intel

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: Dell     Published Date: Apr 13, 2017
Accelerate your applications and your IT roadmap with the speed, efficiency and affordability of All-Flash solutions from Dell EMC and Intel®. Meet the complete portfolio of All-Flash arrays and see why Dell EMC is the #1 All-Flash leader.
Tags : 
it transformation, all-flash, flash, flash storage, dell, dell emc, applications, application management
    
Dell
Published By: Dell     Published Date: Apr 13, 2017
Accélérez vos applications et votre calendrier de lancement en misant sur la rapidité, l’efficacité et la rentabilité offertes par les solutions 100 % Flash de Dell EMC et Intel®. Explorez notre portefeuille complet de baies 100 % Flash, et découvrez pourquoi Dell EMC est le leader du 100 % Flash
Tags : 
it transformation, all-flash, flash, flash storage, dell, dell emc, applications, application management
    
Dell
Published By: Dell     Published Date: Apr 13, 2017
Accelera applicazioni e piano di produzione dell'IT con la velocità, l'efficienza e la convenienza delle soluzioni completamente flash di Dell EMC e Intel®. Esamina la linea di array completamente flash e scopri perché Dell EMC è leader nelle soluzioni completamente flash.
Tags : 
it transformation, all-flash, flash, flash storage, dell, dell emc, applications, application management
    
Dell
Published By: Akamai     Published Date: Mar 08, 2017
This solution needs to reach audiences reliably wherever they are, scale as fast as they grow, and adjust intelligently to dynamic network environments for the highest viewing quality possible. Missteps in online video strategy can have a long-lasting effect on audience perceptions, not only of the video experience – but also on the brand being represented.
Tags : 
video, online video strategy, video experience, engagement, customer engagement, online audience
    
Akamai
Published By: Oracle (Hospitality)     Published Date: Apr 13, 2017
For hospitality leaders, anticipating consumer trends and seeking innovations that enhance guest experiences are vital exercises that need to be practiced diligently. Now, more than ever – with the coming wave of disruptive technologies – taking these steps helps ensure success tomorrow.
Tags : 
hospitality, artificial intelligence, facial recognition, customer experience, restaurants, 3d printing
    
Oracle (Hospitality)
Published By: Infor     Published Date: Mar 07, 2017
El objetivo de las operaciones de un almacén es dar una respuesta perfecta los pedidos: entregar exactamente lo que un cliente pide, a tiempo y con una eficiencia óptima. El módulo de almacenes de una solución de planificación de recursos empresariales (ERP – Enterprise Resources Management) puede ayudar a los almacenes más pequeños. Pero los módulos de gestión de almacenes de los ERP tienen limitaciones y, en el caso de empresas con operaciones más complejas, puede ser más inteligente optar por las capacidades adicionales de un sistema de gestión de almacenes avanzado (WMS, Warehouse Management System).
Tags : 
    
Infor
Published By: Infor     Published Date: Mar 07, 2017
Heutzutage sind die Zeitschriften voll mit Geschichten über geschäftliche Erfolge, die Business Intelligence (BI) ermöglicht hat. Die gute Nachricht ist: Sie können diesem Hype vertrauen.
Tags : 
    
Infor
Published By: Fugue     Published Date: Mar 27, 2017
This paper details that approach to cloud's complex challenges and how an extensible, infrastructure-level cloud operating system like Fugue fits the bill to realize success.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration
    
Fugue
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: Datastax     Published Date: Apr 04, 2017
Today’s customers expect a seamless, intelligent and personalized experience that operates at the speed of the cloud and is continuously available regardless of location or platform. To deliver an optimal customer experience that will enable you to stay ahead of competitors you need a distributed, responsive and intelligent architecture which is only possible when the right database is in place. Read this eBook to learn how your database technology decisions can affect your ability to deliver either a transformational customer experience or a lackluster, dissatisfying encounter that benefits your competitors, not your bottom line.
Tags : 
    
Datastax
Published By: Epicor Software Corporation     Published Date: Apr 07, 2017
Download Epicor BisTrack News and find out how you can best position your distribution company for profitable growth.
Tags : 
erp, erp system, enterprise resource planning, business system, epicor bistrack, distribution software, business intelligence, builders merchants
    
Epicor Software Corporation
Published By: Adobe     Published Date: Mar 08, 2017
This report, based on a survey of more than 2,000 digital marketers and ecommerce professionals in Asia Pacific, Europe and the US, explores the extent to which organisations are stepping up to the customer-centric approach.
Tags : 
adobe, survey, omnichannel, customer experience, customer experience management, customer-centric approach, marketing
    
Adobe
Published By: SAP     Published Date: Feb 05, 2011
Learn how best-in-class companies access information faster to improve key business performance metrics.
Tags : 
business performance, sap, real time analytics, business intelligence, analytics, business analytics, business process management, analytical applications
    
SAP
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : 
asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence, application integration, application performance management
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 29, 2010
The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.
Tags : 
asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi
    
ASG Software Solutions
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
Adlib Software
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : 
pinkslipbot, malware protection, malware, technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The OpenDXL initiative puts the power of integration and automation in the hands of security analysts by providing open source tools, expertise, and a supportive community.
Tags : 
opendxl, data exchange, open source, threat feed, threat intelligence, ioc, advanced threats, sandbox
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The concept of SIEM orchestration provides immediate, automated responses. It is the only way for a modern enterprise to protect against advanced attacks.
Tags : 
secops, siem, soc, orchestration, threat intelligence, epo, automation, process integration
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics from diagnostic and descriptive to prescriptive and proactive, leading to faster and more accurate detection.
Tags : 
machine learning, advanced analytics, advanced threats, sandbox, zero-day, malware, mcafee labs, dynamic endpoint
    
McAfee
Published By: McAfee     Published Date: Apr 06, 2017
Kirk Davis, Information Security Director, Vidant Health, says that the integration of McAfee threat management products allows his business to protect and remediate against threats while focusing on the business.
Tags : 
siem, secops, security operations, advanced threats, threat intelligence
    
McAfee
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.