"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

intelligent

Results 351 - 375 of 441Sort Results By: Published Date | Title | Company Name
Published By: Coho Data     Published Date: Aug 04, 2014
In this webinar an expert panel will examine the pros and cons of SDN powered scale-out storage architecture.
Tags : 
coho data, sdn, storage architecture, storage, storage applications, storage power, network architecture, backup and recovery, network attached storage, storage management, data warehousing, cloud computing, data center design and management
    
Coho Data
Published By: Raritan     Published Date: Oct 07, 2015
In the following sections we will discuss the basic concepts, considerations and approaches in designing, selecting and deploying the appropriate rack PDU for typical data center applications.
Tags : 
raritan, pdu, data center, data center applications, racks, servers, data center power, internetworking hardware, network architecture, blade servers, best practices, green computing, power and cooling, data center design and management
    
Raritan
Published By: xMatters     Published Date: Aug 22, 2014
More and more IT leaders are seeing themselves as strategic business value generators for the company. According to a 2013 Ponemon Institute report on the IBM Global Study on the Economic Impact of IT Risk, top concerns among IT leaders now include maximizing employee productivity, enhancing the company’s brand value and reputation,expanding into new global markets, minimizing customer defection, maximizing customer acquisition, and increasing revenues and positive cash flow. So how do you get there? Start by developing a notification plan.
Tags : 
fatigue, communication, business, value, generators, it risk, productivity, acquisition, notification plan, it management, data management
    
xMatters
Published By: IBM     Published Date: Jul 09, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : 
ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas, recovery point objectives, rpo, recovery time objectices, rto, virtualized server recovery, it management, search and retrieval
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : 
disaster recovery operations, cloud technologies, cloud computing, critical business aplplications, it management, knowledge management, business analytics, business intelligence
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
Life revolves around prediction—for example, the route you take to get to work, whether to go on a second date, or whether or not to keep reading this sentence are all forms of prediction. We are already seeing machine learning powered by Apache Spark changing the face of innovation at IBM. Learn more.
Tags : 
intelligent applications, machine learning, prescriptive analytics, real-time, natural language processing, automation, business analytics, business intelligence
    
IBM
Published By: Cisco     Published Date: Nov 18, 2015
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
cisco, intelligent wan, validated designs, systems design, networking, wireless
    
Cisco
Published By: Juniper Networks     Published Date: Feb 18, 2015
Looking to bring apps to market more quickly and reliably? Read our eBook on Network Automation to learn how you can make the most of the cloud with SDN and open, intelligent network architectures.
Tags : 
network, automation, data center, cloud, it management, business process automation, application integration, data integration
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 18, 2015
Discover how a dynamic, intelligent firewall can improve your security. This Webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.
Tags : 
firewall, network, business assets, security, management, network security, security management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn all about the new dynamically intelligent solutions that are taking security to the next level in this expert Webinar.
Tags : 
cloud, cybercrime, security intelligence, security, security tool, data center, security management
    
Juniper Networks
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: IFS, Inc.     Published Date: Apr 01, 2010
Read this paper to learn tips for implementing a business performance metrics program in your organization.
Tags : 
ifs, intelligent metrics, business process management, bpm, metrics program, automated system, measurements, business intelligence, business process automation
    
IFS, Inc.
Published By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : 
attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis, business analytics, analytical applications, information management
    
Attivio
Published By: SAS     Published Date: Apr 25, 2017
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis. The heart and soul of SAS Visual Analytics is the SAS® LASR™ Analytic Server, which ca
Tags : 
    
SAS
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution, access control
    
Q1 Labs
Published By: Asure Software     Published Date: Mar 20, 2014
Through better utilization of meeting space, businesses can grow intelligently maximizing existing space to its fullest potential. Please download the whitepaper to learn more!
Tags : 
asure, workplace space, space utilization, efficient measurements, work productivity, effective use of space, workplace space software, knowledge management, human resources
    
Asure Software
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, security, it management, data management, data center
    
Arbor Networks
Published By: Riverbed     Published Date: Jul 15, 2014
Riverbed delivers application performance for the globally connected enterprise. With Riverbed, enterprises can successfully and intelligently implement strategic initiatives such as virtualization, consolidation, cloud computing, and disaster recovery without fear of compromising performance.
Tags : 
troubleshooting, performance, virtualized, application, architecture, network performance, virtualization
    
Riverbed
Published By: Riverbed     Published Date: Jul 15, 2014
The intelligent economy is here, and it is transforming IT's mandate to deliver business value to the enterprise. Businesses recognize that to remain competitive, they need to embrace a broader array of collaborative applications and create ubiquitous access to these applications at the far reaches of the globe. Ensuring IT is the "must have" resource in new revenue-generating opportunities is top of mind for all IT professionals.
Tags : 
business value, roi, application-awareness, network performance, network management, network performance management, productivity
    
Riverbed
Published By: Riverbed     Published Date: Aug 22, 2014
Secure, Intelligent, WAN Optimization for Microsoft Exchange Server 2013.
Tags : 
secure, intelligent, optimization, exchange server, microsoft exchange, windows
    
Riverbed
Published By: Riverbed     Published Date: Aug 22, 2014
Intelligent WAN Optimization for EMC SRDF/A Replication.
Tags : 
srdf, optimization, intelligent, replication, networking, network performance
    
Riverbed
Published By: HP     Published Date: Aug 08, 2014
When you have voluminous data sets growing at an unabated rate, in formats that are unique and complex, how do you address your backup and recovery needs? While relying on traditional backup and recovery solutions can complicate matters, a better approach is to use a solution that enables your IT organization to make decisions that are more intelligent by integrating predictive analysis and an adaptive approach to backup and recovery.
Tags : 
transform, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance, connectivity, enterprise applications, backup and recovery
    
HP
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
From core to cloud HP ProLiant Gen8 servers are transforming data center expectations and economics with the world's most intelligent servers. Learn how they deliver maximum performance and reliability while simplifying day-to-day management.
Tags : 
proliant, data centers, server
    
Hewlett-Packard Company
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Riverbed     Published Date: Aug 19, 2014
Microsoft® Exchange Server has become the corporate standard in email, calendaring, and workforce productivity. As a result, significant time and IT resources go into creating a robust, reliable, high-performance Exchange environment. IT departments regularly consider deploying additional exchange servers, moving servers to branch offices, and even adding more bandwidth in order to improve Exchange performance.
Tags : 
security, wan, optimization, workforce, productivity, bandwidth, networking, it management
    
Riverbed
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Special Report

What does it take to succeed in today’s hypercompetitive and hyperconnected digital economy? Keep reading to find out.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory