data availability

Results 1 - 25 of 299Sort Results By: Published Date | Title | Company Name
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Feb 18, 2019
The largest national multiline insurance had built a repository of Insurance policies (P&C and Life Insurance) on Microfilm and Microfiche in early 90s, as a preservation strategy. They were grappling with issues as this technology became outdated over time: Risk of losing their only source of data for Insurance policies and corresponding communication, need to improve data availability and speed of claims evaluation Compliance issues, need of a WORM (write once read many) storage compliant with FINRA regulations, where data should be encrypted when at rest Total cost for digitization compared to 10-12 years of support left to maintain insurance policies was not very encouraging Required a low cost, cloud-based, FINRA-compliant document management solution which could provide quick access to stored data Download complete case study to know how LTIs e-Office sDownload full case study to know how LTIs e-Office solution enabled 50% TCO for Largest national Multiline Insurance.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
In recent years, data has had a resurgence being labeled as one of the newer trends in education. The reality is data and schools go hand in hand. The concept of collecting and utilizing data in education dates back as early as the 1800s. So, whats different and why now? Is it the increased availability, a better understanding of its potential, or signs that a long-awaited paradigm shift may be coming? I would argue its a combination of all three. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Cisco EMEA     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : 
hyperflex, systems, data platform, storage efficiency, business, cisco
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For the typical enterprise, the volume of data that needs to be managed and protected is growing at roughly 40% per year. Add to that the performance requirements of new applications and the demands for instant response time, always-on availability, and anytime-anywhere access. With such demands, data center managers face storage challenges that cannot be addressed using traditional, spinning-disk technology.
Tags : 
    
Hewlett Packard Enterprise
Published By: HPE Intel     Published Date: Mar 15, 2016
Accelerate your journey to an all-flash data center with Hewlett Packard Enterprise Storage Consulting solutions. Slash costs and double performance with HPE 3PAR StoreServ All-flash arrays. Now you no longer need to choose which apps to take to flash; take them all and you wont regret it. We deliver maximum performance, highest availability, Tier-1 data services, ease of management, and robust data protection at the lowest total cost of ownership (TCO) on the market when you engage with HPE Storage Consulting to provide an end-to-end all-flash solution.
Tags : 
    
HPE Intel
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: Nov 03, 2016
IT managers are struggling to keep up with the always available demands of the business. Data growth and the nearly ubiquitous adoption of server virtualization among mid-market and enterprise organizations are increasing the cost and complexity of storage and data availability needs. This report documents ESG Lab testing of Dell EMC Storage SC Series with a focus on the value of enhanced Live Volume support that provides always-available access with great ease of use and economics.
Tags : 
storage, data, sql, architecture, storage management, data integration, data protection, database security
    
Dell EMC
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Every week InfoSight analyzes more than a trillion data points from more than 9,000 customers. How does this translate into true business value? By reducing your business risk with over Six-Nines of measured availability. By providing you with an infrastructure that gets smarter every single day. By empowering IT staff to focus on business priorities instead of mundane maintenance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jan 05, 2015
Virtualization has transformed the data center over the past decade. IT departments use virtualization to consolidate multiple server workloads onto a smaller number of more powerful servers. They use virtualization to scale existing applications by adding more virtual machines to support them, and they deploy new applications without having to purchase additional servers to do so. They achieve greater resource utilization by balancing workloads across a large pool of servers in real timeand they respond more quickly to changes in workload or server availability by moving virtual machines between physical servers. Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: HPE     Published Date: Feb 11, 2015
Protecting your business-critical applications without impacting performance is proving ever more challenging in the face of unrelenting data growth, stringent recovery service level agreements (SLAs) and increasingly virtualized environments. Traditional approaches to data protection are unable to cost-effectively deliver the end-to-end availability and protection that your applications and hypervisors demand. A faster, easier, more efficient, and reliable way to protect data is needed.
Tags : 
    
HPE
Published By: Dell     Published Date: May 13, 2016
Businesses using outdated servers for email, database, and file and print workloads stand to benefit greatly by replacing them. The Dell PowerEdge VRTX with two Dell PwerEdge M630 blase servers, both powered by the Intel Xeon processor E5-2650 v3, can provide the performance, scalability, and high availability your business needs to keep running and meet increased demand.
Tags : 
    
Dell
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
discover how the new Nimble Storage Secondary Flash array and Veeam Availability Suite software empowers organizations to improve data availability, while increasing IT agility and infrastructure ROI.
Tags : 
    
Hewlett Packard Enterprise
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content? But safeguarding a digital experience isnt a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. Youll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss administration errors, system or media failures, cyberattacks, and morebut we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracles database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
    
Oracle
Published By: Dell EMC     Published Date: May 12, 2016
Businesses using outdated servers for email, database, and file and print workloads stand to benefit greatly by replacing them. The Dell PowerEdge VRTX with two Dell PwerEdge M630 blase servers, both powered by the Intel Xeon processor E5-2650 v3, can provide the performance, scalability, and high availability your business needs to keep running and meet increased demand.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 10, 2015
From your most critical workloads to your cold data, a scale-out or scale-up storage solution one that can automatically tier volumes or data to the most appropriate arrays or media (flash SSDs or HDDs) and offers advanced software features to help ensure availability and reliability can help you efficiently manage your data center.
Tags : 
    
Dell EMC
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in todays global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limitdemanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in todays global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limitdemanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: Dell EMC     Published Date: May 10, 2017
While just about everyone is writing about how IT and the businesses it serves need to be transformed, the actual industry answers to both digital and IT transformation remain unclear at best. Are transformational initiatives all about analytics and big data? Or are they about the move to cloud in all its varieties? Support for mobile? More agile ways of working and developing software? Or are they actually all about crafting teams to promote more proactive dialog between the business and IT? The truth is, of course, digital and IT transformation depend on all of the above and more. They also depend on a resilient infrastructure thats easily adapted to changing business priorities without requiring long hours spent on maintenance, updates, and addressing problems of service availability. But making all this work clearly and cohesively is far beyond the purview of almost any solution todaywhether from a software management perspective or from a hardware infrastructure perspective.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : 
application, security, performance, web attacks, data security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundariesmeaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Emerson Network Power     Published Date: Feb 07, 2011
In this whitepaper, we will explain trends that drive management challenges that data center operators are faced with. We will then show you the value proposition of Emerson's solutions, which can help you to: . Adapt data center infrastructure without increased cost; . Improving efficiency without added risk; . Maximize existing infrastructure investments; . Ensure availability of mission-critical services; and . Extend the life of existing infrastructure. Read on for more.
Tags : 
emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud, server virtualization, design and facilities, power and cooling
    
Emerson Network Power
Published By: Akamai Technologies     Published Date: Apr 13, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundariesmeaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundariesmeaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.