deep dive

Results 1 - 25 of 99Sort Results By: Published Date | Title | Company Name
By: Apstra     Published Date: Aug 19, 2019
Intent Based Analytcs (IBA), an important feature of AOS and a main enabler for closed loop telemetry is described in this whitepaper. Prerequisites for this whitepaper include a basic understanding of the Apstra AOS soluton, such as from the white paper ttled “The Apstra Operatng System (AOS) Architecture Overview.
Tags : 
     Apstra
By: Workday     Published Date: Jul 30, 2019
Higher education is facing a crisis. For the first time in years, the pool of prospective students is shrinking, changing, and choosing different options—a trend that could continue well into the next decade. Read this whitepaper to take a deep-dive into the numbers, and discover five ways innovative colleges are bucking trends and boosting enrollment.
Tags : 
     Workday
By: 15five     Published Date: Jul 17, 2019
The best practices for managing employees evolves at a break-neck pace. In 2019, the key distinction for performance management strategies is to focus on the whole employee. This ranges from physical, emotional, and mental well-being to facilitating their personal and professional development. To help you gain a deeper understanding of new trends, we assembled this list of top trends to help you create or refine your employee performance management strategy this year, including: • Developing trust with your employees • The value of people analytics • Individualized support • Learning & development • Diversity & inclusion
Tags : 
     15five
By: PwC     Published Date: Jun 13, 2019
A CEO scans the competitive landscape, and decides it’s time to implement new strategies or to examine internal factors that are limiting growth. With buy-in from senior leadership, the company makes a significant investment in a months-long process designed to yield actionable insights. A few areas may be singled out for a deep-dive examination of how work is performed and where pain points exist. After interviewing employees at various levels, creating detailed documentation, and making recommendations, the company is ready to pilot changes, measure results, and roll out strategies to larger groups of stakeholders.
Tags : 
     PwC
By: Dassault Systčmes     Published Date: Jun 11, 2019
Q&A from Electro Mobility in the Cloud Era Event. Deep dive with industry-leading speakers to discover in depth answers to compelling questions from the event which was hosted on May 28th.
Tags : 
     Dassault Systčmes
By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
     Mimecast
By: AWS     Published Date: Dec 19, 2018
There is no doubt that customers want to protect their environment against unplanned downtime. But what happens when disasters do occur? Download this webinar for a deep dive into the VMware Cloud on AWS Disaster Recovery (DR) use case. Experts from VMware and AWS jointly discuss the disaster recovery challenges that customers often face and detail how you can leverage VMware Cloud on AWS to overcome them. See demos of how you can use VMware Cloud on AWS for your DR scenario and hear from current customers. Download our webinar to learn The benefits of Disaster Recovery-as-a-Service (DRaaS), delivering on-site protection How automated orchestration accelerates failover and failback capabilities The ways DRaaS simplifies and modernizes your existing DR solutions What VMware Cloud on AWS DRaaS does to help reduce costs, simplify operations, and quicken recovery times
Tags : 
     AWS
By: Pure Storage     Published Date: Dec 05, 2018
"Although interest in machine learning has reached a high point, lofty expectations often scuttle projects before they get very far. How can machine learning—especially deep neural networks—make a real difference in your organization? This hands-on guide not only provides the most practical information available on the subject, but also helps you get started building efficient deep learning networks. Dive into machine learning concepts in general, as well as deep learning in particular Understand how deep networks evolved from neural network fundamentals Explore the major deep network architectures, including Convolutional and Recurrent Learn how to map specific deep networks to the right problem Walk through the fundamentals of tuning general neural networks and specific deep network architectures"
Tags : 
     Pure Storage
By: CrowdStrike     Published Date: Nov 28, 2018
Damaging widespread attacks such as WannaCry provide grim reminders of how prevalent Ransomware attacks have become. Adversaries are not only launching Ransomware attacks against a wide range of industries, they are consistently evolving their tools, tactics and procedures (TTPs) to foil your organization’s best cybersecurity strategies. A white paper, “Ransomware, a Growing Enterprise Threat,” offers in-depth analysis of Ransomware and explains why organizations can’t afford to ignore this increasingly challenging cyber threat. Download this white paper to learn • The evolution of Ransomware and why businesses are being targeted more frequently • How perpetrators tactics and targets are evolving to maximize profits • Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
     CrowdStrike
By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms
     Splunk
By: Splunk     Published Date: Aug 17, 2018
With the growing need to effectively monitor your infrastructure, metrics have emerged as a way to gain insight to the trends and problems within your IT environment. collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside another tool, such as Splunk, to help identify trends, issues and relationships you may not be able to observe otherwise. This e-book gives you a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment. Download your complimentary copy of “A Beginner’s Guide to collectd” to learn how to: *Get and configure collectd *Analyze collectd data *Use Splunk and collectd together to analyze large amounts of infrastructure data
Tags : 
     Splunk
By: Microsoft     Published Date: Jul 20, 2018
Microsoft provides a solution to easily run small segments of code in the cloud with Azure Functions. Azure Functions provides solutions for processing data, integrating systems, and building simple APIs and microservices. The book starts with intermediate-level recipes on serverless computing along with some use cases on the benefits and key features of Azure Functions. Then, we'll deep dive into the core aspects of Azure Functions, such as the services it provides, how you can develop and write Azure Functions, and how to monitor and troubleshoot them. Moving on, you'll get practical recipes on integrating DevOps with Azure Functions, and providing continuous deployment with Visual Studio Team Services. The book also provides hands-on steps and tutorials based on real-world serverless use cases to guide you through configuring and setting up your serverless environments with ease. Finally, you'll see how to manage Azure Functions, providing enterprise-level security and compliance to
Tags : 
     Microsoft
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence (AI) is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today. Learn more about AI in this eBook.
Tags : artificial, intelligence, enterprise
     BlackBerry Cylance
By: XpertHR     Published Date: Jun 13, 2018
A renewed focus on pay equity at the state and federal levels, coupled with the power of movements like #MeToo and #TimesUp, have companies and their HR/compliance representatives dusting taking a deep dive into pay practices to ensure equity for all. Recent lawsuits settled in favor of plaintiffs, and activist call-outs for companies to be more equitable and transparent about pay practices, add fuel to the fire: ? Seven female law professors at the University of Denver won a $2.6 million settlement in May ? Activist investor Arjuna Capital is pushing major tech firms to publish data to support equitable pay practices ? Google is facing a class action battle over equitable pay practices That’s just the tip of the iceberg. If you’re not on top of this critical issue, you could be next on the list of companies facing legal and public scrutiny. XpertHR can help you wade through the regulatory requirements and practical considerations to audit and revise, as necessary, your pay practices.
Tags : pay equity, equal pay, gender equality, #metoo, #timesup, pay practices, compliance, fair pay
     XpertHR
By: NetApp     Published Date: Mar 06, 2018
This Gartner Report on an effective hyperconvergence strategy includes their research findings and recommendations. It also includes a deep dive analysis of key determinants in a hyperconverged solution decision. For more information, please view our privacy policy here.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: NetApp     Published Date: Mar 05, 2018
This report from 451 Research examines the data management challenges faced by companies in a hybrid cloud environment and provides recommendations ??for IT professionals responsible for cloud deployments?.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
     Lookout
By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: • Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. • First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. • A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features.
Tags : mimecast, virtual event, email archiving, email solutions, cloud archiving
     Mimecast
By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features. View on-demand now
Tags : mimecast, virtual event, email archiving, email solutions, cloud archiving
     Mimecast
By: Juniper Networks     Published Date: Oct 25, 2017
My name is Jonathan McCaffrey and I work on the infrastructure team here at Riot. This is the first post in a series where we’ll go deep on how we deploy and operate backend features around the globe. Before we dive into the technical details, it’s important to understand how Rioters think about feature development. Player value is paramount at Riot, and development teams often work directly with the player community to inform features and improvements. In order to provide the best possible player experience, we need to move fast and maintain the ability to rapidly change plans based upon feedback. The infrastructure team’s mission is to pave the way for our developers to do just that - the more we empower Riot teams, the faster features can be shipped to players to enjoy.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     Juniper Networks
By: Adecco     Published Date: Sep 27, 2017
With the unemployment average decreasing across the nation and new jobs continually evolving, long-term growth projections are promising for the IT industry. As the tech industry booms, so does the tech job market. We took a deep dive into the latest annual job market data from Bureau of Labor Statistics to better understand how both the nation and the IT sector advanced and what this means for the future of tech.
Tags : 
     Adecco
By: Dell EMC     Published Date: Aug 22, 2017
Dell EMC Isilon, the #1 Scale-Out NAS platform, continues to transform the way organizations are deploying, protecting and managing their fast growing unstructured data. This session by Eric Seidman, Senior Manager, Product Marketing, Dell EMC will introduce attendees to the new generation of Isilon Scale-Out NAS family. Also covered will be a deep dive into the new Isilon architecture and a closer look at the six new Isilon systems – powered by the new OneFS 8.1 – which were announced at Dell EMC World 2017. Attend this session to learn how Isilon’s latest enhancements can revolutionize your business.
Tags : 
     Dell EMC
By: CrowdStrike     Published Date: Aug 01, 2017
Learn the inner workings of ransomware and how companies are fighting back. Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs.Download this whitepaper to learn:?The evolution of Ransomware and why businesses can’t afford to ignore it?How perpetrators tactics and targets are evolving to maximize profits?Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
     CrowdStrike
By: Genesys     Published Date: Jul 24, 2017
Read this eBook. It deep dives into the top 10 myths of omnichannel customer engagement.
Tags : customer engagement, call centers, contact center, omnichannel, customer engagement
     Genesys
By: VMware AirWatch     Published Date: Jul 20, 2017
Take a deeper look into how AirWatch enables Windows management to evolve from a rigid PC-centric approach to one offering a flexible and over-the-air configuration model. This session will delve into the specific configuration, security and OS patch management technologies that AirWatch introduces, as well as leveraging AirWatch alongside conventional Windows management tools that are in use today. • Leverage product provisioning and native configuration management features for policy management from the cloud • Integrate with the new Windows Update as a Service to flexibly manage OS updates and patches on or off the domain • Ensure endpoint security and data protection via advanced security features in the management platform and Windows 10
Tags : 
     VMware AirWatch
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com