Emerging Technologies  >  

Neural Network Applications

RSS Feed    Add to Google    Add to My Yahoo!
Neural Network Applications Multimedia (View All Report Types)
 
Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Every day, hackers develop new strategies for infiltrating your network and stealing your sensitive data. This expert resource explores some of the most dangerous emerging threats and how you can defend against them.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

SearchSecurity.com

Best Practices for Private Cloud Migration: Reduce Storage Migration Risks
sponsored by Virtual Instruments
WEBCAST: The private cloud offers fast service on demand at a lower cost. So why are many organizations slow to adopt this technology? Many organizations find the challenge and groundwork necessary to move to the cloud daunting. This webcast can help.
Posted: 02 Jun 2011 | Premiered: Jun 2, 2011

Virtual Instruments

Global Healthcare Company Improves Prescription Processing with APM Platform
sponsored by CA Technologies
WEBCAST: Being able to rapidly detect application issues is essential to quality application deployment. Watch this video that details how a global healthcare company was able to find application issues in virtually real time, by employing an advanced APM platform.
Posted: 29 Aug 2016 | Premiered: Apr 14, 2016

CA Technologies

SD-WAN: Building a Virtual WAN
sponsored by Silver Peak
WEBCAST: Access this short video to learn how a software-defined WAN can improve your ability to connect users to applications in a business driven by cloud and mobile technologies.
Posted: 07 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Customer Story: Implementing Mobility in the Workplace
sponsored by Citrix
VIDEO: Learn how one of the largest healthcare systems in the United States implemented an efficient, secure mobile strategy and increased collaboration. Discover how you can provide your employees the flexibility of working outside of their offices and increase productivity.
Posted: 13 May 2016 | Premiered: 08 Oct 2013

Citrix

Beating Back Malicious Mobile Apps
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

IBM

All-Flash and Hybrid Flash Systems Simulator: An Overview
sponsored by EMC
VIDEO: Looking to seamlessly extend data storage to the cloud, streamline management, and speed deployment? In this brief video, tune in to access an all-flash simulator that will accelerate your application infrastructure.
Posted: 13 Jun 2016 | Premiered: 13 Jun 2016

EMC

Delivering Virtual Apps to Any Mobile Workspace
sponsored by Citrix
VIDEO: Learn how to deliver secure virtual applications and data to any corporate or personal device in your organization. Tune into this brief video to transform your employees' mobile workspaces to promote better productivity, and foster a new level of collaboration among your mobile and remote workers.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Datacenter Automation with Cisco ACI and Citrix NetScaler
sponsored by citrix and cisco
VIDEO: In this video, learn the 3 ways data centers are transforming to become application-centric, and how the technology that makes this possible can enable benefits such as: app and desktop virtualization, application delivery networking, enterprise mobility, and more.
Posted: 12 Jul 2016 | Premiered: 05 Jul 2016

citrix and cisco

The Cloud of Clouds: How to Take Advantage of a Cloud Services Integrator
sponsored by BT
VIDEO: 58% of large businesses cited cloud as driving profound change for their organizations, but are lingering doubts stopping you from joining the masses? Tune into this video to learn about a cloud services integrator that can connect you easily and securely to the applications and data you need—all on a global scale.
Posted: 02 Aug 2016 | Premiered: 10 May 2016

BT

Join the Citrix Ready Secure Remote Access Program
sponsored by Citrix Ready
WEBCAST: What is Citrix Ready Secure Remote Access Program? How does it help you showcase your products and solutions while highlighting the integration with Citrix products? This video explains this program, why you should join, and how you and your customers will benefit its implementation.
Posted: 03 Aug 2016 | Premiered: Aug 9, 2016

Citrix Ready

Extending the Value of Mobile Java Apps
sponsored by IBM
WEBCAST: In the age of mobile development, you may want to revisit your strategy for Java and JEE systems. Watch this webinar to get tips on how to implement microservices and APIs, improve user experience, and more. You'll also learn how to improve app integration and leverage cloud-based mobile backend as a service.
Posted: 03 Aug 2016 | Premiered: Aug 3, 2016

IBM

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Network Security Monitoring
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom discusses how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.
Posted: 17 Jun 2013 | Premiered: 01 Apr 2016

SearchNetworking.com

Hybrid Cloud Networking Enables Scalable Global Connectivity
sponsored by MASERGY
WEBCAST: Discover how to optimize your organization's global connectivity and agility by formulating an automated, hybrid networking strategy, with features such as: easy-to-integrate virtual network environments, real-time forensic visibility into network and application performance, and more.
Posted: 17 Mar 2016 | Premiered: Mar 17, 2016

MASERGY

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Infrastructure Agility: How Retailer Achieves Online Excellence
sponsored by Red Hat
VIDEO: Watch this brief video to find out what system Woolworths implemented to address their needs, and what benefits they are experience. Inside you will see how the enterprise is now dramatically reducing the amount of time it would take to build a new server and respond to requirements.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

Red Hat

Network Management
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: Application performance is vital to todays distributed network, but determining the root cause of any performance issue requires immediate and pervasive visibility into all segments of the network. Learn how to use the new generation of tools and applications to help avoid performance and network problems.
Posted: 17 Apr 2014 | Premiered: 24 Aug 2016

SearchNetworking.com

ERP for Enterprise Project Management (EPM)
sponsored by IFS
WEBCAST: This webcast investigates how enterprise resource planning (ERP) supports project-based business models, and explores the need for integration between ERP systems and project management software.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

IFS

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Why Next-Generation Firewalls and Sandboxes Are Not Enough
sponsored by OpenDNS
WEBCAST: In this webcast, learn the steps of the kill chain to better understand how to bolster your existing defenses against emerging and advanced threats.
Posted: 10 Feb 2016 | Premiered: Feb 18, 2015

OpenDNS

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Fast Track Your Office 365 Deployment and Beyond
sponsored by OneLogin
WEBCAST: Access this informative webinar, featuring EMM industry leader SOTI, to discover hidden Office 365 roadblocks and headaches, how to automate on-and off-boarding of users in real time to achieve both business agility and security, and how SOTI quickly deployed Office 365 and achieved ROI in just one week.
Posted: 26 Aug 2016 | Premiered: Jul 1, 2016

OneLogin

Driving Data Center Function to the Edge with IoT
sponsored by Red Hat
VIDEO: Intelligence from IoT data is driving new business models and apps, and IoT is changing not only app architectures but the data centers themselves. To find out more about the effects of IoT on everything from apps to data centers, watch this video that explores how to build secure, inter-operable, data-centric IoT platforms.
Posted: 12 Aug 2016 | Premiered: 23 Feb 2016

Red Hat

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement