bull

Results 1 - 25 of 71Sort Results By: Published Date | Title | Company Name
By: Bull     Published Date: Dec 04, 2014
Bull, an Atos company, is a leader in Big Data, HPC and cyber-security with a worldwide market presence. Bull has extensive experience in implementing and running petaflopsscale supercomputers. The exascale program is a new step forward in Bull’s strategy to deliver exascale supercomputers capable of addressing the new challenges of science, industry and society.
Tags : bull, exascale, big data, hpc, cyber security, supercomputers
     Bull
By: Gigaom     Published Date: Oct 07, 2019
While interest in Machine Learning/Artificial Intelligence/ (ML/AI) has never been higher, the number of companies deploying it is only a subset, and successful implementations a smaller proportion still. The problem isn’t the technology; that part is working great. But the mere presence and provision of tools, algorithms, and frameworks aren’t enough. What’s missing is the attitude, appreciation, and approach necessary to drive adoption and working solutions. To learn more, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and panelists Jen Stirrup, Lillian Pierson, and special guest from Cloudera Fast Forward Labs, Alice Albrecht. Our panel members are seasoned veterans in the database and analytics consulting world, each with a track record of successful implementations. They’ll explain how to go beyond the fascination phase of new technology towards the battened down methodologies necessary to build bulletproof solutions th
Tags : 
     Gigaom
By: NetSpi     Published Date: Sep 20, 2019
The cloud has become a valued part of modern infrastructure and there are now more resources than ever to help organizations secure their cloud environments. Even with all of the available tools and resources, there are still a million ways to configure services incorrectly. Public and non-public breaches seem to happen weekly and the maturity of the information security program doesn’t seem to influence the likelihood of the breach. One easy mistake in a cloud environment can be disastrous and it’s reasonable to be concerned when a new breach report hits the news. Just like anything in security, there are no magic bullets, but to help address these concerns, NetSPI recommends some general guidelines to help get ahead of the cloud security curve. These are general best practices that could be applied to any portion of your IT environment, but it’s good to keep these in mind while working with the cloud.
Tags : 
     NetSpi
By: TARGUSinfo.     Published Date: May 20, 2010
The arrival of 3rd party data is changing the landscape of online targeting. There is an influx of companies offering these services. But, what works with your business model? How do you evaluate the options? THE QUESTIONS YOU NEED TO KNOW AND WHY: • Is there high fidelity data? • Is the provided data stable? • Is your partner built to last? • Does your partner use a transparent methodology? Download our guide to evaluating data providers and find out the importance and relevance of these terms and conditions.
Tags : targus info
     TARGUSinfo.
By: xhtmlchamps     Published Date: Jan 28, 2013
PSD to XHTML - Xhtmlchamps - provide psd to xhtml/html, cms, joomla, wordpress, drupal, vbulletin, phpbb conversion, psd to xhtml/css conversion services. Get excellent psd to html, psd to xhtml/css/cms at affordable price.
Tags : 
     xhtmlchamps
By: Aria Systems     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world >
Tags : 
     Aria Systems
By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. They’re not just preventing losses from chargebacks. They’re gatekeepers to accepting more revenue. It’s a complex job. But get it right, and they enable their business to engage customers better – across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industry’s needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that there’s no silver bullet. So, in this paper, we’ll look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
     CyberSource EMEA
By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : financial profit, economic espionage, it security, risk mitigation, security, it management
     Kaspersky Lab
By: Bulldog Solutions     Published Date: May 20, 2013
This executive overview focuses on one of these drivers--program effectiveness--defined by leading marketers as programs that drive a high level of conversion and prospect engagement throughout the buyer's journey. in this executive overview, we'll take a look at the current buyer landscape, and then at five five best practice areas that need to be optimized in order for your programs to reach their full potential.
Tags : program effectiveness, b2b, b2b buyers, message alignment, buyer insights, audience acquisition, performance monitoring, campaign, campaign effectiveness
     Bulldog Solutions
By: Bulldog Solutions     Published Date: May 20, 2013
The pressure on marketers is mounting. What's standing between you and your revenue goals? The Revenue Performance Methodlogy is framework that identifies, defines, and relates the core 15 competencies to your world, allowing you to begin making incremental and simultaneous improvement to your sales and marketing plan.
Tags : balanced budget, marketing budget, revenue goals, campaign, campaign effectiveness
     Bulldog Solutions
By: Bulldog Solutions     Published Date: May 20, 2013
The key to a balanced budget is finding the right mix of growth and efficiency. The challenge is that often this budget is spent on activities that are skewed toward the top of the funnel or that are not necessarily aligned to revenue. So how can they possibly balance this budget and prove it is aligned to their assigned revenue contribution? The key is finding the right mix of "muscle" (volume) and "brains" (improved conversion).
Tags : marketing budget, balanced budget, improving revenue, revenue goals, revenue impact, campaign, campaign effectiveness
     Bulldog Solutions
By: CA Technologies EMEA     Published Date: Aug 03, 2017
Today’s DevOps and agile–loving enterprises are striving for fast changes and quick deployments. To these companies, the microservices architecture is a boon, but not a silver bullet. Organizations can enable smaller development teams with more autonomy and agility, and as a result, the business will notice IT being more in tune with their changing demands.
Tags : api, application programming interface, psd2, open banking, json, github
     CA Technologies EMEA
By: Mimecast     Published Date: Jun 22, 2015
To find out if your data is being put at risk, get practical advice on how to eliminate this risk, and find out which vendor hits the ‘Bloor Bullseye’.
Tags : file sharing security, file sharing services, best practices, storage services
     Mimecast
By: ESET     Published Date: Sep 07, 2011
Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.
Tags : eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus, wireless
     ESET
By: ADP     Published Date: Nov 16, 2017
Many businesses invest in analytics technology thinking it’s a silver bullet. But data doesn’t always tell the whole story. You get percentages but not insights. Trends but not necessarily relationships or patterns. Truly impactful workforce analytics has to do more. You have to turn data into insight, and then put it into action. This workbook is designed to help you progress through the workforce analytics maturity model. The first step in the process is to identify where you stand today.
Tags : 
     ADP
By: Blue Coat     Published Date: Feb 04, 2016
As more and more organizations adopt cloud services, it’s essential to maintain a consistent level of security to protect data. There is no silver bullet. But there are some basic cloud security components. Find out now!
Tags : 
     Blue Coat
By: Ahead     Published Date: Jun 06, 2018
I don’t think it’s too much at all. However, I would recommend including some bullets calling out key points from the paper and a distinct call-to-action. Something like this: At the start of every year, more than 80% of your annual IT spend is likely already committed – in the form of depreciation, maintenance, and support for infrastructure – inhibiting your ability to bring new capabilities to the business. Making matters worse, these dollars often lie hidden in the form of inefficient or ill-advised software license management. If you don’t have the luxury of a mature vendor management function, you probably struggle to see the full picture of your future maintenance costs. This guide will give you the tools to assess your IT spend by identifying potential blind spots and uncovering the benefits of ELAs and TLAs. Some blind spots may include: • Limited visibility • Productivity barriers • Risk exposures Download now to learn how to formulate a plan to yield savings--savings that fa
Tags : 
     Ahead
By: K 12 Insight     Published Date: Apr 13, 2018
After Parkland, Safety is on everyone’s mind. While physical safety measures, such as metal detectors and door locks can help, school leaders also have to think about emotional safety. Do students feel safe in your schools? Download this guide, and learn three ways to give students and parents a voice in the school safety discussion.
Tags : school safety, k-12, bullying, school leaders, safety policy, threats, communication
     K 12 Insight
By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
     PGi
By: 3M     Published Date: Mar 19, 2019
The intent of this technical bulletin is to summarize and clarify the respiratory protection guidance from both USP and NIOSH for workers who handle hazardous drugs in the healthcare environment. Download now to learn more.
Tags : 
     3M
By: Workday     Published Date: Feb 27, 2018
The benefits of cloud computing—a high return on investment, greater staff efficiencies, optimisation of IT resources, plus enhanced visibility and access to information—have piqued the interest of CFOs and finance leaders who are actively evaluating the risks versus the rewards of the cloud delivery model. Although a steady migration to the cloud is happening in many areas of the enterprise, finance professionals still have questions regarding the security, performance, privacy, risks and the actual cost and value of cloud computing. Download this whitepaper today and discover the benefits of moving finance operations to the cloud, and how it can drive sustainable ROI.
Tags : cloud, computing, workday, migration, enterprise, security, privacy
     Workday
By: Workday     Published Date: Sep 08, 2015
Read the whitepaper to discover the benefits of moving finance operations to the cloud.
Tags : cloud computing, finance in the cloud, cloud security, security, payroll software, financial management, cloud
     Workday
By: Zebra Technologies     Published Date: Mar 25, 2010
Mobile printing provides a series of quality improvements and timesaving benefits that are often overlooked in route automation, but can have a significant impact on the bottom line. This white paper will: • Describe uses for mobile printing in route accounting applications; •Provide return on investment calculation tools to measure the financial impact mobile printing can have; • Demonstrate how mobile printing processes can improve billing, distribution, and customer service operations; • Detail how on-demand thermal printing can reduce forms expenses; • Provide an overview of mobile printer and wireless communications options for route accounting systems. Read on to see how your route delivery and sales staff can make more stops and fewer errors each day by using mobile printing to support their work.
Tags : zebra technologies, dsd, manufacturing, mobile printing, wireless printing
     Zebra Technologies
By: Dassault Systemes SolidWorks Corp.     Published Date: Jul 23, 2018
In this educational webinar from Dassault Systèmes, industry experts share best practices on how to streamline manufacturing collaboration and design when it comes to plastic injection molding. Learn how to find valuable resource materials such as part design guides and technical service bulletins, and troubleshoot common challenges that occur during every stage of the injection-molding process using 3D simulation software.
Tags : streamline, plastics, manufacturing, resource, material
     Dassault Systemes SolidWorks Corp.
By: McAfee EMEA     Published Date: Nov 15, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why McAfee takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, mcafee, cyber threat, technologies, innovation, analytics
     McAfee EMEA
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com