-Defined Datacenter.
Tags : 
vmturbo, cloud control plane, software-driven control, software-defined capabilities, software-defined datacenter
    
VMTurbo
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Jan 27, 2009
Frustrated by the costs of maintain ever larger data centers-or building new ones-many companies are exploring virtualization. Virtualization lets your IT staff turn your data center into an internal cloud of computing resources controlled by a single virtual data center operating system (VDC-OS).
Tags : 
vmware, virtualization, server virtualization, data center, fc san, fibre, networkattached storage, nas
    
VMware/Intel Server Refresh and Cost Savings
Published By: VMware     Published Date: Apr 09, 2019
Digital transformation is reshaping how business gets done. In this eBook from VMware and Intel, you’ll learn how to evolve your data center into a hyperconverged powerhouse - one that lets you use, manage and securely power any application in any cloud.
Tags : 
    
VMware
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
volitionrx, cyber, security, data
    
BlackBerry Cylance
Published By: Lenovo UK     Published Date: Oct 15, 2018
Mit einem Laptop, der jede Minute gestohlen wird, wie balancieren Sie die Sicherheitsbedrohung gegen den steigenden Bedarf an Mobilität und Produktivität der Mitarbeiter? Mit ThinkPad mit Intel® Core ™ i7 vPro ™ -Prozessoren profitieren Sie vom Lenovo 360-Sicherheitskonzept. Plus die Haltbarkeit, um Ihre Benutzer in jeder Phase ihres Arbeitstages beweglich und produktiv zu halten. Erfahren Sie mehr in unserer Infografik. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
Mit einem Laptop, der jede Minute gestohlen wird, wie balancieren Sie die Sicherheitsbedrohung gegen den steigenden Bedarf an Mobilität und Produktivität der Mitarbeiter? Mit ThinkPad mit Intel® Core™ i7 vPro™ Prozessoren profitieren Sie vom Lenovo 360-Sicherheitskonzept. Plus die Haltbarkeit, um Ihre Benutzer in jeder Phase ihres Arbeitstages beweglich und produktiv zu halten. Erfahren Sie mehr in unserer Infografik. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
Mit einem Laptop, der jede Minute gestohlen wird, wie balancieren Sie die Sicherheitsbedrohung gegen den steigenden Bedarf an Mobilität und Produktivität der Mitarbeiter? Mit ThinkPad mit Intel® Core™ i7 vPro™ Prozessoren profitieren Sie vom Lenovo 360-Sicherheitskonzept. Plus die Haltbarkeit, um Ihre Benutzer in jeder Phase ihres Arbeitstages beweglich und produktiv zu halten. Erfahren Sie mehr in unserer Infografik. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität
    
Lenovo UK
Published By: DellEMC and Intel®     Published Date: Sep 16, 2016
In diesem Whitepaper werden die Argumente für hyperkonvergente Appliances, und insbesondere die EMC VCE VxRail-Appliance, aus Sicht der Kosten und des messbaren Aufwands betrachtet. Um eine realistische und wiederholbare Analyse zu ermöglichen, wurden statt anekdotischer Beobachtungen oder Kundenzitaten über die Vorteile ausschließlich messbare Ergebnisse herangezogen.
Tags : 
emc vce vxrail, virtualisation, converged infrastructure, hyber-converged infrastructure
    
DellEMC and  Intel®
Published By: Tenable     Published Date: Jan 25, 2019
"The latest report from Tenable Research analyzes vulnerability prevalence in the wild, highlighting the cyber threats that security practitioners are dealing with in practice – not just in theory. Our research shows that enterprises must triage more than 100 critical vulnerabilities a day. To better understand where to focus remediation efforts, you need to find out how cyber defenders are actually acting. Download the report now to: -See why CVSS is an inadequate prioritization metric – and why you must prioritize vulnerabilities based on actual risk -Discover vulnerability trends in the ever-expanding attack surface -Learn whether your organization has one of the most common vulnerabilities (some are more than a decade old!)"
Tags : 
    
Tenable
Published By: Flexera     Published Date: Sep 08, 2016
This white paper will discuss the key elements of Software Vulnerability Management and how a properly deployed solution based on Vulnerability Intelligence will help organizations to maintain compliance and further secure their IT systems from breaches, attacks and data loss
Tags : 
    
Flexera
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Polycom     Published Date: Jun 08, 2016
In the past, business meetings were treated like formal events. They were scheduled days or weeks in advance, often on a recurring basis (e.g. every second Tuesday), and had a defined start time and end time. Typically, these meetings had a named meeting host who managed the session and guided the team through a pre-published agenda.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Polycom
Published By: HP     Published Date: May 05, 2014
Service virtualization and testing automation speed time-to-market: Discover how Walgreens has reduced application development cycle time (from 10 weeks to 5 to 7 weeks), transformed testing into a non-linear, agile process and ensured high quality of proprietary business applications using HP Application Lifecycle Management solutions. Walgreens is a leader in providing consumers with multi-channel access to pharmacy and health-and-wellness related goods and services
Tags : 
hp uft, hp service virtualization, hp application, hp software tools, it case study, lifecycle intelligence, lifecycle management, alm
    
HP
Published By: HP     Published Date: May 05, 2014
Service virtualization and testing automation speed time-to-market: Discover how Walgreens has reduced application development cycle time (from 10 weeks to 5 to 7 weeks), transformed testing into a non-linear, agile process and ensured high quality of proprietary business applications using HP Application Lifecycle Management solutions. Walgreens is a leader in providing consumers with multi-channel access to pharmacy and health-and-wellness related goods and services.
Tags : 
hp uft, hp service virtualization, hp application, hp software tools, it case study, lifecycle intelligence, lifecycle management, alm
    
HP
Published By: eDataSource     Published Date: Jan 05, 2015
We track daily 25 million email campaigns from 50,000 brands. Download this 1 page white paper on how we do it and learn how you gain real-time e-mail competitive intelligence.
Tags : 
email campaigns, email competitive intelligence, email monitoring, real-time, email service providers
    
eDataSource
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
Die Leiter der Geschäftsbereiche und der IT sind sich einig: Die IT-Transformation ist für die Beteiligung am Wettbewerb in der digitalen Wirtschaft unerlässlich. Sie können greifbare Ergebnisse erzielen, indem Sie Innovationen und die Flexibilität fördern, die Kosten senken und die Bereitstellung beschleunigen. Nutzen Sie zur Modernisierung die führenden hyperkonvergenten Systeme für Cloud, Datenspeicher, Server, oene Netzwerke und Data Protection von Dell EMC auf Basis von Intel ®.
Tags : 
    
Dell EMC & Intel
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: IBM APAC     Published Date: Nov 22, 2017
Glossary:Terms You Should Know Take your data analysis and deep learning expertise to the next level with these industry terms.
Tags : 
api, application, programming, interface, artificial intelligence, base, encoding, chrome
    
IBM APAC
Published By: Gigya     Published Date: Jun 06, 2014
This white paper will go over three ways user anonymity can negatively affect ROI for businesses and lead to poor customer experiences.
Tags : 
gigya, anonymity, user data, social networking, social networks, customer engagement, customer experience, user insight
    
Gigya
Published By: Fitbit     Published Date: Mar 21, 2017
Fear not, it is possible to prove the return on investment (ROI) of your wellness program! But don’t take our word for it. Springbuk, a health intelligence platform, recently evaluated the health care claims and wearable device data for a self-insured employer (and Fitbit customer) over a three-year period. View this webinar, Rod Reasen, CEO at Springbuk, walks you through their study and reveals how: - Employees who opted into the company’s wearable program cost less than their counterparts - Total costs for engaged wearable users dropped by 46% vs. 14% for non-engaged individuals - Cost reductions were highest with less active members – encouraging news for all employee populations
Tags : 
    
Fitbit
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
    
VeriSign Incorp.
Published By: Flimp Media     Published Date: Feb 02, 2010
This report, which describes the emerging web video direct marketing category, discusses how online video marketing isn't just for advertisers anymore; explains the applications and benefits of interactive web video and in particular video landing pages for direct marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective email video marketing campaigns without programming or advanced technical skills.
Tags : 
flimp, b2b, idc, intelligent digital collateral, digital sales, direct marketing, analytics, rich media
    
Flimp Media
Published By: Oracle     Published Date: Feb 21, 2018
Transform Your Business with Artificial Intelligence (AI) AI is on the verge of broad adoption, and Mobile will be at the forefront of this digital transformation through the use of intelligent chatbots! Introducing Oracle Mobile Cloud, Enterprise Learn about Oracle’s new Intelligent Bots platform and check out the chatbot demo Listen to Oracle's Suhas Uliyar and Exelon's Rajesh Kumar Thakur discuss how AI is impacting how customers interact with businesses Learn of the new Customer Experience Analytics capabilities for web, mobile, and chatbots
Tags : 
    
Oracle
Published By: Teradata     Published Date: Jan 28, 2015
Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.
Tags : 
teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce
    
Teradata
Published By: NetApp     Published Date: Dec 12, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : 
netapp, big data, webinar, webcast, unprepared organizations, avalanche of info, business intelligence, alcatel lucent
    
NetApp
Start   Previous    161 162 163 164 165 166 167 168 169 170 171 172 173 174 175    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.