Фильтры
Обзор консультационных услуг
Уточните предложения, выбрав фильтры и параметры сортировки.
8-Wk - Predictive Maintenance Implementation54cuatro Mexico2-Month Implementation of Predictive Maintenance using ML with OpenAI for Enhanced Fail Detection
+3
Applicable to:
AI & Machine Learning
Big Data
Internet of Things
1 out of 60
Cloud Migration Assessment FrameworkCelebal Technologies Private LimitedEmbark on Your Cloud Transformation Journey with Our Comprehensive Assessment Framework
+1
Applicable to:
Migration
2 out of 60
IBM Cloud XDR Managed ServiceIBM Security ServicesManaged Service Implementation of IBM's Cloud XDR Service, an end to end managed service utilising Microsoft Sentinel and the Microsoft Defender Suite.
+1
Applicable to:
Security
3 out of 60
Generative Lakehouse: Unleash AI Potential for Data-Driven ExcellenceAdastra CorporationTransform your business with Adastra's 20+ years of AI/ML expertise on Azure. Accelerate processes and boost revenue with data-driven decisions.
+2
Applicable to:
Analytics
AI & Machine Learning
4 out of 60
Accelerate Cloud AdoptionGlobant LLCAccelerate your journey to cloud with Globant services
+2
Applicable to:
DevOps
Migration
5 out of 60
Open AI Enablement and Architecture: 10-Day PoCAI Consulting GroupUnlock the potential of Open AI through a 10-day Proof of Concept (PoC) that delves into its capabilities, functionalities, demonstrates potential applications, and prepare for implementation.
+3
Applicable to:
AI & Machine Learning
Data Platform
Storage
6 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SASUtilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
+2
Applicable to:
Identity
Security
7 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SASElevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
+3
Applicable to:
Analytics
Identity
Security
8 out of 60