network analytics

Results 26 - 50 of 118Sort Results By: Published Date | Title | Company Name
By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
     Splunk
By: Gigamon     Published Date: Dec 13, 2018
Read "Understanding the State of Network Security Today" to learn why ESG recommends consolidating security tools through a structured, platform-based approach. Data, analytics and reports from multiple tools can be aggregated and consumed in one control panel, reducing network vulnerabilities. Learn more about challenges, changes and best practices for today’s network security operations and tools. Read now.
Tags : 
     Gigamon
By: Pure Storage     Published Date: Apr 18, 2018
Deep learning opens up new worlds of possibility in artifi cial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
     Pure Storage
By: Extreme Networks     Published Date: Feb 10, 2015
Dans cet eBook, nous vous présenterons des cas d’utilisation illustrant comment une solution d’analyse des applications peut être utilisée de manière efficace par le service informatique.
Tags : extreme networks, purview, analyse des applications, sans fil, wifi, solution réseau, solution de business intelligence, business intelligence, analyse applicative, datamining, réseau, optimisation du réseau, business analytics, application, sécurité des applications
     Extreme Networks
By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
     Splunk
By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
     Splunk
By: Blackboard     Published Date: Jan 24, 2017
Education is on a journey. Using new technology to transform the way you teach and learn.
Tags : education, education success, education tech, tech for education, must have tech for education, wireless network, apps, analytics
     Blackboard
By: Pure Storage     Published Date: Apr 10, 2019
Deep learning opens up new worlds of possibility in artificial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
     Pure Storage
By: Limelight     Published Date: Jul 31, 2012
There are a wide variety of video platforms available, each offering a plethora of features. How do you decide which features you need and the features you don't need? In this paper you will receive ten tips and suggestions on how to make the correct choice for all of your online video platform needs.
Tags : limelight networks, limelight, networks, online video platform, video platform, content management, analytics
     Limelight
By: ArborNetworks     Published Date: Feb 12, 2016
Security Analytics is one of the two fastest growing product categories in security.
Tags : arbor networks, insegment, security analytics, data protection, cyber defense, cyber security, security, data management
     ArborNetworks
By: MuleSoft     Published Date: Apr 13, 2016
Today’s successful organization needs to be able to turn on a dime, changing its product or service direction as fast as its customers’ needs require. The successful business of the 21st century crosses all boundaries; can quickly meet and adapt to competition, whether it comes from another part of the world, another industry or a startup; or it can use its core competencies to extend itself in new ways. Welcome to the Composable Enterprise. This kind of company—powered by cloud, open APIs, data analytics, mobile and social, and connected to the Internet of Things—is redefining markets and raising consumer expectations. The composable enterprise casts away the hierarchical and hardwired systems and processes that defined its predecessors, and represents a radical rethinking of how technology can serve innovation and how innovation can serve customers.
Tags : enterprise network, digital management, enterprise application, application management, data, data analytics, cloud management, enterprise applications
     MuleSoft
By: IBM     Published Date: Apr 26, 2016
Restoring connections: How telecommunications providers can reboot the customer experience IBM has more than 22,000 experts working in the Telecommunications industry, delivering solutions to more than 200 major communications service providers globally. IBM’s telecommunications capabilities are backed by a global network of telecom solution labs, research labs and innovation centers to support its offerings in the area of analytics, cloud, mobility, network optimization, digital transformation and global integration. IBM continues to invest significantly in key acquisitions to add expertise and capabilities that enable its clients in the telecommunications space.
Tags : ibm, ibm institute for business values, telecommunications, customer experience, communications service providers, csp, customer relationship
     IBM
By: IBM     Published Date: Oct 21, 2016
Between the Internet of Things, customer experience and loyalty programs, social network monitoring, connected enterprise systems and other information sources, today's organizations have access to more data than they ever had before-and frankly, more than they may know what to do with. The challenge is to not just understand that data, but actualize it and use it to recognize real business value. This ebook will walk you through a sample scenario with Albert, a data scientist who wants to put text analytics to work by using the Word2vec algorithm and other data science tools.
Tags : ibm, analytics, aps, aps data, open data science, data science, word2vec, enterprise applications, data center
     IBM
By: CloudHealth by VMware     Published Date: Feb 13, 2019
Google Cloud Platform is being widely adopted for its security and performance networking capabilities, machine learning, Kubernetes support, and data analytics. Google has been developing innovative price models to attract new users and provide cost benefits for customers. Read this eBook for answers to questions such as: -What are Committed Use Discounts? -Why do you need Committed Use Discounts? -What are Sustained Use Discounts? -What is the difference between Committed and Sustained Use Discounts? Download GCP Discounts and Why You Should Care to learn how you can take advantage of discounts in Google Cloud Platform to save you money on your monthly cloud bill.
Tags : cloud management, google cloud platform, multicloud management
     CloudHealth by VMware
By: Palo Alto Networks     Published Date: Dec 02, 2016
Today, working remotely has never been easier, due to the ubiquity of mobile devices and reliable Internet connectivity. The ease with which a worker can get connected to the corporate network delivers the impression that your co-worker is down the hall, when in fact they are traveling internationally. Global Workplace Analytics’ research shows that increasingly, working remotely is not only commonplace, it is encouraged and has shown to improve productivity.
Tags : 
     Palo Alto Networks
By: IBM     Published Date: May 30, 2018
If you are relying on a basic log manager or spreadsheets to manage security alerts, you may be missing critical threats in your network. You could boost your team's productivity with a modern SIEM platform. In this E-Book, you will learn the five most critical questions that you need to ask in order to determine the best security analytics solution for your organization.
Tags : 
     IBM
By: ServiceNow     Published Date: Sep 18, 2018
When a global transportation logistics provider wanted to improve support for its global network of branch offices in the Americas, Europe, and Asia, it used performance analytics to monitor and analyze the organization’s support processes. Not only did performance analytics dramatically increase visibility—allowing the company to move from monthly reports to on-demand performance dashboards—it also uncovered major process bottlenecks. In one case, resolving a single bottleneck increased efficiency by 17%, making support far more responsive while saving hundreds of hours of effort. Discover how ServiceNow Performance Analytics can benefit your business by downloading this white paper.
Tags : performance, analytics, business, servicenow
     ServiceNow
By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
     TIBCO Software
By: SAS     Published Date: Apr 21, 2015
The synergy of creative work and powerful analytics is the route to impactful, innovative campaigns for iris Worldwide, the global creative innovation network. iris has made this strategy a reality using the advanced analytics capabilities offered by SAS.
Tags : 
     SAS
By: nimsoft     Published Date: Apr 10, 2012
The Nimsoft for Network Monitoring solution provides complete network visibility to assure that the highest levels of business service quality are achieved. Having 360o network visibility is critical to today's network driven business and anything less can have costly bottom line implications.
Tags : nimsoft, network monitoring, technology, it management, service, application, analytics, technology management
     nimsoft
By: FICO     Published Date: Mar 14, 2017
In this Executive Brief, we share best practices in how to evaluate and deploy layered controls that will help you develop a holistic approach to controls, investigate and control where risk is introduced, assess your risk appetite and benchmark your cybersecurity posture against others in your industry.
Tags : network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
     FICO
By: FICO     Published Date: Mar 14, 2017
Learn how technologies such as AI, self-calibrating models and self-learning analytics are being used to detect cyber attacks before they happen. Download now!
Tags : network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
     FICO
By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
     FICO
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com