fiction

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
Published By: Abacus Labs     Published Date: Jan 11, 2019
Artificial intelligence is no longer the stuff of science fiction. Led by advances being made in academia and Silicon Valley, computing power is growing at an unprecedented and accelerating rate. As AI becomes more prevalent in finance software, the question facing you, the finance leader, isn’t whether it will change your job, but how to prepare for its arrival. This paper is a primer designed to help you develop an AI strategy for your finance team. You’ll understand key concepts about this revolutionary technology, including how it works, why finance specifically stands to benefit, and how to apply AI in a way that returns the most value to your team.
Tags : 
    
Abacus Labs
Published By: Altiscale     Published Date: Aug 25, 2015
Hype abounds about Big Data. And it's hard to know how to effectively exploit its potential. Learn how to separate fact from fiction in this new webinar + research note titled "Amazon EMR is Easy and 7 Other Myths." If you're considering launching a new Big Data initiative, or if you are currently struggling with Amazon EMR, view this 30 minute on-demand webinar + research note and dispel the most common untruths about Amazon EMR, as determined by leading Hadoop experts. Specifically, you'll learn: • The differences between Hadoop-as-a-Service and Amazon EMR • Why Hadoop on Amazon is not elastic • Why EMR is not a "plug-n-play" application • How costs get out of control with Amazon EMR
Tags : 
amazon emr, big data, haddop
    
Altiscale
Published By: AppDynamics     Published Date: Sep 21, 2017
Technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Nov 02, 2017
Technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: BMC Software     Published Date: Aug 12, 2013
If you’re not excited about where technology is going in the next five to ten years, you may not be reading enough science fiction. Cloud computing makes feasible some things that have never existed before. Some of these things will be delightful; others may be too invasive. From smart glasses to citizen science — the next 10 years will be all about cloud computing. Get five key takeaways about the future of cloud operations.
Tags : 
cloud, bmc, cloud computing, best practices, business intelligence, infrastructure
    
BMC Software
Published By: Cloudroute     Published Date: Jun 01, 2016
Most companies are have decided they need the business agility and the cost savings that come when moving to the cloud with nearly 90 percent of businesses having adopted the cloud in some capacity. But with the bewildering amount of contradictory opinions and information floating around on the Internet, not many understand exactly what that means or what it entails. Companies considering Microsoft Office 365 as their first step in moving applications to hosted solutions face similar inconsistencies, making it difficult to separate fact from fiction. For example, some businesses incorrectly believe Office 365 is simply a version of Office accessed by a browser. Astonishing right!
Tags : 
    
Cloudroute
Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud, networking, security
    
Cyveillance
Published By: Emmi Solutions     Published Date: Sep 12, 2013
You are accountable for results. Your engagement partner should be too. Proof over promises: Total engagement can deliver proven clinical and fiscal success. Read this paper to learn how 8 elements can create total patient engagement that pays off.
Tags : 
experience, engagement, compliance, patient activation, activation, patient satisfaction, population health, outcomes, clinical outcomes, financial outcomes, accountable care, empower, aco, medical home, triple aim
    
Emmi Solutions
Published By: Esker     Published Date: Jun 29, 2017
When folks in AR hear the word automation, it doesn't necessarily bring to mind the most positive, reassuring thoughts. Change is never a seamless process but distinguishing fact from fiction can go a long way. Every AR department has the same goals - reduce operating costs, collect payments faster and strengthen their relationships with customers - AR automation is simply a tool to help accomplish them. Learn why AR automation shouldn't be scary and why it matters more than ever in this insightful white paper.
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: Five9     Published Date: Aug 22, 2019
Are you interested in how artificial intelligence (AI) might impact your contact center? The hype cycle for AI is nearing its peak. But before you rush to deploy an AI tool, let’s separate fact from fiction. What are the practical benefits of AI today? What kind of challenges arise from automation? What are the underlying technologies at play? In this e-book, we will answer these questions and more. We will examine AI from a pragmatic lens and offer suggestions to minimize costs and maximize returns.
Tags : 
    
Five9
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: HP - Intel®     Published Date: Oct 19, 2012
Many admit to being confused by the hype and haze surrounding cloud computing. This white paper aspires to separate fact from fiction, reality from myth, and, in doing so, aid senior IT executives as they make decisions around cloud computing.
Tags : 
virtualization, cloud computing, infrastructure
    
HP - Intel®
Published By: HP and Intel®     Published Date: Nov 15, 2012
This white paper separates fact from fiction, reality from myth, and, in doing so, will aide senior IT executives as they make decisions around cloud computing.
Tags : 
myths, five myths, cloud computing, it architecture, it infrastructure, it management
    
HP and Intel®
Published By: HP and Intel® Xeon® processors     Published Date: Nov 21, 2011
This white paper separates fact from fiction, reality from myth, and, in doing so, will aide senior IT executives as they make decisions around cloud computing.
Tags : 
cloud, cloud computing, myths, infrastructure, services, it executives, data, intel, hybrid cloud, internetworking hardware, interoperability, network architecture, network management, network performance, network performance management, network provisioning, data center design and management, virtualization, design and facilities
    
HP and Intel® Xeon® processors
Published By: IBM     Published Date: Jul 07, 2014
This demo is from the IBM Connect 2014 Opening General Session. It highlights how a fictional company, Greenwell Financial, used IBM's Digital Experience platform to create market-leading customer experiences. The demo highlights new features coming in the platform, such as renditions, plus new integrations, such as with Brightcove, IBM Interact, and IBM Tealeaf.
Tags : 
ibm, connect, digital, customer lifecycle, management
    
IBM
Published By: Imprivata     Published Date: Sep 17, 2007
Single Sign-On technology has been around for many years. Although skepticism and risk worries were associated with the service, SSO has gone through technological changes. Through these changes it has become an ROI Solution for many corporations. Learn and explore first hand through five different companies how SSO has helped achieve their goals.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, authentication, imprivata
    
Imprivata
Published By: InsideUpbg     Published Date: May 12, 2015
Recruiting the right individuals is essential to a company’s success. It can be challenging, however, to work employment verification into an already full schedule when hiring new employees. That is why applicant tracking and employment verification services have become a must-have for any company with an ongoing need for qualified employees. These services are now widely used to help businesses ensure they are hiring the right person for the job.
Tags : 
    
InsideUpbg
Published By: Intel     Published Date: Apr 16, 2012
This white paper separates fact from fiction to help senior IT executives make decisions around cloud computing - dispelling myths and answering the tough questions; including how to simplify adopting and securing a private or hybrid cloud.
Tags : 
cloud, cloud computing, myths, infrastructure, services, it executives, data, intel, hybrid cloud, storage, interoperability, content management, virtualization, design and facilities
    
Intel
Published By: Kaspersky     Published Date: Jul 22, 2016
Learn how you can maximize the performance and security of your virtualized machines.
Tags : 
kaspersky, virtual security, virtual environment, data breach, data protection, network security, email security, intrusion prevention, wireless security, server virtualization
    
Kaspersky
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.