advanced technologies

Results 51 - 75 of 78Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
UEBA provides added visibility within SIEM for compliance and user monitoring, improving security alerts, and more insightful investigations. Today’s most advanced security operations use the technologies together to maximize each tool’s strengths.
Tags : 
ueba, uba, siem, analytics, secops, soc, threat hunting, correlation, incident response
    
McAfee
Published By: Emarsys     Published Date: Feb 14, 2018
Expectations for dramatically improved customer experiences (CX) are driving retail investments in omnichannel technologies that provide competitive differentiation beyond core products and services. As retailers pursue more advanced capabilities, artificial intelligence (AI) technologies provide innovative opportunities for retail marketers. It is, therefore, mission-critical for retail decision-makers to understand how ready their organizations are to embrace AI technologies with the potential to propel them forward as industry leaders.
Tags : 
marketing, retail, ecommerce, customer experiences
    
Emarsys
Published By: IBM     Published Date: Sep 30, 2013
Insurers are discovering the power of conjoining advanced technologies for collaboration, social media and mobile with business processes. The result is social business, which embeds advanced technology tools, media and practices into the ongoing activities of the organization. Social business reaches across the enterprise and then extends to customers and partners. Read this white paper to learn more.
Tags : 
ibm, social business, insurance, social media, media technology, it platforms, customer service
    
IBM
Published By: SAS     Published Date: Apr 25, 2017
Artificial intelligence and related forms of advanced analytics hold enormous potential for marketers to expand and deepen customer intelligence, improve business processes, and deliver engaging customer experiences. But many marketing organizations are just getting their feet wet in leveraging these technologies. To learn about the opportunities and challenges, IIA spoke with Analise Polsky, Business Solutions Manager, SAS Best Practices and Jonathan Moran, Principal Product Marketing Manager, SAS Customer Intelligence Solutions.
Tags : 
    
SAS
Published By: AtTask     Published Date: Jul 17, 2014
When it comes to project management, we tend to talk about the tactical—the assignments, the tasks, the approvals, and so on. But business is evolving, and many project teams are now being asked to lead change, instead of just timelines and milestones. This evolution is accelerating and is driven by fresh thinking and business necessity supported by advanced technologies that are highly accessible to a much broader range of contributors. Effectively managing work is no longer just the role of a few specialists. In this Whitepaper you will learn lessons from 40 PPM experts on making the transition from project management to project leadership.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management
    
AtTask
Published By: SAS     Published Date: Mar 06, 2018
There is a lot of excitement in the market about artificial intelligence (AI), machine learning (ML), and natural language processing (NLP). Although many of these technologies have been available for decades, new advancements in compute power along with new algorithmic developments are making these technologies more attractive to early adopter companies. These organizations are embracing advanced analytics technologies for a number of reasons including improving operational efficiencies, better understanding behaviors, and gaining competitive advantage.
Tags : 
    
SAS
Published By: IBM     Published Date: Nov 04, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud-prevention, cyber threat, security, emerging marketing, crm solutions/software, marketing research, trust and security
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud prevention, mitb, malware
    
IBM
Published By: SAS     Published Date: Aug 28, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: HP-Intel®     Published Date: Nov 19, 2012
Healthcare organizations nationwide are moving quickly to implement electronic medical records (EMR) and other advanced information technologies to improve the quality and efficiency of patient care.
Tags : 
intel, healthcare, ost, epic, unix/risc, david spieker
    
HP-Intel®
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: SAS     Published Date: Oct 18, 2017
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: Business Software     Published Date: Apr 04, 2013
Today's production processes have become increasingly complex and multi-faced, leaving many manufacturers challenged to find methods for simplifying and streamlining their activities. Additionally, as competition continues to heat up in all industries, they must constantly find new ways to reduce production costs. Manufacturing software packages empower businesses to do just that - giving them the advanced technologies they need to maximize efficiency and minimize overhead. Read on to learn about the top 15 manufacturing software vendors revealed.
Tags : 
advanced technology, business-software.com, streamlining, competition, top 15 vendors, manufacturing software
    
Business Software
Published By: IBM     Published Date: Feb 08, 2008
Point of service is the key to every retail operation. But with e-mail marketing, in-store/self-service kiosks and more, the definition of point of service is changing. These changes create a unique opportunity to utilize advanced technologies to improve the customer experience. The IBM Retail Environment for SUSE LINUX (IRES) is designed to help retailers do just this -- while generating higher profits.
Tags : 
pos, point of service, tco, marketing, customer experience, increase sales, profitability, retail, cost control, ibm
    
IBM
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
The modern contact center is a company's primary resource for delivering a differentiated customer experience and driving efficient and cost-effective customer satisfaction. Top tier contact centers make regular investments in advanced technologies.
Tags : 
implementing skills, routing, interactive intelligence
    
Interactive Intelligence
Published By: HP and Intel® Xeon® processors     Published Date: May 10, 2012
Learn how businesses can use advanced storage technologies, such as thin provisioning, deduplication and autotiering, to create a competitive advantage by speeding the delivery of IT services to customers and satisfying their ever-changing demands.
Tags : 
foundation, virtualization, virtual, infrastructure, foundation, core storage, storage
    
HP and Intel® Xeon® processors
Published By: Logicalis     Published Date: Sep 23, 2013
Why You Should Reevaluate Your DR Strategy Today
Tags : 
logicalis, disaster recovery, dcaas, data center-as-a-servic
    
Logicalis
Published By: Cisco     Published Date: Feb 23, 2016
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners.
Tags : 
technology, manufacturing, management infrastructure
    
Cisco
Published By: GE Healthcare     Published Date: Feb 23, 2015
This study surveyed radiologists about inefficiencies in their workflows, revealing a number of shortcomings with the information technologies radiologists employ to review, interpret, and report diagnostic imaging examinations.
Tags : 
enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols, multi-modality reading, unified view of patient images
    
GE Healthcare
Published By: GE Healthcare     Published Date: Feb 23, 2015
This short video shows you how GE Healthcare’s Centricity™ Solutions for Enterprise Imaging deliver a common viewing, analytics and vendor-neutral archiving experience across specialties.
Tags : 
enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols, multi-modality reading, unified view of patient images
    
GE Healthcare
Published By: IBM     Published Date: Apr 09, 2015
This American Banker webcast, sponsored by IBM, provides new insight into cybercrime and fraud prevention. Financial institutions have invested heavily in fraud prevention technologies and programs. However, sophisticated organized crime syndicates continue to successfully attack financial institutions and their customers. These criminals adapt quickly by using advanced technology and with ever changing attack vectors to exploit information security and fraud protection gaps across payment types, banking channels, and organizational boundaries. Traditional fraud prevention technologies are simply not capable of detecting and preventing account takeover and advanced malware attacks. A new approach to counter fraud is needed.
Tags : 
finance, cyber crime, banking, security, network security, fraud prevention
    
IBM
Published By: Box     Published Date: Jun 22, 2018
These days, everyone's talking about digital transformation. But exactly how does your company get there? Capture is a great place to start — in fact, it's one of the most critical steps to take as you move your business into the digital age. Whether it’s simply using OCR to make content more easily discoverable, adding and enhancing metadata to drive specific processes, or classifying content from the onset for better information governance, capture adds a ton of value to your existing content assets. This ebook details our key takeaways from AIIM's Industry Watch Report, Improving Business Operations in 2017: Capturing Vital Content. We share how cloud-based capture tools are replacing the longstanding legacy of paper-based processes to streamline and speed up the way you do business. Download the ebook to learn: • How the latest capture innovations can support your digital strategy • 5 business processes that benefit most from advanced capture technologies • The key benefits of c
Tags : 
    
Box
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.