Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date AI at the Edge: Machine Learning in Embedded Systems Andreas Burghart, Senior Product Manager; Digi International There is an explosion of interest in adding artificial intelligence (AI) and machine learning (ML) capabilities to embedded systems. But how can you t... 2 years ago | 40 mins The Unique APAC Business Challenge - Driving cost-effective remote IT Peter Sharples & Will Barrera, CA Technologies Enterprises looking to take advantage of high growth Asia Pacific markets today are faced with the complexity of managing local data sovereignty and p... 9 years ago | 58 mins How To Attain Sustainable Storage Savings Storage Switzerland senior analysts, Eric Slack and Colm Keegan One of the seemingly endless tasks of today’s IT professional is finding more ways to squeeze costs out of the data center environment. With data grow... 9 years ago | 54 mins Advanced Threat Protection and the Role of a Sandbox Patrick Grillo, EMEA Director, Fortinet While understanding the need for Advanced Threat Protection (ATP) is easy, understanding what ATP actually is and how to implement it in your network ... 9 years ago | 38 mins Stop Traffic Jams! Know How, What and Where Network Traffic Is Flowing Wilson Leong, CA Technologies Do you have visibility into all the applications running on your network, their traffic patterns and bandwidth consumption? For critical business serv... 9 years ago | 59 mins Better Care Fund: The challenges from April 2014 onwards Ivan Ellul, Krishna Taylor and Ben Fletcher The final versions of better care fund plans are due on 4 April, but the need to make the plans real will begin immediately. There will be questions ... 9 years ago | 45 mins 5 Reasons Why Google Cloud Storage is the New Gold Standard Dave Elliott, Global Product Lead, Google Cloud & Mike Graboski, Cloud Engineer, Google Cloud Too much data, complexity, and money, not enough time. Storage is a dynamic industry with unique, escalating challenges. There are many products and... 9 years ago | 60 mins WildFire – Closing the Loop on Advanced Cyberattacks Scott Simkin, Sr. Cyber Analyst at Palo Alto Networks Cyberattacks are frequenting the headline news, highlighting the increased sophistication, persistence, and evasiveness of attack methods, and the dee... 9 years ago | 40 mins How To Increase User Productivity and Ensure Data Security George Crump, Founder, Storage Switzerland & Soonr’s VP of Products and Security Ahmet Tuncay Join us for the live webinar on April 10th at 11:30AM ET - 8:30AM PT to discuss the importance of business class file sync, share and collaboration an... 9 years ago | 63 mins Highlights and Analysis on FireEye’s Advanced Threat Report 2013 Kenneth Geers, Senior Global Threat Analyst, FireEye, Inc. In 2013, FireEye Labs analyzed nearly 40,000 unique attacks—all of which bypassed traditional defenses. Find out what this tells us about the attacks ... 9 years ago | 60 mins Load more