You Are Browsing ‘General IT ’ Category

Comments Off on Extreme Networks Achieves High Performance Rating Across all Use Cases in Gartner’s Critical Capabilities for Wired and Wireless LAN Access Infrastructure
(Source: Markets Insider) ... in the 2017 Gartner Critical Capabilities for Wired and Wireless LAN Access Infrastructure.1 Extreme Networks scored second in the "Multi-Vendor Networking Environment" Use Case with a score of 3.60 out of 5. Extreme Networks completed its acquisition of Brocade's data center networking business in October 2017....
Comments Off on 3 technology trends defining retail: Connecting the dots at NRF
(Source: Information Age) As such, retailers need to ensure AI is fully integrated within their retail ecosystems, able to ingest data from any information silo via APIs. By being fully connected to the retailer's application network—made up of its applications, data and devices—AI can use live data to trigger automated processes that improve customer ......
Comments Off on SAP launches new application to reduce financial transaction risks
(Source: Verdict) Enterprise application software developer SAP has introduced a new solution SAP Business Integrity Screening to reduce financial risks associated with business transactions. The new applicationanalyses data to identify suspicious transactions and patterns in real time and spot potential fraud and compliance failures....
Comments Off on Simplifying Hybrid IT for a Successful Digital Transformation
(Source: InfoWorld) In the fall of 2017, Optio Data agreed to beta test HPE OneSphere, an as-a-service hybrid-cloud management platform that simplifies management of cloud environments and on-premises infrastructure. It was looking for a simple-to-deploy and easy-to-use solution that would help a wide array of customers move toward ......
Comments Off on Are shared services the answer to data protection?
(Source: CSO Online) That return is directly related to complete involvement by every organization that touches relevant information, processes and infrastructure. Almost by definition, shared services cut across every aspect of an organization's IT needs – from email to data centers to cybersecurity. When agreement is reached across the board, ......
Comments Off on Verizon to Use KSI Blockchain Technology Developed for Estonia
(Source: SDxCentral) Verizon says the services will help its large enterprise and government customers maintain the integrity of critical infrastructure and protect physical and digital supply ... Verizon's announcement said, “Typically, blockchain technologies require customer data be copied into a blockchain, but with Verizon's solution that data ......
Comments Off on Artificial Intelligence (Chipsets) Market Worth 59.26 Billion USD by 2025
(Source: PR Newswire (press release)) The availability of big data, coupled with AI algorithms for an extensive range of application areas, is fueling the growth of the AI (chipsets) market. Increased productivity ... ML aims to develop a computer program/algorithm that can access data and use it to train itself with no human intervention. Machine learning's ability to ......
Comments Off on Napatech A/S : Q4 2017 financial Results
(Source: Nasdaq) ... timing of orders for Napatech's software and hardware solutions, the company remains well positioned to reap great rewards as major industry trends fuel an increasing use of FPGAs for accelerating network and security applications in modern data centers," says Henrik Brill Jensen, Chief Executive Officer of Napatech....
Comments Off on How A Telecoms Giant Is Using AI to Predict Its Future Workforce Needs
(Source: HR Technologist) The data sources employed include university databases, social and professional networking sites, applicant tracking systems, and specialized engineering, finance and HR blogs. We're using these sources to build a “data lake” that holds a wealth of information about labor, education and employment trends worldwide....
Comments Off on FS-ISAC enables safer financial data sharing with API
(Source: ComputerWeekly.com) The consumer is presented with the financial institution's consent page, where they authorise the data they wish to share with the financial application. After authenticating, the consumer is then passed back to the financial application. Datasharing between financial application servers and financial institution servers is then ......