data

Results 1 - 25 of 9764Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Oracle     Published Date: Nov 28, 2017
Todays leading-edge organizations differentiate themselves through analytics to further their competitive advantage by extracting value from all their data sources. Other companies are looking to become data-driven through the modernization of their data management deployments. These strategies do include challenges, such as the management of large growing volumes of data. Todays digital world is already creating data at an explosive rate, and the next wave is on the horizon, driven by the emergence of IoT data sources. The physical data warehouses of the past were great for collecting data from across the enterprise for analysis, but the storage and compute resources needed to support them are not able to keep pace with the explosive growth. In addition, the manual cumbersome task of patch, update, upgrade poses risks to data due to human errors. To reduce risks, costs, complexity, and time to value, many organizations are taking their data warehouses to the cloud. Whether hosted lo
Tags : 
    
Oracle
Published By: Hewlett Packard Enterprise     Published Date: Feb 05, 2018
As businesses plunge into the digital future, no asset will have a greater impact on success than data. The ability to collect, harness, analyze, protect, and manage data will determine which businesses disrupt their industries, and which are disrupted; which businesses thrive, and which disappear. But traditional storage solutions are not designed to optimally handle such a critical business asset. Instead, businesses need to adopt an all-flash data center. In their new role as strategic business enablers, IT leaders have the responsibility to ensure that their businesses are protected, by investing in flexible, future-proof flash storage solutions. The right flash solution can deliver on critical business needs for agility, rapid growth, speed-to-market, data protection, application performance, and cost-effectivenesswhile minimizing the maintenance and administration burden.
Tags : 
data, storage, decision makers, hpe
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Jan 08, 2018
Data is a driver of growth and change that is quickly becoming the world's most valuable resource. As such, finance leaders face increased pressure to value data as an asset on their balance sheets and use it to drive business strategy. To capitalize on the power of data, learn how to pinpoint where you are today. what steps you can take to reach your goals and how to measure success.
Tags : 
    
Oracle
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : 
detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Oracle ZDLRA     Published Date: Jan 10, 2018
Business leaders expect two things from IT: keep mission-critical applications available and high performing 24x7 and, if something does happen, recover to be back in business quickly and without losing any critical data so there is no impact on revenue stream. Of course, there is a gap between this de facto expectation from nontechnical business leaders and what current technology is actually capable of delivering. For mission-critical workloads, which are most often hosted on databases, organizations may choose to implement high availability (HA) technologies within the database to avoid downtime and data loss.
Tags : 
recovery point, recovery time, backup appliance, san/nas, service level agreement, oracle
    
Oracle ZDLRA
Published By: Oracle ZDLRA     Published Date: Jan 10, 2018
Traditional backup systems fail to meet the database protection and recovery requirements of modern organizations. These systems require ever-growing backup windows, negatively impact performance in mission-critical production databases, and deliver recovery time objectives (RTO) and recovery point objectives (RPO) measured in hours or even days, failing to meet the requirements of high-volume, high transactional databases -- potentially costing millions in lost productivity and revenue, regulatory penalties, and reputation damage due to an outage or data loss.
Tags : 
data protection, backup speed, recovery, overhead, assurance, storage, efficiency, oracle
    
Oracle ZDLRA
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
As organizations seek to extract more strategic value from their data, many are starting to view data governance as an enabler of insight rather than an impediment to its creation. This report explores a leading approach to data governance and the impact it can have on todays most data-rich organizations.
Tags : 
data governance, data-rich organizations
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
For data-driven businesses, cloud can be a boon. Data can be found, processed and managed on the cloud without an investment in local hardware infrastructure, but what does that mean to information trust and governance? When data comes from cloud-based sources, IT needs a plan for data integration and security. Download this insightful white paper and learn the four key priorities you must consider when developing your IT strategy to promote good hybrid information governance. Learn the blend of process, organizational and technical enablers that will allow you to move to a hybrid environment with speed and confidence.
Tags : 
data-driven business, cloud, information trust, information governance, data integration, data security, it strategy
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Feb 01, 2018
Client-ready, globally applicable, a document setting out the IBM journey to GDPR Readiness
Tags : 
gdpr, compliance, data protection, personal data
    
Group M_IBM Q1'18
Published By: Sitecore EMEA     Published Date: Jan 23, 2018
Its no longer enough just to convertto stay competitive, you need to turn prospects into lifelong fans of your brand. But with commerce channels and buying behavior changing so fast, we all know thats easier said than done. What were once communications channels are now becoming commerce channels, with consumers making purchases on their TVs, on Twitter, and by text message. In the past, commerce and content data and experiences sat in their own silos. Those days are gone.
Tags : 
commerce, channels, content, customer, optimization, sitecore
    
Sitecore EMEA
Published By: Sitecore EMEA     Published Date: Jan 23, 2018
The global beauty company provides an exhilarating example of the power of context-driven commerce. When customers can rely on brands to achieve the outcomes that are important to them, brand owners can shift their focus from nonstop customer acquisition to long-term customer engagement. The Sitecore Experience Platform and the underlying Sitecore Experience Database are foundation technologies for IT organizations wanting to implement context-driven commerce environments that function elegantly today and into the future. Sitecore puts an end to digital retailers obsession with cart abandonment, replacing it with opportunities to delight customers with personal, meaningful commerce offers.
Tags : 
advertising, revenue, customers, social channels, sitecore
    
Sitecore EMEA
Published By: Quick Base     Published Date: Dec 18, 2017
Spreadsheets are good for number crunching but many professionals use them to do things they were never meant for. The result? Long office hours, chasing down status updates, and compiling data manually. Learn the 5 signs of spreadsheet misuse and how to overcome them in this webcast.
Tags : 
audit, insights, accounting, ap management, compliance, finance, spreadsheets, collaboration
    
Quick Base
Published By: Schneider Electric     Published Date: Feb 06, 2018
Expert insights. Free report download!
Tags : 
hybrid it, hybrid it data center, data center management, data center cloud, data center on premise
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 06, 2018
Practical tips and advice in this free e-book
Tags : 
data center facility operations, data center operations, data center facilities, data center management, data center pitfalls
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 06, 2018
The growth and importance of edge and cloud-based applications are driving the data center industry to rethink the optimum level of redundancy of physical infrastructure equipment. Read our recommendations for evaluating resiliency needs in White Paper 256: "Why Cloud Computing is Requiring Us to Rethink Resiliency at the Edge."
Tags : 
edge computing, data center, cloud computing, cloud based applications
    
Schneider Electric
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Every users first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your companys URL, a DNS query is routed to a DNS nameserver containing the address mappings for your companys internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle Dyn
Published By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: How the right providers can help you build a business case for GDPR compliance Ways providers can directly aid in the compliance process Why the right tools can help with not just technology but process changes as well
Tags : 
software provider, cloud service provider, gdpr
    
Mimecast
Published By: Mimecast     Published Date: Nov 28, 2017
Does your organization have a plan for complying with the European Unions General Data Protection Regulation (GDPR)? If email isnt a part of that plan, you could face significant challenges, including severe financial penalties. Download now to get the facts about: Why you cant compromise when it comes to protection of email data The challenges presented by Subject Area Requests How noncompliance could cost your organization more than just money
Tags : 
gdpr, email compliance, data protection, compliance
    
Mimecast
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection.
Tags : 
    
Carbonite
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.