Emerging Technologies  >  

Neural Network Applications

RSS Feed    Add to Google    Add to My Yahoo!
Neural Network Applications Multimedia (View All Report Types)
Best Practices for Private Cloud Migration: Reduce Storage Migration Risks
sponsored by Virtual Instruments
WEBCAST: The private cloud offers fast service on demand at a lower cost. So why are many organizations slow to adopt this technology? Many organizations find the challenge and groundwork necessary to move to the cloud daunting. This webcast can help.
Posted: 02 Jun 2011 | Premiered: Jun 2, 2011

Virtual Instruments

Global Healthcare Company Improves Prescription Processing with APM Platform
sponsored by CA Technologies
WEBCAST: Being able to rapidly detect application issues is essential to quality application deployment. Watch this video that details how a global healthcare company was able to find application issues in virtually real time, by employing an advanced APM platform.
Posted: 29 Aug 2016 | Premiered: Apr 14, 2016

CA Technologies

Measuring Web App Performance Into and Across Cloud Providers
sponsored by AppNeta
WEBCAST: End user experience is what drives business. To ensure the best possible experience, IT teams need the ability to monitor off-premise apps and services. This webcast teaches you which metrics require attention in measuring app performance, why slow response times are as problematic as downtime, and more.
Posted: 16 Sep 2016 | Premiered: Jul 14, 2016


SD-WAN: Building a Virtual WAN
sponsored by Silver Peak
WEBCAST: Access this short video to learn how a software-defined WAN can improve your ability to connect users to applications in a business driven by cloud and mobile technologies.
Posted: 07 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Customer Story: Implementing Mobility in the Workplace
sponsored by Citrix
VIDEO: Learn how one of the largest healthcare systems in the United States implemented an efficient, secure mobile strategy and increased collaboration. Discover how you can provide your employees the flexibility of working outside of their offices and increase productivity.
Posted: 13 May 2016 | Premiered: 08 Oct 2013


Beating Back Malicious Mobile Apps
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013


Leveraging Content PaaS to Build Better Apps
sponsored by Box
WEBCAST: Discover how to build better apps that ease secure content sharing within and outside of your enterprise. Tune in to overcome cumbersome content sharing, and discover how content Platform-as-a-Service can transform your organization—from outside users to IT.
Posted: 16 May 2016 | Premiered: May 16, 2016


All-Flash and Hybrid Flash Systems Simulator: An Overview
sponsored by Dell EMC
VIDEO: Looking to seamlessly extend data storage to the cloud, streamline management, and speed deployment? In this brief video, tune in to access an all-flash simulator that will accelerate your application infrastructure.
Posted: 13 Jun 2016 | Premiered: 13 Jun 2016

Dell EMC

Building Engaging Content Experiences: A CIO Webinar
sponsored by Box
WEBCAST: Discover in this webinar how to build engaging content experiences in your custom apps, as Mike Schwartz, Platform Product Marketing at Box, will help you reimagine your enterprise content sharing. Tune in now to learn about content PaaS, and boost user experience engagement while overcoming compliance obstacles.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016


Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

The Cloud of Clouds: How to Take Advantage of a Cloud Services Integrator
sponsored by BT
VIDEO: 58% of large businesses cited cloud as driving profound change for their organizations, but are lingering doubts stopping you from joining the masses? Tune into this video to learn about a cloud services integrator that can connect you easily and securely to the applications and data you need—all on a global scale.
Posted: 02 Aug 2016 | Premiered: 10 May 2016


Extending the Value of Mobile Java Apps
sponsored by IBM
WEBCAST: In the age of mobile development, you may want to revisit your strategy for Java and JEE systems. Watch this webinar to get tips on how to implement microservices and APIs, improve user experience, and more. You'll also learn how to improve app integration and leverage cloud-based mobile backend as a service.
Posted: 03 Aug 2016 | Premiered: Aug 3, 2016


Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013


EMC DSSD Rack-Scale Flash Overview
sponsored by Dell EMC
VIDEO: Next-gen applications that take advantage of today's data growth are often too intensive for existing storage architectures. This video details a new storage platform that overcomes the limitations of direct-attached PCIe flash and all flash arrays by connecting ultra-fast, shared flash to rack-servers using the lowest latency protocols.
Posted: 21 Sep 2016 | Premiered: 29 Feb 2016

Dell EMC

Network Security Monitoring
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom discusses how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.
Posted: 17 Jun 2013 | Premiered: 01 Apr 2016


Hybrid Cloud Networking Enables Scalable Global Connectivity
sponsored by MASERGY
WEBCAST: Discover how to optimize your organization's global connectivity and agility by formulating an automated, hybrid networking strategy, with features such as: easy-to-integrate virtual network environments, real-time forensic visibility into network and application performance, and more.
Posted: 17 Mar 2016 | Premiered: Mar 17, 2016


Advanced Threat Protection: Why an Integrated Approach is Your Game Changer
sponsored by Fortinet, Inc.
WEBCAST: Explore a tri-layered security approach that integrates sandboxing with more traditional technologies to thwart hidden threats. Access this brief webcast to learn how to effectively use sandboxing technology in your network security strategy.
Posted: 05 Jun 2015 | Premiered: May 20, 2015

Fortinet, Inc.

DSSD D5 Overview: What Is The World's Fastest Storage Platform and Why Do You Need It?
sponsored by Dell EMC
WEBCAST: Are your mission-critical applications performing the way you want? Attend this webinar to find out how DSSD D5 can provide the storage performance demanded by tomorrow's mission-critical workloads, whether they are running on a traditional database infrastructure, leveraging Hadoop, or running a BI app.
Posted: 12 Sep 2016 | Premiered: Jul 8, 2016

Dell EMC

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016


SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014


Network Management
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: Application performance is vital to todays distributed network, but determining the root cause of any performance issue requires immediate and pervasive visibility into all segments of the network. Learn how to use the new generation of tools and applications to help avoid performance and network problems.
Posted: 17 Apr 2014 | Premiered: 24 Aug 2016


Infrastructure Agility: How Retailer Achieves Online Excellence
sponsored by Red Hat
VIDEO: Watch this brief video to find out what system Woolworths implemented to address their needs, and what benefits they are experience. Inside you will see how the enterprise is now dramatically reducing the amount of time it would take to build a new server and respond to requirements.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

Red Hat

ERP for Enterprise Project Management (EPM)
sponsored by IFS
WEBCAST: This webcast investigates how enterprise resource planning (ERP) supports project-based business models, and explores the need for integration between ERP systems and project management software.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013


Performance Matters: SD-WAN Improves Speed and Reliability
sponsored by Silver Peak
VIDEO: The internet is an incredibly fast way to conduct a great deal of business, but some data needs extra protection. Harness the speeds of the internet for connecting to applications, while remaining secure in the knowledge that your data is safe.
Posted: 22 Jun 2016 | Premiered: 22 Jun 2016

Silver Peak

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Your Guide to Business Email Compromise
sponsored by Agari
PRODUCT DEMO: Go in-depth on the issue of BEC attacks, what steps they take to gain personal information from companies, and not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.
Posted: 19 Oct 2016 | Premiered: 19 Oct 2016

Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement