mac os

Results 351 - 375 of 460Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Aug 15, 2017
Schneider Electric is integrating datacenter infrastructure management (DCIM) software, big-data analytics and cloud services into the management of customers’ datacenters. Its recently launched StruxureOn cloud offering signals a new wave in datacenter operations, using a combination of machine learning, anomaly detection and event-stream playback to give operators real-time insights and alarming via their smartphones. More capabilities and features are planned, including predictive analysis and, eventually, automated action. Schneider’s long-term strategy is to build a partner ecosystem around StruxureOn, and provide digital services that span its traditional datacenter business.
Tags : 
incident tracking, historical trending, troubleshooting, operational analysis, prediction model, schneider equipment, maintenance, firmware updates
    
Schneider Electric
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence (AI) is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today. Learn more about AI in this eBook.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The concept of artificial intelligence (AI) has been with us since the term was coined for the Dartmouth Summer Research Project on Artificial Intelligence in 1956. Today, while general AI strives for full cognitive abilities, there is a narrower scope—this better-defined AI is the domain of machine learning (ML) and other algorithm-driven solutions where cybersecurity has embraced AI. SANS recently conducted a survey of professionals working or active in cybersecurity, and involved with or interested in the use of AI for improving the security posture of their organization. Read their report to learn their survey findings, conclusions, and recommended considerations.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail
    
Lane Telecommunications
Published By: SAS     Published Date: Jun 06, 2018
A multitude of “things” generate floods of big data – cars, wearables, machines and appliances. Wouldn’t you like to sift through that noise and become an organization that relies on data to make fact-based decisions? Learn about the three foundations of becoming data-driven – data management, analytics and visualization – and how they can increase profitability, boost performance, raise market share and improve operations. Read about hurdles to becoming a data-driven organization and learn best practices from others. Then get a glimpse of what the future holds with the Internet of Things (IoT), edge analytics, artificial intelligence (AI) and other technology innovations.
Tags : 
    
SAS
Published By: Iron Mountain     Published Date: Jun 04, 2015
Este concepto proporciona una estrategia completa y de colaboración para ayudar a las empresas a optimizar el valor de la información y limitar el riesgo en todas las fases, desde la creación inicial de los documentos e información hasta su fin de vida y destrucción segura.
Tags : 
business integration, collaboration, content delivery, document management, records management
    
Iron Mountain
Published By: SPSS Inc.     Published Date: Mar 31, 2009
In an intensely competitive marketplace, knowledge is power. The more an airline can learn about what its customers like and don't like about its offerings, the more effective it can be at building customer loyalty and maximizing its revenues.
Tags : 
spss, american airlines, customer loyalty, maximize revenues, roi, specialized market intelligence, production of information, increased productivity
    
SPSS Inc.
Published By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS Inc.
Published By: Plex Systems     Published Date: Feb 21, 2014
Tying machines on the plant floor to management on the top floor for a real-time glimpse of manufacturing status isn’t just convenient, it’s critical for a company seeking to remain viable in a competitive market. PLEX decreases costs while enabling business growth without additional resources.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity
    
Plex Systems
Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard
Published By: Dell     Published Date: Aug 16, 2013
"The number of vCPUs should be one of your most important considerations when sizing virtual machines. But getting the right balance — neither over-allocating nor under-allocating — is a challenge. You’ll need to select the number of vCPUs, the size of the virtual disk, the number of vNICs and the amount of memory. With all those variables, a little guidance is in order. Read the White Paper "
Tags : 
vcpu, sizing, vnics, virtual disk, memory, storage virtualization, application integration, windows
    
Dell
Published By: IBM MaaS360     Published Date: Jul 09, 2015
iOS: The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : 
ios 8, apple, macintosh, security, information sharing, business process readiness, networking, software development
    
IBM MaaS360
Published By: IBM     Published Date: Oct 18, 2016
The worldwide growth rate of digital data is staggering. If you're a CIO or a data center administrator, data growth statistics aren't just big numbers, they are a big problem -- for your company. Email messages, social media and blog posts, text and instant messages, photos, video and audio, machine-generated data, and transactional detail are on track to overwhelm your storage capacity. Read this paper for practical advice and smarter solutions for managing the information in your organization and getting back to a position of mastery over your data. Get this valuable resource now.
Tags : 
ibm, analytics, big data, information governance, ecm, information lifecycle governance, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Aug 01, 2018
Your customers aren't the only ones who can benefit from advancing artificial intelligence (AI) support — your employees can, too. Chatbots help employees who service customers, and you can build them with mature AI components. But success requires a focus on tasks rather than job replacement as well as a cyborg-like division between human and machine tasks. This report helps infrastructure and operations (I&O) pros determine which tasks are best executed by people and which are best left to machines, with use cases describing how that looks.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 07, 2017
Data science platforms are engines for creating machine-learning solutions. Innovation in this market focuses on cloud, Apache Spark, automation, collaboration and artificial-intelligence capabilities. We evaluate 16 vendors to help you make the best choice for your organization. This Magic Quadrant evaluates vendors of data science platforms. These are products that organizations use to build machine-learning solutions themselves, as opposed to outsourcing their creation or buying ready-made solutions.
Tags : 
data analytics, product refinement, business exploration, advanced prototyping, analytics, data preparation, customer support, sales relations
    
IBM
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: SonicWall     Published Date: Sep 10, 2009
Hear real-world examples of how companies like yours consolidated their security to lower their total cost of ownership, optimized existing resources, increased their security and dramatically improved productivity!
Tags : 
sonicwall, free pcmagcast webinar, unified threat management, a different, efficient, costly bandwith, consolidating multiple solutions, run bandwidth on your web 2.0 apps
    
SonicWall
Published By: SAS     Published Date: Oct 03, 2018
Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining what’s possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to: • Protect from reputational, regulatory and financial risks. • Reduce the cost of fraud and financial crimes prevention. • Gain a holistic view of risk across functions. • Include cyber events in regulatory report filings. In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.
Tags : 
    
SAS
Published By: AppSense     Published Date: Nov 26, 2012
Download this case study to learn how Chandler Macleod's CIO was able to utilize the AppSense solution to remove the possibility of any users introducing an executable file to their network while reducing the number of their servers by 25%.
Tags : 
appsense, license compliance, security, application licensing, application security, reduce servers, application management, server hardware
    
AppSense
Published By: IBM     Published Date: Oct 10, 2013
With IBM Network Connectivity Managed Services, you can control costs, improve performance and streamline operations with feature-rich services that are designed to help build and proactively manage your enterprise WAN.
Tags : 
ibm, network connectivity, managed services, manage connectivity, improve performaces, reduce business costs, streamline operations, proactively manage
    
IBM
Published By: IBM     Published Date: Feb 14, 2014
People, machines, data, processes are more connected than ever before, in more ways, and at a pace not previously envisioned. Because of this, the means of user interaction are evolving rapidly, and the outcome is an explosion of information increasing at epic rates. Both the opportunity and the challenge for an organization is to execute a strategy to most effectively participate in, exploit and derive ongoing value from the expansive digital world. To evaluate and ultimately better facilitate this, many organizations are specifically defining a digital strategy as part of their overall general business strategy. Central to that digital strategy is the digital experience.
Tags : 
ibm, social media, marketing, crm, customer interaction, digital marketing, digital strategy, customer experience
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.