Nouvelle recherche

Si vous n'êtes pas satisfait-e- des résultats ci-dessous, vous pouvez lancer une autre recherche.

189 résultats de recherche pour : Lean

172

Technical Solutions Used for AI

To gather insights on the state of artificial intelligence (AI), and all of its sub-segments — machine learning (ML), natural language processing (NLP), deep learning (DL), robotic process automation (RPA), regression, et al — we talked to 21 executives who are implementing AI in their own organization and helping others understand how AI can help […]

173

airgeddon – Wireless Security Auditing Script

Airgeddon is a Bash powered multi-use Wireless Security Auditing Script for Linux systems with an extremely extensive feature list. Airgeddon Wireless Security Auditing Features Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing DoS over wireless networks using different methods. “DoS Pursuit mode” available to avoid AP channel hopping (available also on DoS […]

174

Investing in Trusted Data

Here’s a question: Do consumers, suppliers, and partners trust companies to do the right thing with their personal and business data? Given the high-profile data security breaches dominating the news lately, it’s unlikely. Lack of trust regarding organizations’ data practices is rising and this not only damages a brand’s reputation, it can adversely affect an […]

176

Why ITIL Should Invite More Folks to the ITSM Party

IT Value System Business focus has changed today from process-centric to customer-centric and value-centric. The key priorities are faster time to market, improving efficiency through automation, providing real value to internal & external customers in order to stay competitive and cost effective. The age of digital transformation and innovation demand businesses to change and adapt […]

177

TA18-074A: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

Original release date: March 15, 2018 | Last revised: March 16, 2018 Systems Affected Domain Controllers File Servers Email Servers Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides information on Russian government actions targeting […]

178

Women in Product Management: Lori Anderson, VP Technical Product Management at McGraw-Hill Education

For our next installment of the Women in Product Management Series, I interviewed Lori Anderson, VP Technical Product Management at McGraw-Hill Education To catch the entire series on Women in Product Management make sure to sign up for our newsletter. How does a teacher in the inner city of New Orleans become a VP of […]

180

Le cryptojacking prend des proportions alarmantes, selon AdGuard

Le minage de cryptomonnaie, Bitcoin ou autre, consomme beaucoup d’électricité et demande de grosses ressources matérielles. Bien sûr des petits malins n’ont pas manqué de trouver le moyen d’utiliser l’électricité et les ressources matérielles d’autrui. Si bien qu’un nouveau fléau sévit sur Internet : le cryptojacking. Le cryptojacking est défini comme l’utilisation secrète de votre terminal […]