Tag : Machine Learning

AI AI-driven infrastructure Articles Artificial Intelligence C2 Winter 2021 Data Data Security

Democratization of AI in the Enterprise

Frederic Van Haren
The democratization of Artificial Intelligence (AI) makes it easier for organizations to transform their business with AI. It wasn't that long ago that applying AI to transform a business required a lot of technical expertise...
Articles C2 Winter 2021 Data

To bring strategy back into your security, turn to chess

Ramsés Gallego
In a game of chess, skilled players need to think in two ways at once. Tactically, they need to be able to respond to the immediate situation on the board, countering threats and finding ways...
AI-driven infrastructure Articles C2 Fall 2021 Data Storage HPE InfoSight

Rise Above Downtime: 4 Critical Components of AI-Driven Infrastructure Deliver Agility and Uptime

Sandeep Singh
Data-driven companies face a constant battle against downtime, but you can be prepared. Intelligently engineered AI-driven infrastructure lets your IT organization rise above the traditional monitoring tools to deliver the agility and uptime that your...
Articles Artificial Intelligence C2 Spring 2021 Data

Conversational AI with Transfer Learning

Frederic Van Haren
Introduction I recently joined Stephen Foskett from Gestalt IT on a video podcast to discuss “Improving AI with Transfer Learning”. This podcast is part of a series of podcasts on “Utilizing AI”. The series focuses...
Articles Artificial Intelligence C2 Spring 2021 Data

The journey to modern data management is paved with an inclusive edge-to-cloud Data Fabric

Dana Gardner
The next BriefingsDirect Voice of Analytics Innovation discussion focuses on the latest insights into end-to-end data management strategies....
Articles Artificial Intelligence C2 Spring 2021

Cyber resilience and machine learning – The perfect partnership

Ramsés Gallego
The business of the future will need to take the journey from cybersecurity to cyber resilience if it wishes to protect its valuable data. Malicious parties are on the hunt for valuable data, and your...