intelligent

Results 1 - 25 of 491Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Adaptive Computing     Published Date: Feb 06, 2014
A new approach, known as “Big Workflow,” is being created by Adaptive Computing to address the needs of these applications. It is designed to unify public clouds, private clouds, Map Reduce-type clusters, and technical computing clusters. Download now to learn more.
Tags : 
adaptive, ada[tive computing, big data, data center, workload management, servers, cloud, cloud computing, storage, data storage, business technology
    
Adaptive Computing
Published By: Adobe     Published Date: Sep 28, 2010
This IDC Government Insights White Paper discusses government's new efforts to achieve its goals regarding service delivery to citizens, businesses, and other government agencies.
Tags : 
adobe, government enterprise, service delivery, customer interaction, data sharing, intelligent application, business analytics, business process management
    
Adobe
Published By: Adobe     Published Date: Jun 06, 2013
Strive for meaningful engagement with intelligent marketing. Marketers are seeing the writing on the wall: As important as it is to have beautiful and creative content, you have to make sure you're getting it in front of the right people, in the right places, and at the right times.
Tags : 
digital trends, user experience, event presentations, content marketing
    
Adobe
Published By: Adobe     Published Date: Oct 24, 2018
Adobe automates the process of turning insights into action by connecting Adobe Analytics to other solutions in Adobe Experience Cloud, including Adobe Target and Adobe Audience Manager. Four features make this possible: • Anomaly detection. The technology automatically analyzes trends and determines if they are statistically significant — in milliseconds. • Analyze play button. With analytics, you can take insights and connect them to your email, DMP, and personalization platform in seconds. • Intelligent alert. A built-in alerting system sends an SMS text or email when it detects an anomaly. There are also predictive algorithms that help you forecast how often the alert is likely to trigger. You can set these to only notify you of the most important changes. • Intelligent recommendations. It’s simply impossible to manually create every alert you might need, so Adobe is building machine learning directly into analytics to analyze users’ behaviors. Like a virtual data assistant, it co
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 24, 2018
Key Findings ? Budgets for analytics tools and talent are going up, as marketing leaders see analytics as a business requirement and source of competitive advantage. ? Marketing analytics users rate functionality, performance, product roadmap and future vision as the primary factors they consider when evaluating vendors. ? Customers of these vendors also report putting a premium on user experience and ease of use among their requirements. ? Digital marketing analytics vendors are addressing these needs by adding more advanced features and investing in upgraded and flexible user interfaces, including intelligent assistants.
Tags : 
    
Adobe
Published By: AdRoll     Published Date: Aug 22, 2017
Account-based marketing (ABM) is a combination of people, processes, and technology that, if deployed intelligently, will complement existing marketing programs to close bigger deals more efficiently. Account-Based Marketing: A Practical Guide is your manual to achieving that alignment and running efficient ABM. We’ll provide practical, actionable advice and tips on all aspects of ABM, with a bottom-up approach that asks and answers the question: “How?” How to set goals and objectives? How to select target accounts and specific roles? How to create a compelling buyer journey and, in turn, align content around it? We’ll then show you, step by step, how to roll out ABM campaigns and, critically, how to structure your CRM and marketing platforms around them. As a performance marketing platform that allows you to collect, analyze, and act on your data at scale, AdRoll is uniquely positioned to demonstrate how you can achieve this. So, if your company depends on closing long-cycle, mu
Tags : 
account based marketing, marketing programs, adroll. crm
    
AdRoll
Published By: Advizex     Published Date: Sep 25, 2013
The challenge of Big Data is more than a question of size; it’s about time to insight and action. With the exponential growth of unstructured data such as social media, video and the raw data generated by smartphones and other “intelligent” machines, businesses are buried under an avalanche of data that renders even best-effort analytics slow and sometimes unreliable. As many businesses are learning in this age of Big Data, it’s not just what you know, but when you know it and how much you trust it. Download this white paper and learn that with SAP HANA, companies can react intelligently at the speed of thought to capture new opportunities.
Tags : 
sap hana, sap, real time analytics, raw data, generation, analytics, big data, business intelligence, trusting big data, insight, action, knowledge management, data management
    
Advizex
Published By: Akamai     Published Date: Mar 08, 2017
This solution needs to reach audiences reliably wherever they are, scale as fast as they grow, and adjust intelligently to dynamic network environments for the highest viewing quality possible. Missteps in online video strategy can have a long-lasting effect on audience perceptions, not only of the video experience – but also on the brand being represented.
Tags : 
video, online video strategy, video experience, engagement, customer engagement, online audience
    
Akamai
Published By: Akamai Technologies     Published Date: Nov 30, 2016
The latest analysis of cloud security DDoS and web application attacks observe across the Akamai Intelligent Platform for Q32016. Highlights include analysis of the latest wave of mega attacks, a look at NTP trends and shrinking of NTP reflection capabilities, and a look at how bot activity can create DDoS-like conditions.
Tags : 
akamai, ddos, web application attacks, ntp, akamai intelligent platform, business technology
    
Akamai Technologies
Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Bot Manager provides identification, categorization, management, and reporting of bot traffic in the cloud with the globally distributed Akamai Intelligent Platform.
Tags : 
    
Akamai Technologies Australia
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Many healthcare organizations are looking at mobility as a means to improve treatment paths and patient outcomes. To achieve these goals, you need a Wi-Fi solution with the strength and intelligence to support the demands of digitization and the Internet of Things.
Tags : 
unified access, iot containment, intelligent fabric, smart analytics, healthcare
    
Alcatel Lucent Enterprise
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
In the same way, the WLAN seems to be demanding more of our attention these days. IT teams are spending an increasing amount of time managing, configuring and troubleshooting to accommodate a growing number of devices and apps, and to meet user demands for ever-faster speeds and better coverage.
Tags : 
it teams, wlan, intelligent architecture, unified network, security management, iot onboarding
    
Alcatel Lucent Enterprise
Published By: ALE     Published Date: Jan 10, 2019
Departments of roads and highways around the world have begun to implement technology solutions to improve the safety of their highways, lessen congestion and manage traffic more efficiently. Intelligent Transport Systems (ITS), as these systems are known, require reliable, secure and scalable networks to link cameras, sensors, signage, signaling and vehicles to remote data centers and operation centers. These networks will be deployed in harsh environments and will pose their own unique challenges to operate, maintain and manage. In this application note, we will present the unique requirements of ITS networks and discuss how AlcatelLucent Enterprise products and technologies not only meet today’s ITS requirements, but are designed to grow and scale to meet tomorrow’s as well.
Tags : 
    
ALE
Published By: ALE     Published Date: Jan 10, 2019
The purpose of this design guide is to present the requirements and considerations relevant to the transportation vertical along with design options, best practices and configuration guidelines. While this design guide is focused on Shortest Path Bridging (SPB-M) based networks, it also addresses data networking solutions applicable for this transportation vertical. Although several modes of transport exist, this document focuses on rail (metro, heavy, light) and road transport. More specifically, this document focuses on the fixed network infrastructure underpinning the multiple systems that enable the safe and reliable operation of rail and intelligent transport systems. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, it management, data management, business technology, data center
    
Arbor Networks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data, business technology
    
ArborNetworks
Published By: Arrow Electronics     Published Date: Oct 28, 2015
The Internet of Things enables a level of communication, collaboration and interaction between devices, sensors, machines and people that has never before been possible. This connectivity is what is called an intelligent system, and it’s revolutionizing the way we think about edge products.
Tags : 
    
Arrow Electronics
Published By: Asure Software     Published Date: Mar 20, 2014
Through better utilization of meeting space, businesses can grow intelligently maximizing existing space to its fullest potential. Please download the whitepaper to learn more!
Tags : 
asure, workplace space, space utilization, efficient measurements, work productivity, effective use of space, workplace space software, knowledge management
    
Asure Software
Published By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : 
attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis
    
Attivio
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
IQ Bot is the only cognitive bot with vision skills that adds structure to unstructured content and learns by observing people at work increasing your digital footprint.
Tags : 
    
Automation Anywhere APAC
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Bancolombia is an award winning, full-service financial institution that provides banking services to customers in 12 different countries and is one of the 10th largest financial groups in Latin-America.With bots from Automation Anywhere, Bancolombia sifts through structured, semi-structured, and unstructured customer data to transform their BPM. Bots automate hundreds of processes and greatly increasing back office efficiency, saving Bancolombia a significant amount of time servicing customers. This has led to an increase in CSAT numbers and has created additional revenue streams.
Tags : 
    
Automation Anywhere APAC
Published By: Avi Networks     Published Date: Aug 17, 2018
This whitepaper details how ADCs and virtual appliances are inflexible, expensive, and lacking in visibility in contrast to the central management, autoscaling features, intelligent analytics, and flexibility offered by the Avi Vantage Platform. This document also outlines 7 key considerations that you should evaluate before you refresh your current load balancers: 1. Automation and Self-Service 2. Elasticity 3. Applica tion Analytics and Troubleshooting 4. Performance 5. Hybrid Cloud 6. Ecosystem Integrations 7. Total Cost of Ownership
Tags : 
    
Avi Networks
Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.