Emerging Technologies  >  

Neural Network Applications

RSS Feed    Add to Google    Add to My Yahoo!
Neural Network Applications Multimedia (View All Report Types)
 
Best Practices for Private Cloud Migration: Reduce Storage Migration Risks
sponsored by Virtual Instruments
WEBCAST: The private cloud offers fast service on demand at a lower cost. So why are many organizations slow to adopt this technology? Many organizations find the challenge and groundwork necessary to move to the cloud daunting. This webcast can help.
Posted: 02 Jun 2011 | Premiered: Jun 2, 2011

Virtual Instruments

How to Facilitate a Successful Transition to Office 365: A Brief Video
sponsored by Riverbed Technology, Inc.
VIDEO: Discover a tool that will identify and mitigate hidden network constraints to ensure a smooth transition to O365. Here, learn how to analyze your network requirements with dependency mapping, capacity planning, and SLA analyses to ensure the best performance for all O365 end users.
Posted: 28 Nov 2016 | Premiered: 16 Sep 2016

Riverbed Technology, Inc.

Global Healthcare Company Improves Prescription Processing with APM Platform
sponsored by CA Technologies
WEBCAST: Being able to rapidly detect application issues is essential to quality application deployment. Watch this video that details how a global healthcare company was able to find application issues in virtually real time, by employing an advanced APM platform.
Posted: 29 Aug 2016 | Premiered: Apr 14, 2016

CA Technologies

Measuring Web App Performance Into and Across Cloud Providers
sponsored by AppNeta
WEBCAST: End user experience is what drives business. To ensure the best possible experience, IT teams need the ability to monitor off-premise apps and services. This webcast teaches you which metrics require attention in measuring app performance, why slow response times are as problematic as downtime, and more.
Posted: 16 Sep 2016 | Premiered: Jul 14, 2016

AppNeta

Customer Story: Implementing Mobility in the Workplace
sponsored by Citrix
VIDEO: Learn how one of the largest healthcare systems in the United States implemented an efficient, secure mobile strategy and increased collaboration. Discover how you can provide your employees the flexibility of working outside of their offices and increase productivity.
Posted: 13 May 2016 | Premiered: 08 Oct 2013

Citrix

Beating Back Malicious Mobile Apps
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

IBM

RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO: Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016

Check Point Software Technologies Ltd.

Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Extending the Value of Mobile Java Apps
sponsored by IBM
WEBCAST: In the age of mobile development, you may want to revisit your strategy for Java and JEE systems. Watch this webinar to get tips on how to implement microservices and APIs, improve user experience, and more. You'll also learn how to improve app integration and leverage cloud-based mobile backend as a service.
Posted: 03 Aug 2016 | Premiered: Aug 3, 2016

IBM

EMC DSSD Rack-Scale Flash Overview
sponsored by Dell EMC
VIDEO: Next-gen applications that take advantage of today's data growth are often too intensive for existing storage architectures. This video details a new storage platform that overcomes the limitations of direct-attached PCIe flash and all flash arrays by connecting ultra-fast, shared flash to rack-servers using the lowest latency protocols.
Posted: 21 Sep 2016 | Premiered: 29 Feb 2016

Dell EMC

Network Security Monitoring
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom discusses how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.
Posted: 17 Jun 2013 | Premiered: 01 Apr 2016

SearchNetworking.com

Hybrid Cloud Networking Enables Scalable Global Connectivity
sponsored by MASERGY
WEBCAST: Discover how to optimize your organization's global connectivity and agility by formulating an automated, hybrid networking strategy, with features such as: easy-to-integrate virtual network environments, real-time forensic visibility into network and application performance, and more.
Posted: 17 Mar 2016 | Premiered: Mar 17, 2016

MASERGY

Advanced Threat Protection: Why an Integrated Approach is Your Game Changer
sponsored by Fortinet, Inc.
WEBCAST: Explore a tri-layered security approach that integrates sandboxing with more traditional technologies to thwart hidden threats. Access this brief webcast to learn how to effectively use sandboxing technology in your network security strategy.
Posted: 05 Jun 2015 | Premiered: May 20, 2015

Fortinet, Inc.

DSSD D5 Overview: What Is The World's Fastest Storage Platform and Why Do You Need It?
sponsored by Dell EMC
WEBCAST: Are your mission-critical applications performing the way you want? Attend this webinar to find out how DSSD D5 can provide the storage performance demanded by tomorrow's mission-critical workloads, whether they are running on a traditional database infrastructure, leveraging Hadoop, or running a BI app.
Posted: 12 Sep 2016 | Premiered: Jul 8, 2016

Dell EMC

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Network Management
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: Application performance is vital to todays distributed network, but determining the root cause of any performance issue requires immediate and pervasive visibility into all segments of the network. Learn how to use the new generation of tools and applications to help avoid performance and network problems.
Posted: 17 Apr 2014 | Premiered: 24 Aug 2016

SearchNetworking.com

Infrastructure Agility: How Retailer Achieves Online Excellence
sponsored by Red Hat
VIDEO: Watch this brief video to find out what system Woolworths implemented to address their needs, and what benefits they are experience. Inside you will see how the enterprise is now dramatically reducing the amount of time it would take to build a new server and respond to requirements.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

Red Hat

ERP for Enterprise Project Management (EPM)
sponsored by IFS
WEBCAST: This webcast investigates how enterprise resource planning (ERP) supports project-based business models, and explores the need for integration between ERP systems and project management software.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

IFS

Performance Matters: SD-WAN Improves Speed and Reliability
sponsored by Silver Peak
VIDEO: The internet is an incredibly fast way to conduct a great deal of business, but some data needs extra protection. Harness the speeds of the internet for connecting to applications, while remaining secure in the knowledge that your data is safe.
Posted: 22 Jun 2016 | Premiered: 22 Jun 2016

Silver Peak

Ransomware, Phishing and APTs: What Can be Done
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

What a Fraudulent Invoice Email Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Email security is integral to the smooth operation of pretty much any business. In this webcast, learn how to combat targeted attacks, spear-phishing, and disguised malicious emails dressed up to look and sound legitimate.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

What a Business Email Compromise Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Gain insight into how to avoid falling prey to these email scams and protect your enterprise's data. Discover not only the intricacies of these attacks, but how to ensure every member of your team is interacting with trusted email sources.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement