Emerging Technologies  >  

Neural Network Applications

RSS Feed    Add to Google    Add to My Yahoo!
Neural Network Applications Multimedia (View All Report Types)
 
Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.
Posted: 21 Apr 2015 | Premieres: 27 Apr 2015

SearchSecurity.com

Best Practices for Private Cloud Migration: Reduce Storage Migration Risks
sponsored by Virtual Instruments
WEBCAST: The private cloud offers fast service on demand at a lower cost. So why are many organizations slow to adopt this technology? Many organizations find the challenge and groundwork necessary to move to the cloud daunting. This webcast can help.
Posted: 02 Jun 2011 | Premiered: Jun 2, 2011

Virtual Instruments

Manage Your Applications in a Software Defined World
sponsored by Citrix
WEBCAST: Watch this on-demand joint webinar with Firefly to learn how to easily move from ACE to NetScaler and how this leads to a fully virtualized network integrating with Nexus switches today, and a software defined application infrastructure with Cisco ACI.
Posted: 26 Mar 2015 | Premiered: Dec 11, 2014

Citrix

An Innovative New Approach to Network Automation
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: Access this webcast now to discover how a new open-source SDN infrastructure allows you to automate and standardize your network infrastructure without sacrificing the features you've come to love.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2014

Cisco Systems, Inc and Citrix

How-To Video: Creating Web Security Manager for Azure
sponsored by Alert Logic
VIDEO: This brief video analyzes the problem and discusses how you can implements a better web application firewall that will catch even the most advanced threats.
Posted: 20 Mar 2015 | Premiered: 22 Jul 2014

Alert Logic

Beating Back Malicious Mobile Apps 101
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

SearchSecurity.com

Discover the Power of Cisco ACI at Qatar University
sponsored by Cisco Systems, Inc.
VIDEO: In this video, learn how Qatar University is improving service delivery times across their network and in the cloud for a rapidly growing student population, with assistance from Cisco's ACI.
Posted: 03 Apr 2015 | Premiered: 26 Jan 2015

Cisco Systems, Inc.

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

5 Best Practices to Reduce Incident Response Time
sponsored by Great Bay
WEBCAST: Join security guru Ty Powers as he explains the 5 best practices for reducing incident response (IR) time.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

Great Bay

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Take Control of Your Applications With SDN
sponsored by Citrix
VIDEO: Learn more about Software Defined Networks and how NetScaler provides orchestration and management to your applications.
Posted: 25 Mar 2015 | Premiered: 28 Jan 2014

Citrix

Building the Right Switching Architecture for New Business-Critical Applications
sponsored by Juniper Networks, Inc.
WEBCAST: Watch this webcast to discover how you can simplify your network for an architecture that supports today's IT landscape.
Posted: 26 Mar 2015 | Premiered: Dec 31, 2014

Juniper Networks, Inc.

How to Boost Performance and Reliability of Virtualized Environments
sponsored by Dell, Inc. and Intel®
VIDEO: Watch this brief video to learn how a portfolio of next-generation servers can deliver the performance, scalability, and reliability your virtualized environments need to truly excel.
Posted: 22 Sep 2014 | Premiered: 19 Sep 2014

Dell, Inc. and Intel®

Advancing Virtualization on Next-Gen Servers
sponsored by Dell, Inc. and Intel®
WEBCAST: Watch this brief video to learn how a portfolio of next-generation servers can deliver the performance, scalability, and reliability your virtualized environments need to truly excel.
Posted: 09 Oct 2014 | Premiered: Sep 19, 2014

Dell, Inc. and Intel®

Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013

SearchSecurity.com

Network Evolution University: Cloud Networking - Designing the Hybrid Cloud
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it.
Posted: 20 May 2013 | Premiered: 22 May 2013

SearchNetworking.com

What is NetScaler?
sponsored by Citrix
VIDEO: Learn how Citrix NetScaler - the world's most advanced application delivery controller - can optimize, secure and control the delivery of all enterprise and cloud services while improving the end user experience.
Posted: 25 Mar 2015 | Premiered: 23 Feb 2015

Citrix

Anamoly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WEBCAST: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Premiered: Jan 24, 2015

Prelert

Case Study: A New Approach to Network Monioring and Security
sponsored by Gigamon
VIDEO: This case study introduces a new approach used by the University of Glasgow to improve network visibility and security wihout adding on appliances. View now to learn how to detect and remedy infected endpoints before disaster occurs and if this strategy if right for your organization.
Posted: 13 Apr 2015 | Premiered: 25 Feb 2015

Gigamon

Security University - Advanced Endpoint Threat Defense Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will take you through all those considerations, including device and application control, antimalware considerations, data protection and integration with network monitoring, SIM and log management solutions.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013

SearchSecurity.com

ERP for Enterprise Project Management (EPM)
sponsored by IFS
WEBCAST: This webcast investigates how enterprise resource planning (ERP) supports project-based business models, and explores the need for integration between ERP systems and project management software.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

IFS

Infrastructure Agility: How Retailer Achieves Online Excellence
sponsored by Red Hat
VIDEO: Watch this brief video to find out what system Woolworths implemented to address their needs, and what benefits they are experience. Inside you will see how the enterprise is now dramatically reducing the amount of time it would take to build a new server and respond to requirements.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

Red Hat

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by White Hat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Securing Data After a Hack
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how one company learned from a past security breach and now is focusing more time and money towards system security.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Limited

SQL Server on Pure Storage
sponsored by Pure Storage
VIDEO: Join us to hear how Pure Storage is taking the complexity out of SQL storage architecture. Learn how Pure Storage customers have leveraged the power of flash to get the best out of their SQL investment.
Posted: 23 Jun 2014 | Premiered: 23 Jun 2014

Pure Storage
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement