GENERAL AI, AI APPLICATIONS

Dell PowerScale: Key Performance Prediction using Artificial Intelligence for IT Operations (AIOps)

September 28, 2022

dell-powerscale-key-performance-prediction
Architecting IT infrastructure has never been more challenging than it is today. Many enduser workloads, such as semiconductor design, autonomous driving development, and life sciences and healthcare are growing more complex every day. With that complexity comes growing demand on IT.

Spotlight

ICE Technologies

Since our founding in 1990, ICE Technologies has been passionate about helping small to mid-size businesses succeed with information technology. We provide IT services in two categories: "All-In" for clients that want to toss someone the keys and never worry about their IT again — and Co-Managed solutions for our customers who have a great IT person or team but want to off-load just a select portion.

OTHER WHITEPAPERS
news image

Front Line Consulting

whitePaper | April 16, 2020

Front Line Consulting (FLC) is a government consulting firm—and majority veteran-ownedand-operated Project Manager-as-Agent. Presently, FLC is managing a group of 60 publicly-funded projects for Travis County, home of the unequalled Austin, Texas. Front Line’s responsibilities include meeting a tight “substantial completion” deadline defined in public forum, coming in on (taxpayer-funded) budget, and keeping elected officials apprised of financials and material progress in projects within their respective jurisdictions.

Read More
news image

China’s Advanced AI Research

whitePaper | July 29, 2022

China is following a national strategy to lead the world in artificial intelligence by 2030, including by pursuing “general AI” that can act autonomously in novel circumstances. Open-source research identifies 30 Chinese institutions engaged in one or more of this project‘s aspects, including machine learning, brain-inspired AI, and brain-computer interfaces. This report previews a CSET pilot program that will track China’s progress and provide timely alerts.

Read More
news image

Why Better Mac Security Starts with Cloud Identity

whitePaper | August 17, 2020

For years, employees drove to an office, opened their computer, logged onto a corporate network with their username and password and got on with their workday. But working standard hours in a fixed office location is becoming more and more rare. In fact, a report by Gallup found that 43 percent of American employees work remotely.1 This growing mobile workforce requires the same, secure access to resources as their onsite counterparts — without connecting to the corporate network. And both onsite and remote employees need secure ways to access the expanding number of applications and resources that are hosted in the cloud. To accommodate, enterprise technology and IT practices must adapt.

Read More
news image

Modernize Your Payments Architecture

whitePaper | August 9, 2020

The payments industry is going through a period of massive disruption. Consumers increasingly expect a fast, easy payment process, coupled with immediate, uninterrupted access to account information and services.

Read More
news image

DELLQUINN: A Machine Learning-Based, Resource Capacity Optimization Solution

whitePaper | August 23, 2022

This white paper describes the features and benefits of a machine learning-based resource optimization solution that helps the Dell High End Storage Field Services Team perform capacity planning more efficiently and with the potential to optimize resource utilization and overtime.

Read More
news image

Best Practices for Secure Access of Third Party APIs from Mobile Apps

whitePaper | September 28, 2022

Mobile apps typically communicate with several backend services over the Internet. In some cases those services may have been developed specifically for that mobile app, but in most cases the app will be dependent on services developed by a 3rd party. This whitepaper discusses how communication with those services can be properly secured, and how Approov’s new runtime secrets protection feature enables significantly enhanced security to be added with a minimum of development effort.

Read More

Spotlight

ICE Technologies

Since our founding in 1990, ICE Technologies has been passionate about helping small to mid-size businesses succeed with information technology. We provide IT services in two categories: "All-In" for clients that want to toss someone the keys and never worry about their IT again — and Co-Managed solutions for our customers who have a great IT person or team but want to off-load just a select portion.

Events