Home
 > search for

Featured Documents related to »  neural network

Outsourcing, IT Infrastructure
The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical type...
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » neural network


Inventory Planning & Optimization: Extending Your ERP System Part Two: How It Works
Organizations today realize that although strategies focusing on outsourcing transportation, e-business and new distribution models are important, these are all

neural network  adoption by JustEnough of neural network based algorithms that factor in a whole set of variables into the final calculation. JustEnough emerges as a leader in the forecasting domain and related algorithms with its competitive approach of automated forecasting algorithm selection and neural network approach. i2 , Manugistics and SAP''s APO all require advanced programming and customization as part of implementation when doing forecasting. This is good in certain instances but is a very involved and Read More
Computer Associates Goes E-Business in a Big Way
Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. CA has

neural network  Jasmine ii, their Neugents neural network technology, software acquired from Platinum Technology and Sterling Software, Unicenter TNG (The Next Generation), the forthcoming Unicenter TND (The Next Dimension), and others. Recently, CA very quietly merged their technical field personnel and consultants into one group. The fallout of this move in terms of personnel attrition has not yet been fully realized. Customers should get written assurances that the consultants assigned to the e-business initiative Read More
SAS Puts the “E” in “Data”
SAS Institute has applied its data mining technology to the Internet. The company released products that will help companies analyze and predict the behavior of

neural network  as collaborative filtering and neural networks, so that in addition to answering specific questions it can point out patterns that might not have been recognized or asked about. The third member of the suite is IT Service Vision , a previously existing product that can report on server performance and problems. The three products are based on existing SAS products to which the ability to parse and analyze web logs has been added. The core of the company''s strategy to offer what they call a closed-loop Read More
Resistance is Futile: Computer Associates Assimilates yet another Major Software Firm
Once again, Computer Associates is executing the largest software acquisition in history, eclipsing its Platinum Technology buyout of 1999, which was the

neural network  to combine their Neugents neural network technology with Sterling''s products), but this often has the effect of forcing delays in the general availability of products. Read More
Software for Real People Part One: MindManager Feature and Functions
Many software applications are indispensable for the operation and management of the enterprise. They, however, may actually stifle creativity--arguably the

neural network  The mind is a neural network that has evolved over hundreds of millions of years to be an incredibly efficient network pattern graphics processor. Unfortunately the tools and applications we have developed to help improve productivity, such as enterprise resource planning (ERP), business productivity management (BPM), customer resource management (CRM), project planning, and word processing, are basically linear processes that primarily rely on textual or numeric structure. Despite their inflexibility, Read More
Network Data Protection Playbook: Network Security Best Practice for Protecting Your Organization
Malicious hacking and illegal access are just a few of the reasons companies lose precious corporate data every year. As the number of network security breaches

neural network  Data Protection Playbook: Network Security Best Practice for Protecting Your Organization Network Data Protection Playbook: Network Security Best Practice for Protecting Your Organization If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. CipherOptics makes data protection simple. Whether you need to secure data flows over your application environment or encrypt data in motion across the network, CipherOptics makes it easy. Our Read More
Symantec Swallows AXENT; Takes on Network Associates
Symantec has filed an intent to purchase AXENT in a stock-for-stock transaction of $975 million.

neural network  Swallows AXENT; Takes on Network Associates Symantec Symantec Swallows AXENT; Takes on Network Associates L. Taylor - August 17, 2000 Event Summary In a stock-for-stock transaction worth $975million, Symantec, headquartered in Cupertino, California, will purchase Rockville, Maryland''s AXENT (see With Record Revenues, AXENT Puts Down a Solid Fist ) creating a strong presence in enterprise Internet security products and consulting services. According to Gail Hamilton, Sr. Vice President of Read More
Fundamental Principles of Network Security
As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and

neural network  Principles of Network Security As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security to safely deploy and manage networks today. Find out what you need to know about the fundamentals of secure networking systems, including firewalls, network topology, and secure protocols. Read More
Network Design: A Sole-source, Service-based Approach
Typically, useful network documentation requires a significant investment in time and effort. But because enterprise networks are in constant flux, many

neural network  Design: A Sole-source, Service-based Approach Typically, useful network documentation requires a significant investment in time and effort. But because enterprise networks are in constant flux, many companies do not document their network on a regular basis. However, by adopting a sole source, service-based solution for network shapes and stencils, organizations can perform mission-critical documentation more regularly—in ways that are simpler, faster and more effective. Read More
Network Traffic Engineering Guidelines for Fibre Channel Switches
Scalability—or performance? In the past, storage area network (SAN) architects had to choose one over the other with regard to their SANs. Now, however

neural network  Traffic Engineering Guidelines for Fibre Channel Switches Scalability—or performance? In the past, storage area network (SAN) architects had to choose one over the other with regard to their SANs. Now, however, compromise is no longer necessary. Stackable switch solutions allow for seamless scaling and high performance—which means you can breathe as easily as your data transfers. Read More
Concur''s Customers Can Network Now
Following the path of other E-procurement vendors, Concur announced a purchasing network for large companies. At the same time, Concur announced that its entire

neural network  s Customers Can Network Now Event Summary Concur Technologies (Nasdaq: CNQR) made two announcements that mark its determination to be, and be seen as, a major player in the hot E-procurement market. The Concur Commerce Network will give Concur''s E-procurement customers a marketplace to display and purchase their wares. The company claims that its network already offers thousands of suppliers. Concur also announced that electronic purchasing and the rest of its Concur eWorkplace suite of products Read More
Network Access Control (NAC): CounterACT
The number of devices in the corporate world is increasing every year. And as mobility proliferates, so does the requirement for network security solutions to

neural network  Access Control (NAC): CounterACT The number of devices in the corporate world is increasing every year. And as mobility proliferates, so does the requirement for network security solutions to protect against external attacks, as well as attacks originating inside the network perimeter. However, network access control solutions can provide organizations with the ability to automatically enforce security policies, while still maintaining user productivity. Read More
One Network Enterprises


neural network  Network Enterprises Read More
Saudi Arabian Network Security Provokes Local Considerations
Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

neural network  Arabian Network Security Provokes Local Considerations Event Summary In The Kingdom of Saudi Arabia, the entire Internet backbone is concealed behind a countrywide firewall that is built on Sun Solaris servers using the freeware proxy server known as Squid. The firewall is located at the King Abdul Aziz University for Science and Technology (KACST). To keep foreign nations from viewing various local Saudi websites, the massive firewall blocks TCP/IP ports 80 and 443 for all connections coming into the Read More
Standardized Battlespace SOA: Enabling Network-centric Operations
Network-centric operations (NCO) provide the ability to leverage information networks to generate a more dynamic and agile decision-making space. A fundamental

neural network   Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others