emat

Results 26 - 50 of 116Sort Results By: Published Date | Title | Company Name
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: Emarsys     Published Date: Feb 15, 2018
Als Marketer am Puls der Zeit sind Sie stets auf der Suche nach Methoden zur Steigerung Ihrer Arbeitseffizienz. Besonders interessant ist dabei spezielle Software, die einen Teil Ihrer Arbeit übernehmen kann. Vermutlich haben Sie in letzter Zeit viel über Artificial Intelligence gelesen; bzw. darüber, was AI als Technologie erreichen kann. Und tatsächlich gibt es in der Marketingwelt kaum einen Ort, an dem AI nicht gegenwärtig thematisiert und diskutiert wird.
Tags : 
marketer, methoden, steigerung, arbeitseffizienz, besonders, emarsys
    
Emarsys
Published By: Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
    
Schneider Electric
Published By: HotSchedules     Published Date: Jan 26, 2018
Restaurants are complex businesses with a simple aim: great guest experiences that keep customers coming back for more. In order to achieve this goal, stores must deliver on the promise of a great product and exceptional service. There are a lot of ways to make the equation work and each brand has its own unique mix of ingredients that bring the whole operation together to create a recipe for profitability. There are also elements of a successful restaurant that are consistent across any operation. Restaurant executives have long been on the hunt for this elusive lever (or combination of levers) that systematically drive performance regardless of conditions.
Tags : 
cio, office, innovation, restaurant, data, software, workflow, hotschedules
    
HotSchedules
Published By: Pure Storage     Published Date: Jan 12, 2018
Interest in machine learning has exploded over the past decade. You see machine learning in computer science programs, industry conferences, and the Wall Street Journal almost daily. For all the talk about machine learning, many conflate what it can do with what they wish it could do. Fundamentally, machine learning is using algorithms to extract information from raw data and represent it in some type of model. We use this model to infer things about other data we have not yet modeled. Neural networks are one type of model for machine learning; they have been around
Tags : 
learning machines, automated intelligence, scalars, vectors, mathematics, classification, pure storage
    
Pure Storage
Published By: Group M_IBM Q1'18     Published Date: Jan 08, 2018
As organizations develop next-generation applications for the digital era, many are using cognitive computing ushered in by IBM Watson® technology. Cognitive applications can learn and react to customer preferences, and then use that information to support capabilities such as confidence-weighted outcomes with data transparency, systematic learning and natural language processing.
Tags : 
database, applications, data availability, cognitive applications
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
As organizations develop next-generation applications for the digital era, many are using cognitive computing ushered in by IBM Watson® technology. Cognitive applications can learn and react to customer preferences, and then use that information to support capabilities such as confidence-weighted outcomes with data transparency, systematic learning and natural language processing. To make the most of these next-generation applications, you need a next-generation database. It must handle a massive volume of data while delivering high performance to support real-time analytics. At the same time, it must provide data availability for demanding applications, scalability for growth and flexibility for responding to changes.
Tags : 
database, applications, data availability, cognitive applications
    
Group M_IBM Q1'18
Published By: SAP     Published Date: Nov 22, 2017
Many energy and natural resource (ENR) companies still rely on static, error prone data sources. Using static data in assumptions that are made on actual production costs, operating capacity, and yields is no longer sufficient to compete successfully in today’s market, a situation made more problematic given that the ENR industry faces reduced market prices for products, increased costs for operations and an onslaught of new competitors.
Tags : 
companies, operating capacity, sufficient, successfully, market, enr, industry
    
SAP
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Mintigo     Published Date: Nov 20, 2017
What is ABM and why is it so cool? Rarely do new trends catch the attention of marketers with the velocity and intensity of Account Based Marketing (ABM). So what is ABM and how should marketing and sales executives strategically evaluate an ABM program for their organization? The definition of ABM is: The systematic process to use data and intelligence to discover, identify, segment, target, engage and win business.
Tags : 
    
Mintigo
Published By: McAfee EMEA     Published Date: Nov 15, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why McAfee takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, mcafee, cyber threat, technologies, innovation, analytics
    
McAfee EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Sie müssen stets für das kontinuierliche Wachstum Ihres Unternehmens sorgen. Im Zuge der anhaltenden Dynamik der Application Economy setzen Sie zur Förderung dieses Wachstum vermutlich auf digitale Unternehmensinitiativen. Wie organisieren und verwalten Sie nun am besten ein APIProgramm, ohne Ihr geistiges Eigentum außerhalb des Unternehmens auf problematische Weise zu exponieren? Nachfolgend stellen wir eine Reihe von Early Adopters vor, die ihr Wachstum erfolgreich mit APIs befördert haben.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: Reputation.com     Published Date: Oct 02, 2017
1.Meet the new consumer The migration to mobile and social media will challenge — and change — everything we know about consumer marketing. 2. Who owns your brand? Brand equity can no longer be bought. Online reviews now generate total market transparency for location-based businesses. Reviews tilt the balance of branding power away from companies and into the hands of customers. 3. The battle for brick-and-mortar customers is won or lost on the social web. To win, marketers must actively enlist customers as online advocates. Those who scale online review volume and quality will be rewarded with higher search visibility and more business at street level. 4. “Dark data” provides priceless operational insights Vast amounts of unstructured, unmined sentiment data on social media provides feedback about the customer experience that you can filter using thematic analysis and use to improve operations at the national or location level. 5. Business implications Online reputation stands betwee
Tags : 
    
Reputation.com
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Le odierne aziende orientate alle metodologie DevOps e Agile puntano a cambiamenti rapidi e deployment veloci. Per queste aziende l'architettura dei microservizi è un vantaggio, ma non una soluzione ottimale. Le aziende possono offrire ai team di sviluppo di piccole dimensioni più autonomia e agilità e, di conseguenza, si noterà una maggiore adeguatezza dell'IT alle aspettative mutevoli del business.
Tags : 
modularità, velocità di delivery, zero deployment, deployment automatizzato, coesione, separazione delle problematiche, ca technologies
    
CA Technologies EMEA
Published By: Zebra Technologies     Published Date: Jul 06, 2017
Effortlessly manage your fleet of thermal barcode printers for tighter control and greater outcomes. This paper covers challenges like problematic provisioning, security headaches and muddled monitoring.
Tags : 
printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy, inventory accuracy, price management accuracy
    
Zebra Technologies
Published By: IBM     Published Date: May 17, 2017
Making predictions is a risky activity. Making predictions in the utility industry can be perilous. History is filled with missed or prematurely exuberant pronouncements of the future of utilities and energy. For example, in the late 20th century, many predicted that the world’s oil supply had reached peak production and would become scarce. Instead, shale gas and oil are in abundance. In the 1990s, people predicted that fuel cells and hydrogen would dominate the landscape by 2010, another illustration that predictions can fail to reach their promise. Learn more. Download now
Tags : 
energy, utilities, ibm, pov
    
IBM
Published By: IBM APAC     Published Date: May 12, 2017
With these facts in mind, the need to help different age groups work well together is clear. Younger generations have fundamentally different views about work and the world in general, which can be problematic when they’re expected to work alongside older workers. You must find ways to bridge the gaps between generations, while empowering individual generations to work in the manner that best suits them. Read on to learn more.
Tags : 
workplace, mobile workplace, mobile environment, remote working, workplace environment, digital transformation
    
IBM APAC
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Palo Alto Networks
Published By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
    
Code42
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: Qualys     Published Date: Jan 11, 2017
With attackers getting more sophisticated every day, manual methods of locating and testing web-based apps are no longer enough. The right Web Application Scanning (WAS) solution can help you systematically: discover web apps running in your network, determine whether or not they are vulnerable to attack, understand how to fix them, and protect your business while fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Start   Previous    1 2 3 4 5    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.