Emerging Technologies  >  

Neural Network Applications

RSS Feed    Add to Google    Add to My Yahoo!
Neural Network Applications Multimedia (View All Report Types)
 
Best Practices for Private Cloud Migration: Reduce Storage Migration Risks
sponsored by Virtual Instruments
WEBCAST: The private cloud offers fast service on demand at a lower cost. So why are many organizations slow to adopt this technology? Many organizations find the challenge and groundwork necessary to move to the cloud daunting. This webcast can help.
Posted: 02 Jun 2011 | Premiered: Jun 2, 2011

Virtual Instruments

App Delivery Controllers: Consistent Management for both Traditional and Microservices Apps
sponsored by Citrix
VIDEO: As DevOps and microservices speed up development and innovation, your network needs to be able to keep up while still delivering services for your traditional apps and systems. Watch this brief video to learn how to bridge this gap with app delivery controllers (ADCs) to provide consistent management capabilities.
Posted: 17 Feb 2017 | Premiered: 10 Feb 2017

Citrix

Guarantee Microsoft Office 365 End-user Experience
sponsored by InfoVista Corporation
VIDEO: In this video, discover how an Application Aware SD-WAN can protect Office 365, other business applications and real time flows against chatty, bandwidth hungry and recreational applications.
Posted: 12 Jan 2017 | Premiered: 30 Sep 2016

InfoVista Corporation

Increase Visibility into Citrix NetScaler
sponsored by Citrix Ready
WEBCAST: Watch this webinar to uncover the best practices for monitoring Citrix NetScaler in business critical high throughput environments.
Posted: 09 Dec 2016 | Premiered: Dec 14, 2016, 09:00 EST (14:00 GMT)

Citrix Ready

SD-WAN: Building a Virtual WAN
sponsored by Silver Peak
WEBCAST: Access this short video to learn how a software-defined WAN can improve your ability to connect users to applications in a business driven by cloud and mobile technologies.
Posted: 07 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

High-Speed Network Transforms High-Tech Customer Experience
sponsored by InfoVista Corporation
VIDEO: In this video, learn how a leading electrical and telecommunications retailer was able to address its bandwidth issue by prioritizing app traffic in order to guarantee application performance.
Posted: 12 Jan 2017 | Premiered: 21 Mar 2016

InfoVista Corporation

Guarantee Application Performance with Dynamic Hybrid WAN
sponsored by InfoVista Corporation
VIDEO: In this video, learn how an application performance orchestration tool can help you fully realize the promise of your Hybrid WAN, by empowering your IT organization to dynamically orchestrate all links – MPLS and direct Internet – from a single, "all-in-one" solution.
Posted: 11 Jan 2017 | Premiered: 30 Sep 2016

InfoVista Corporation

Delivering Virtual Apps to Any Mobile Workspace
sponsored by Citrix
VIDEO: Learn how to deliver secure virtual applications and data to any corporate or personal device in your organization. Tune into this brief video to transform your employees' mobile workspaces to promote better productivity, and foster a new level of collaboration among your mobile and remote workers.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Hybrid Cloud Networking Enables Scalable Global Connectivity
sponsored by MASERGY
WEBCAST: Discover how to optimize your organization's global connectivity and agility by formulating an automated, hybrid networking strategy, with features such as: easy-to-integrate virtual network environments, real-time forensic visibility into network and application performance, and more.
Posted: 17 Mar 2016 | Premiered: Mar 17, 2016

MASERGY

Network Security Monitoring
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom discusses how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.
Posted: 17 Jun 2013 | Premiered: 01 Apr 2016

SearchNetworking.com

Implementing App Security Efficacy and Centralized, Intelligent Threat Management
sponsored by Citrix
VIDEO: This brief video explores how to implement app security efficacy for centralized threat management both on-premise and in the cloud. Discover how to leverage a web app firewall, defend against threats on the app, infrastructure, and network levels, create stronger identity and access management, and enable real-time threat analytics.
Posted: 17 Feb 2017 | Premiered: 10 Feb 2017

Citrix

Increase Visibility into Citrix NetScaler
sponsored by Citrix Ready
PODCAST: Listen to this podcast to uncover the best practices for monitoring Citrix NetScaler in business critical high throughput environments.
Posted: 10 Jan 2017 | Premiered: Dec 28, 2016

Citrix Ready

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

Network Management
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: Application performance is vital to todays distributed network, but determining the root cause of any performance issue requires immediate and pervasive visibility into all segments of the network. Learn how to use the new generation of tools and applications to help avoid performance and network problems.
Posted: 17 Apr 2014 | Premiered: 24 Aug 2016

SearchNetworking.com

ERP for Enterprise Project Management (EPM)
sponsored by IFS
WEBCAST: This webcast investigates how enterprise resource planning (ERP) supports project-based business models, and explores the need for integration between ERP systems and project management software.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

IFS

Performance Matters: SD-WAN Improves Speed and Reliability
sponsored by Silver Peak
VIDEO: The internet is an incredibly fast way to conduct a great deal of business, but some data needs extra protection. Harness the speeds of the internet for connecting to applications, while remaining secure in the knowledge that your data is safe.
Posted: 22 Jun 2016 | Premiered: 22 Jun 2016

Silver Peak

Ransomware, Phishing and APTs: What Can be Done
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

How Multi-Vendor DNS Can Protect Your Internet Presence
sponsored by Dyn
WEBCAST: In 2016, the DDoS attack on Dyn shined a light on the inherent vulnerabilities within the internet that were never in the forefront for many IT teams, until now. Access this webinar to learn from Dyn's vulnerabilities and the value of a secondary, multi-vendor DNS strategy for resilience within your infrastructure.
Posted: 07 Dec 2016 | Premiered: Oct 26, 2016

Dyn

Mobility Management Made Simple With IBM MaaS360
sponsored by IBM
VIDEO: In this webcast learn about a program that enables simple and intuitive application management while keeping mission-critical information safe without slowing down mobile development. Discover a software that allows for single-sign on, separates data for business security, and end-user peace of mind, and more.
Posted: 24 Oct 2016 | Premiered: 27 Apr 2016

IBM

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

Cybersecurity Essentials for 2017
sponsored by Neustar
VIDEO: In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine essential cybersecurity trends and highlight key tactics to better prepare you for what the coming year may bring.
Posted: 30 Jan 2017 | Premiered: 25 Jan 2017

Neustar

Ensure Business Continuity With Zero Touch Auto-Failover and Recovery
sponsored by DataCore Software Corporation
WEBCAST: In this webcast, learn about a high-availability storage solution that writes and mirrors data information onto 2 separate virtualization nodes simultaneously. Access now to see how 71% of surveyed IT organizations reduced their storage-related downtime by 75%.
Posted: 04 Aug 2016 | Premiered: Aug 4, 2016

DataCore Software Corporation

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

Respond to Threats Faster and More Effectively Than Ever
sponsored by ServiceNow
WEBCAST: Learn how to respond faster than ever to threats by collecting data from your security tools and automating processes, sorting each risk by severity and how much damage they could do to your organization.
Posted: 30 Jan 2017 | Premiered: Jan 30, 2017

ServiceNow
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement