https://store-images.s-microsoft.com/image/apps.12362.18e745ec-8832-4df2-9eff-878ccfdfef17.5ff2cb36-6407-4c1a-a277-10e7e600e30e.2380a07e-8087-46e5-b3da-f4d3cb00746d
Cisco Edge Intelligence
yayıncı: Cisco Systems, Inc.
Just a moment, logging you in...
CEI runs on Cisco’s industrial networking simplifying connectivity for distributed industrial assets
Cisco Edge Intelligence is IoT software that quickly and securely delivers data from connected assets at the network edge to multi-cloud application destinations. The software integrates with Cisco’s industrial networking and compute devices for an out-of-the box experience that simplifies deployment and lowers costs. It also provides organizations with data ownership and governance (from extraction through transformation) and secure delivery to a company’s applications, wherever they may be. Edge Intelligence comes with an intuitive UI and is integrated with Microsoft Visual Studio so that the data gets delivered to the right application with just a click of a button
Bir bakışta
https://store-images.s-microsoft.com/image/apps.43976.18e745ec-8832-4df2-9eff-878ccfdfef17.4456d585-1f2b-4853-8155-96ab96a14a5b.51109f57-1b95-445d-a13f-46c8c412f570
Diğer Cisco Systems, Inc. uygulamaları
Cisco Catalyst 8000V Edge Software (BYOL)Cisco Systems, Inc.Deploy and manage enterprise-class networking services and VPN technologies for the Azure cloud.
+1
Applicable to:
Virtual Machines
NaN out of 5
Cisco Identity Services Engine (ISE)Cisco Systems, Inc.Cisco Identity Services Engine (ISE)
+1
Applicable to:
Virtual Machines
NaN out of 5
Cisco Identity Services Engine (ISE)Cisco Systems, Inc.Cisco Identity Services Engine (ISE)
+1
Applicable to:
Azure Applications
NaN out of 5
Cisco Catalyst 8000V Edge Software - Solution DeploymentCisco Systems, Inc.Deploy and manage enterprise-class networking services and VPN technologies for the Azure cloud.
+1
Applicable to:
Azure Applications
NaN out of 5
Cisco Secure Access Resource ConnectorCisco Systems, Inc.Cisco Secure Access resource connectors securely forward authorized remote user traffic to resources on your network using Zero Trust Network Access.
+1
Applicable to:
Virtual Machines
NaN out of 5