intelligence

Results 2301 - 2325 of 2406Sort Results By: Published Date | Title | Company Name
Published By: Pentaho     Published Date: Feb 26, 2015
Ventana’s benchmark research on big data integration will help you become familiar with the tools and technologies you need to help your organization succeed with big data.
Tags : 
benchmark research, big data integration, big data, business intelligence systems, business analytics, data integration, research
    
Pentaho
Published By: Teradata     Published Date: May 02, 2017
Ventana’s Internet of Things (IoT) research found that the intention of organizations to embrace IoT and operational intelligence often outpace their current capabilities. Furthermore, most organizations are not ready to derive maximum value from IoT. This analyst report will take you through the Top 10 Best Practices for organizations considering how to engage with and best leverage IoT.
Tags : 
ventana, report, iot, operational intelligence, organizations
    
Teradata
Published By: Genesys     Published Date: Feb 12, 2019
Le marché nord américain des centres de contacts « as-a-Service » (CCaaS) explose. Les solutions de centres de contacts dans le cloud (ou solutions CCaaS) offrent des fonctionnalités semblables à celles des infrastructures de centres de contacts et d’appels sur site. Seule différence notoire : elles sont fournies sous forme de service et reposent sur un modèle de paiement mensuel. Au sommaire de ce rapport : Forces et faiblesses à intégrer dans votre évaluation des fournisseurs de solutions de centres de contacts dans le cloud Classement des 10 grands fournisseurs de centres de contacts cloud dans les quatre catégories du Gartner MQ : leaders, challengers, visionnaires et acteurs niche Pourquoi Interactive Intelligence, une entreprise Genesys, s’est classée parmi les leaders 2 années consécutives
Tags : 
    
Genesys
Published By: McAfee     Published Date: Apr 06, 2017
Kirk Davis, Information Security Director, Vidant Health, says that the integration of McAfee threat management products allows his business to protect and remediate against threats while focusing on the business.
Tags : 
siem, secops, security operations, advanced threats, threat intelligence
    
McAfee
Published By: Cisco     Published Date: Jan 21, 2015
The latest version of the Medianet-enabled Video Surveillance Manager (VSM) now runs on the Cisco Unified Computing System. Scale and reliability are redefined as Intelligent Networked Surveillance has come of age. VSM 7 and MediaNet have completely changed how this is deployed and operated.
Tags : 
cisco, vsm, surveillance, manager, unified, computing, system, scale
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.
Tags : 
cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
Jimmy Ray takes to the whiteboard to explain how MediaNet has transformed deployment and operation of video surveillance and made it more accessible.
Tags : 
cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
Cisco
Published By: Adobe     Published Date: Apr 25, 2016
Marketer in jeder Branche erkennen die neuen Rahmenbedingungen für Kundenerlebnisse. Natürlich stellen sie sie vor neue Herausforderungen, aber sie inspirieren auch zu Kreativität, Enthusiasmus und Erfolg. Wir hoffen, dass dieser Bericht Sie beim Start in das Jahr 2016 unterstützt. Vielleicht liefert er Ihnen sogar neue Ideen zur Bedeutung von Marketing für Ihr Unternehmen
Tags : 
    
Adobe
Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how Cisco® Advanced Malware Protection (AMP) is the integrated solution that provides visibility into potential threat activity and the control to rapidly contain and remediate malware.
Tags : 
cisco, malware protection, amp, advanced malware protection, global threat intelligence, networking, security, it management
    
Cisco
Published By: VMTurbo     Published Date: Mar 25, 2015
In this paper, we outline the need for “Software-Driven Control” – the intelligence or “control plane” that can take advantage of these new software-defined capabilities, enabling enterprises and service providers to bridge the gap between software-defined flexibility and the true business potential of the Software-Defined Datacenter.
Tags : 
vmturbo, cloud control plane, software-driven control, software-defined capabilities, software-defined datacenter, it management, knowledge management, enterprise applications
    
VMTurbo
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
volitionrx, cyber, security, data
    
BlackBerry Cylance
Published By: Tenable     Published Date: Jan 25, 2019
"The latest report from Tenable Research analyzes vulnerability prevalence in the wild, highlighting the cyber threats that security practitioners are dealing with in practice – not just in theory. Our research shows that enterprises must triage more than 100 critical vulnerabilities a day. To better understand where to focus remediation efforts, you need to find out how cyber defenders are actually acting. Download the report now to: -See why CVSS is an inadequate prioritization metric – and why you must prioritize vulnerabilities based on actual risk -Discover vulnerability trends in the ever-expanding attack surface -Learn whether your organization has one of the most common vulnerabilities (some are more than a decade old!)"
Tags : 
    
Tenable
Published By: Flexera     Published Date: Sep 08, 2016
This white paper will discuss the key elements of Software Vulnerability Management and how a properly deployed solution based on Vulnerability Intelligence will help organizations to maintain compliance and further secure their IT systems from breaches, attacks and data loss
Tags : 
    
Flexera
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Polycom     Published Date: Jun 08, 2016
In the past, business meetings were treated like formal events. They were scheduled days or weeks in advance, often on a recurring basis (e.g. every second Tuesday), and had a defined start time and end time. Typically, these meetings had a named meeting host who managed the session and guided the team through a pre-published agenda.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Polycom
Published By: HP     Published Date: May 05, 2014
Service virtualization and testing automation speed time-to-market: Discover how Walgreens has reduced application development cycle time (from 10 weeks to 5 to 7 weeks), transformed testing into a non-linear, agile process and ensured high quality of proprietary business applications using HP Application Lifecycle Management solutions. Walgreens is a leader in providing consumers with multi-channel access to pharmacy and health-and-wellness related goods and services
Tags : 
hp uft, hp service virtualization, hp application, hp software tools, it case study, lifecycle intelligence, lifecycle management, alm
    
HP
Published By: HP     Published Date: May 05, 2014
Service virtualization and testing automation speed time-to-market: Discover how Walgreens has reduced application development cycle time (from 10 weeks to 5 to 7 weeks), transformed testing into a non-linear, agile process and ensured high quality of proprietary business applications using HP Application Lifecycle Management solutions. Walgreens is a leader in providing consumers with multi-channel access to pharmacy and health-and-wellness related goods and services.
Tags : 
hp uft, hp service virtualization, hp application, hp software tools, it case study, lifecycle intelligence, lifecycle management, alm
    
HP
Published By: eDataSource     Published Date: Jan 05, 2015
We track daily 25 million email campaigns from 50,000 brands. Download this 1 page white paper on how we do it and learn how you gain real-time e-mail competitive intelligence.
Tags : 
email campaigns, email competitive intelligence, email monitoring, real-time, email service providers
    
eDataSource
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: IBM APAC     Published Date: Nov 22, 2017
Glossary:Terms You Should Know Take your data analysis and deep learning expertise to the next level with these industry terms.
Tags : 
api, application, programming, interface, artificial intelligence, base, encoding, chrome
    
IBM APAC
Published By: Gigya     Published Date: Jun 06, 2014
This white paper will go over three ways user anonymity can negatively affect ROI for businesses and lead to poor customer experiences.
Tags : 
gigya, anonymity, user data, social networking, social networks, customer engagement, customer experience, user insight
    
Gigya
Published By: Fitbit     Published Date: Mar 21, 2017
Fear not, it is possible to prove the return on investment (ROI) of your wellness program! But don’t take our word for it. Springbuk, a health intelligence platform, recently evaluated the health care claims and wearable device data for a self-insured employer (and Fitbit customer) over a three-year period. View this webinar, Rod Reasen, CEO at Springbuk, walks you through their study and reveals how: - Employees who opted into the company’s wearable program cost less than their counterparts - Total costs for engaged wearable users dropped by 46% vs. 14% for non-engaged individuals - Cost reductions were highest with less active members – encouraging news for all employee populations
Tags : 
    
Fitbit
Published By: Oracle     Published Date: Feb 21, 2018
Transform Your Business with Artificial Intelligence (AI) AI is on the verge of broad adoption, and Mobile will be at the forefront of this digital transformation through the use of intelligent chatbots! Introducing Oracle Mobile Cloud, Enterprise Learn about Oracle’s new Intelligent Bots platform and check out the chatbot demo Listen to Oracle's Suhas Uliyar and Exelon's Rajesh Kumar Thakur discuss how AI is impacting how customers interact with businesses Learn of the new Customer Experience Analytics capabilities for web, mobile, and chatbots
Tags : 
    
Oracle
Published By: Teradata     Published Date: Jan 28, 2015
Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.
Tags : 
teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce
    
Teradata
Published By: NetApp     Published Date: Dec 12, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : 
netapp, big data, webinar, webcast, unprepared organizations, avalanche of info, business intelligence, alcatel lucent
    
NetApp
Start   Previous    83 84 85 86 87 88 89 90 91 92 93 94 95 96 97    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.