Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Intelligent Automation with VMware
  • Toc
  • feedback
Intelligent Automation with VMware

Intelligent Automation with VMware

By : Kundan
5 (2)
close
Intelligent Automation with VMware

Intelligent Automation with VMware

5 (2)
By: Kundan

Overview of this book

This book presents an introductory perspective on how machine learning plays an important role in a VMware environment. It offers a basic understanding of how to leverage machine learning primitives, along with a deeper look into integration with the VMware tools used for automation today. This book begins by highlighting how VMware addresses business issues related to its workforce, customers, and partners with emerging technologies such as machine learning to create new, intelligence-driven, end user experiences. You will learn how to apply machine learning techniques incorporated in VMware solutions for data center operations. You will go through management toolsets with a focus on machine learning techniques. At the end of the book, you will learn how the new vSphere Scale-Out edition can be used to ensure that HPC, big data performance, and other requirements can be met (either through development or by fine-tuning guidelines) with mainstream products.
Table of Contents (19 chapters)
close
Free Chapter
1
Section 1: VMware Approach with ML Technology
7
Section 2: ML Use Cases with VMware Solutions
13
Section 3: Dealing with Big Data, HPC , IoT, and Coud Application Scalability through ML

Workspace ONE Intelligence

Workspace ONE Intelligence has capabilities to better leverage the Workspace ONE platform with data-based actions and resolution from a single repository. Users want to access their corporate data and applications from anywhere on any device. Security tools are not able to take care of end user requirements and security risks in a proactive way in the current environment. Customers can't get complete insight into device, application, and user data due to the always-changing perimeter ( Location of End User's Device ) which creates big cybersecurity threats and complicates the management task.

Every organization has to take care of their employees as well as not compromise security. Employee productivity is affected by application execution issues and irregular services. It will be affected by frequent changes in application access...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete