Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

computers

Results 151 - 159 of 159Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Oct 07, 2014
Last year, Mac malware increased by 66% with a single, high-profile attack infecting over 600,000 machines. Malware authors are targeting unsuspecting Mac users and gaining access to organization's data. Still wondering whether Macs need protection? See what advice a senior strategic analyst at ESG has to share.
Tags : 
enterprise, mac security, cybercrime, malware, data, high-profile attack, infection, security
    
Symantec
Published By: Cisco     Published Date: Feb 23, 2016
The Internet of Things may be a hot topic in the industry but it’s not a new concept. In the early 2000’s, Kevin Ashton was laying the groundwork for what would become the Internet of Things (IoT) at MIT’s AutoID lab. Ashton was one of the pioneers who conceived this notion as he searched for ways that Proctor & Gamble could improve its business by linking RFID information to the Internet. The concept was simple but powerful. If all objects in daily life were equipped with identifiers and wireless connectivity, these objects could be communicate with each other and be managed by computers.
Tags : 
communication, internet, network management, network performance, network performance management
    
Cisco
Published By: Cray Inc.     Published Date: Aug 21, 2014
Learn how to optimize codes for faster application performance with Intel® Xeon® Phi™ coprocessor.
Tags : 
optimization, nics, intel, supercomputers, hybrid processing, performance, software development, it management
    
Cray Inc.
Published By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
Published By: Fujitsu     Published Date: Feb 01, 2018
As schools look to blended learning as a solution to personalize and positively impact student achievement, the need to train and support teachers has become blatantly clear. Thus, districts and schools have allocated scarce resources to the process of onboarding and supporting teachers as new devices such as computers or tables are introduced. However, school leaders and teachers often fail to recognize the need to similarly onboard and support students into new digital environments, instead trusting the inherent technological competencies of the “digital native” student.
Tags : 
digital, native, teachers, leaders, fujitsu
    
Fujitsu
Published By: Fujitsu     Published Date: Feb 01, 2018
The hallmark of the Digital Age is change – constant, rapid, and often disruptive. The computer itself has changed – from mainframe to minicomputers, personal desktops to laptops, handheld devices to mobile computers or tablets. We now have tiny embedded computers – in cars, in washing machines and even in cats and dogs. How we live our lives has changed. Virtually every activity humans engage in, is impacted by computers and that’s constantly changing, too. No surprise then, that K-12 education was also impacted by the constant transformation of computers.
Tags : 
learning, teachers, education, computers, technology, fujitsu
    
Fujitsu
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
The creation of an immersive virtual setting requires students to understand the immersive visual and audio environment of the world they intend their characters to inhabit. Development of a digital story arc requires an understanding of sequence, causality, and communication of meaning to digital story viewers. An immersive digital story can be created and viewed on mobile devices, tablets, and computers by students as early as elementary school. Virtual Digital Storytelling sits at the convergence point of empathy, social and emotional learning, engagement with community, and learning with emerging technologies. Download today to find out how Fujitsu's suit of Augmented and Virtual Reality tools can help your business.
Tags : 
    
Fujitsu America, Inc.
Published By: Expert System     Published Date: Jul 18, 2019
Although computers are better when it comes to processing and making calculations, they haven’t been able to accomplish some of the most basic human tasks, until now. Thanks to cognitive computing, machines are bringing human-like intelligence to many business applications, including big data. So, what is cognitive computing? According to Forbes, “cognitive computing comes from a mashup of cognitive science—the study of the human brain and how it functions—and computer science.” This definition is a good place to start. However, to really understand what cognitive computing is, we have to go a little deeper.
Tags : 
    
Expert System
Published By: BehavioSec     Published Date: Sep 30, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Start   Previous    1 2 3 4 5 6 7     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.