Quantcast
Channel: Webinars & Events – Intellyx – The Digital Transformation Experts – Analysts
Browsing all 3452 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Corretora de criptomoedas tenta formalizar bitcoin, ligado a usos ilegais

By Maria Eduarda Cury Ainda que a transparência e a segurança do bitcoin sejam seus pontos fortes, uma vez que transações ficam registradas em um livro-razão digital público, a moeda é mais utilizada...

View Article


Image may be NSFW.
Clik here to view.

Sam Hinkie to keynote at Cleo Connect 2019

By Christian Hargrave  Cleo is pleased to announce that Sam Hinkie, former president and general manager of the Philadelphia 76ers basketball team, and Charles Araujo, principal analyst at Intellyx and...

View Article


Image may be NSFW.
Clik here to view.

How to find the best low-code development platform: Ask these 9 questions

By Joe Stangarone 2. What kinds of apps will you be building? As I touched on above, not all low-code platforms are created equal. Some have a very specific focus, while others let you create a wide...

View Article

Image may be NSFW.
Clik here to view.

With Zowe, open source and DevOps are democratizing the mainframe computer

The venerable mainframe computer is experiencing a surprising but well-deserved resurgence, as the organizations that depend on these systems realize how important they are for digital initiatives and...

View Article

Image may be NSFW.
Clik here to view.

IT Operations Crisis Management Lessons from Notre Dame

I was on a conference call when the news flashed across my screen: “Notre Dame Cathedral is on fire.” The news was shocking — and heartbreaking. As the tragedy unfolded, I remember thinking, “How did...

View Article


Image may be NSFW.
Clik here to view.

Text IQ: Using AI to Help Enterprises Find and Secure Sensitive Information

An Intellyx BrainCandy Brief In the modern era of GDPR, heightened compliance demands, and broad privacy concerns, enterprises must now navigate a veritable minefield of risks associated with sensitive...

View Article

Image may be NSFW.
Clik here to view.

Unauthorized Change: The Devil You Don’t Know

Intellyx BrainBlog by Jason English for Evolven Why do IT governance and configuration management processes fail to catch these unauthorized changes? Everything’s locked down to get ready to stream...

View Article

Image may be NSFW.
Clik here to view.

Corent: SaaS Enablement as-a-Service to ‘SaaSify’ any App

An Intellyx Brain Candy Brief To turn a traditional, on-premises app into a cloud-based Software-as-a-Service (SaaS) app, simply lift and shift it into a VM and you’re done, right? If only it were that...

View Article


Image may be NSFW.
Clik here to view.

BPM & Process Mining – Intellyx

By laura.balp As enterprises’ view of business processes evolve from static, rote sequences of tasks to a dynamic, customer-focused context, the business process management (BPM) platforms that help...

View Article


Image may be NSFW.
Clik here to view.

The Three Essential Elements to Getting Value Stream Management Right

By Plutora Value Stream Management (VSM) is one of the hottest emerging topics in the world of software delivery. But breakthrough the buzzword static and it may also be the most misunderstood idea...

View Article

Image may be NSFW.
Clik here to view.

5 outdated technology practices that doom digital transformations

By Isaac Sacolick Bimodal IT might have been a necessary transition for large IT organizations to better deliver new customer experiences and begin the adoption of agile practices. But it didn’t take...

View Article

Image may be NSFW.
Clik here to view.

The Curse of BPMN: Process Modeling for the Digital Era

By Jason Bloomberg If you’re an old consultant like me, when you hear the phrase ‘process modeling,’ you probably think of a group of people in a stuffy conference room, arguing over how the business...

View Article

Image may be NSFW.
Clik here to view.

Why are We Still Talking about IBM i?

There’s an old IT joke that the definition of ‘legacy’ is ‘anything that works.’ The applications running on the venerable IBM i midrange operating system are a case in point. The original AS/400. Even...

View Article


Image may be NSFW.
Clik here to view.

The crypto black list

By AJ Reardon Jason Bloomberg “We must make all cryptocurrency as we know it today illegal.” We Need To Shut Bitcoin And All Other Cryptocurrencies Down. Here’s Why. (2018) Read the entire article here.

View Article

Image may be NSFW.
Clik here to view.

14 Best Business Intelligence LinkedIn and Facebook Groups

By Geoff Hoppe  Business Intelligence Groups on LinkedIn Business Intelligence and Analytics Best Practices Full disclosure: IBM’s the group sponsor. That said, BIABP is useful whether you use IBM for...

View Article


Image may be NSFW.
Clik here to view.

Yellowfin: Helping Organizations Find Insights, Tell Stories, and Make...

An Intellyx BrainCandy Brief Organizations have been collecting data for decades. Entire industry sectors have sprung up to help them manage and present it. Despite these efforts, however, most...

View Article

Image may be NSFW.
Clik here to view.

White Paper: How to Bring Cloud-Native Computing to the Enterprise

As the complexity of modern IT continues to explode with no limits in sight, organizations are increasingly leveraging cloud-native computing to bring the best practices of the cloud to their entire IT...

View Article


Image may be NSFW.
Clik here to view.

Luminati: A Global, Peer-to-Peer Intelligence Network for the Enterprise

An Intellyx BrainCandy Brief In a fast-moving, complex world, enterprise leaders often struggle to navigate the difficult challenges and decisions they must make because they lack one critical...

View Article

Image may be NSFW.
Clik here to view.

Centripetal Networks: Threat Intelligence Gateway that Leverages Thousands of...

An Intellyx Brain Candy Brief Researchers, administrators, government agencies, and security personnel uncover malicious online behavior on a continual basis, in the form of URLs, IP addresses, and...

View Article

Image may be NSFW.
Clik here to view.

Vectra: AI-Driven Threat Detection and Response in the Cloud

An Intellyx Brain Candy Brief Vectra captures and normalizes network metadata at scale and enriches them with machine learning-derived security information. It then uses this information to detect...

View Article
Browsing all 3452 articles
Browse latest View live