RSS feed Get our RSS feed

News by Topic

intel

Results 3751 - 3775 of 3835Sort Results By: Published Date | Title | Company Name
By: Looker     Published Date: Dec 03, 2015
Everywhere you look, companies are using external-facing analytics to maximize the value derived from their data assets, by moving customers up the value chain, increasing stickiness, and offering a more competitive product on the marketplace. Listen to learn about embedding BI software, including; • Top uses cases for embedding business intelligence software • Case studies from different companies currently embedding BI • Build vs buy considerations • Evaluating ROI
Tags : 
     Looker
By: NeighborhoodAmerica     Published Date: Oct 01, 2008
Virtually all organizations are realizing the importance of customer engagement. But in order to benefit, we must subscribe to the idea that consumers really can add value to our organization. And sometimes, that means removing the notion that we are the experts in exchange for the belief that we can learn a thing or two from our customers. The collective intelligence of the communities we serve is largely an untapped asset - a stream of valuable input that can help improve the decisions we make and shape the products we sell. This book explores the value of many - and the role that customer engagement will play in shaping the future of our businesses, our government, and our economy.
Tags : neighborhood america, social network, web 2.0, data integration, customer experience/engagement
     NeighborhoodAmerica
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
By: Dell EMC     Published Date: May 10, 2017
In this short presentation from PUND-IT, discover why a Global 500 retailer—struggling with managing increasingly complex IT and supply chain environments—chose Dell EMC Vblock Systems over HPE to manage a variety of workloads and realize significant savings. Download this report from Dell EMC and Intel® to learn more.
Tags : 
     Dell EMC
By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
     McAfee
By: McAfee     Published Date: Feb 25, 2015
This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
     McAfee
By: McAfee     Published Date: Nov 20, 2014
A survey commissioned by Intel Security and conducted by Evalueserve, in conjunction with the report, suggests that a majority of companies lack confidence in their ability to detect targeted attacks in a timely manner. Even companies best prepared to handle targeted attacks are taking the time to investigate high volumes of events. Key findings include 78% of those able to detect attacks in minutes had a proactive, real-time SIEM solution.
Tags : siem, incident response, ir capabilities, threat intelligence, indicators of attack, indicators of compromise, foundstone, ioas
     McAfee
By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
     IBM
By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models
     Trillium Software
By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data
     Splunk
By: Oracle + Dyn     Published Date: Jun 27, 2017
"Most organizations have invested in improving the performance and resiliency of their on-premise Global Load Balancing (GLB) capabilities, but very few organizations are able to achieve the level of performance and high availability that a cloud-based anycast DNS network can offer. Enterprises across the globe have begun complementing their existing GLB with a DNS service that operates in an always-on manner and can effectively manage and balance internet traffic through intelligent steering capabilities. Download whitepaper and learn the keys to: • Maintaining availability - through global and regional load balancing • Improving digital experience in a hybrid cloud environment • Increasing performance and reliability through a secondary DNS solution Learn more! "
Tags : 
     Oracle + Dyn
By: Conversica     Published Date: Nov 10, 2015
In this whitepaper you will learn how artificial intelligence can automatically interpret and respond to emails from leads.
Tags : conversica, sales leads, leads, lead nurturing, intelligence, web analytics, business intelligence, data management/analytics
     Conversica
By: Radius Intelligence     Published Date: Jun 15, 2015
Market expansions are a viable strategy when a company’s growth in an existing market has stalled. However, marketers often rely on intuition and qualitative data to inform decisions around market fit and size. In this whitepaper, marketing technology expert, David Raab, explores how the shift in data and predictive solutions streamlines the market expansion process. The paper will reveal 4 keys to a successful market expansion, common mistakes to avoid, and show marketers how to win customers in new market segments.
Tags : predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition
     Radius Intelligence
By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : ibm, cognos, mobile, inelligence, business intelligence
     IBM
By: TIBCO Software APAC     Published Date: Feb 14, 2019
With the new TIBCO Spotfire® A(X) Experience, we are revolutionizing analytics and business intelligence. This new platform accelerates the personal and enterprise analytics experience so you can get from data to insights in the fastest possible way. With the fusion of technology enablers like machine learning, artificial intelligence, and natural language search, the Spotfire® X platform redefines what’s possible for analytics and business intelligence, simplifying for everyone how data and insights are generated, consumed, and acted on. Download this whitepaper to learn more, then check out the new Spotfire analytics. It’s unlike anything you have ever seen. Simple, yet powerful, it changes everything.
Tags : 
     TIBCO Software APAC
By: Intel Security     Published Date: Feb 23, 2015
This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.
Tags : gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information
     Intel Security
By: Lenovo and Intel®     Published Date: Aug 02, 2018
Having the right, scalable, IT systems to handle large compute workloads, while tapping into massive data sets, is critical to a project's success and even the success of your business. HPC solutions, powered by Intel® technology, offer greater value potential by combining the density of blade computing with the economics of rack-based systems. Learn how businesses like yours are using HPC technology to expand IT infrastructure, improve development, accelerate overall innovation, and stay on budget. Get the white paper.
Tags : lenovo, intel, systems, technology
     Lenovo and Intel®
By: GFI     Published Date: Jun 12, 2007
This white paper describes how Bayesian mathematics can be applied to the spam problem, resulting in an adaptive, 'statistical intelligence' technique that achieves very high spam detection rates.
Tags : anti spam, anti-spam, filter, block, blocking, email security, phishing, baysian
     GFI
By: SAP     Published Date: Jun 22, 2009
Find out how to meet the challenges facing your midsize company and benefit from the road map that takes you through the process of deploying a BI solution, enabling you to start small and then build incrementally on your initial success to make fact-based and BI-driven decision making pervasive in your company.
Tags : sap, midsize, business intelligence, economy, soa, infrastructure, tco, total cost of ownership
     SAP
By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
World-class ideas deserve world-class workstations.
Tags : dell, bim, building information modeling, dell precision workstations, 3d modeling techniques
     Dell Brought to you by Intel
By: Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : cylance, endpoint, protection, cyber, security
     Cylance
By: HP and Intel ®     Published Date: May 02, 2013
This report will explain what virtualization is, and highlight how it is optimizing the performance, both from an IT and business perspective across servers, storage and end user desktops. This report will define how top performing companies gain business advantages from virtualization technologies and outline key changes that must take place for C-Level managers to gain the fruits of the new IT.
Tags : 
     HP and Intel ®
By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, security
     Arbor Networks
By: HPE     Published Date: Dec 05, 2014
The HP Flex-Bundles for SMB with SQL Server 2014 were created to include everything that a business needs to easily build a new environment or upgrade an existing one. The following sections cover the server, storage, networking and services building blocks that make up these pre-defined configurations. HP Flex-Bundles are built on the HP ProLiant servers that include some of the latest and most powerful Intel processors. In designing the latest generation of the HP ProLiant server families, HP wanted to not only draw on 24 years of server experience, but also gain from the depth of knowledge and insight from customers.
Tags : platform, technology, lync, server, sql, flex-bundles, proliant, processors
     HPE
By: Lenovo and Intel®     Published Date: Jun 13, 2018
Get the answers to all of your Hyperconvergence questions in this definitive guide. You’ll find the help you need to determine whether you should consider Hyperconvergence, what kinds of problems it solves, how it fits into your current application architecture, how to get started...and more!
Tags : enterprise, applications, hyper-converged, infrastructure
     Lenovo and Intel®
Start   Previous    140 141 142 143 144 145 146 147 148 149 150 151 152 153 154    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics