RSS feed Get our RSS feed

News by Topic

data management

Results 351 - 375 of 2393Sort Results By: Published Date | Title | Company Name
By: Sybase     Published Date: Dec 01, 2011
This free white paper explores how IT departments at financial institutions are assuming a more proactive role in identifying technologies.
Tags : capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
     Sybase
By: Sybase     Published Date: Dec 01, 2011
This white paper looks at managing securities trading data based on a robust process and technology infrastructure.
Tags : capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
     Sybase
By: Sybase     Published Date: Dec 01, 2011
This white paper shows the success of using a visual data analytics platform to monitor and manage positions/exposure in real time.
Tags : capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
     Sybase
By: Sybase     Published Date: Dec 01, 2011
This free white paper shows you how leading financial services companies are reaping the benefits of Continuous Intelligence.
Tags : capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
     Sybase
By: Dell & Microsoft     Published Date: Aug 14, 2013
Organizations everywhere are turning to virtualization, cloud computing, and mobile technologies to support anytime, anywhere access to today’s work load intensive, data-heavy applications. Dell PowerEdge 12th generation servers—built for high performance, 24/7 availability, and uncompromised reliability—can help IT organizations deliver the benefits of these transformative technologies.With cost-saving power, cooling, space, and management efficiencies, Dell’s new servers offer data centers unparalleled performance, efficiency, and reliability for a diverse range of enterprise applications.
Tags : data center, dell poweredge 12th generation servers, virtualization, cloud computing, mobile technologies, data-heavy applications, cost-saving power, management efficiencies
     Dell & Microsoft
By: Oracle     Published Date: Feb 28, 2018
When application and database numbers increase, how does an organisation avoid overstretching its staff, multiplying costs, and complications? Many companies are using Oracle Exadata—a platform that’s powerful, optimised, and cloud-ready when you are. And they’re seeing, on average, a five-year ROI of 429 percent, 94 percent less unplanned downtime, and 103 percent improvement in transaction rates. See our infographic for more significant findings.
Tags : database, application, revenue, downtime, results, financial
     Oracle
By: GE Healthcare     Published Date: May 12, 2015
Ongoing IT system improvements are required for cardiologists and cardiovascular clinicians to enhance the overall quality of care experience.
Tags : cardiovascular care, patient data software management, cost containment, secure data integration, analytics, workflow, productivity, billing
     GE Healthcare
By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection
     Venafi
By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
     Venafi
By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
     Venafi
By: MobileIron     Published Date: Sep 07, 2017
Secure corporate data, drive employee productivity, and enable business innovation in ways you never thought possible. Harness the power of mobile devices with the leading enterprise mobility management (EMM) platform from MobileIron. By providing a modern EMM solution that meets both user demands and IT security requirements, MobileIron enables today’s large enterprises to become truly Mobile First.
Tags : mobileiron, information technology, platform, security, mobile devices
     MobileIron
By: GE Healthcare     Published Date: May 12, 2015
Help optimize cardiovascular care with a single database of images and information from virtually anywhere there is an internet connection.
Tags : cardiovascular diagnostics, image quality, secure web-based data integration, remote access, cardiovascular information system, cvis software, cvpacs, cardiovascular informatics
     GE Healthcare
By: GE Healthcare     Published Date: May 12, 2015
Ongoing IT system improvements are required for cardiologists and cardiovascular clinicians to enhance the overall quality of care experience.
Tags : cardiovascular care, patient data software management, cost containment, secure data integration, analytics, workflow, productivity, billing
     GE Healthcare
By: BMC Software     Published Date: Jul 22, 2015
The rise of the digital enterprise has created an explosion of valuable, yet unharnessed data for IT organizations. Traditional IT tools and processes, founded on the notion of control and management, are unable to support the speed and agility requirements of the digital enterprise. IT organizations must reengineer their approach from traditional analytics and reporting to adaptive, real-time digital service analytics.
Tags : 
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
The rise of the digital enterprise has created an explosion of valuable, yet unharnessed data for IT organizations. Traditional IT tools and processes, founded on the notion of control and management, are unable to support the speed and agility requirements of the digital enterprise. IT organizations must reengineer their approach from traditional analytics and reporting to adaptive, real-time digital service analytics.
Tags : operations analytics, digital enterprise, data, data management, service analytics
     BMC Software
By: Lenovo and Intel®     Published Date: Feb 29, 2016
Since acquiring the x86 line of business from IBM in 2014, Lenovo has been a top vendor in the category.
Tags : lenovo, server, data management, laptop, reliability
     Lenovo and Intel®
By: Red Hat     Published Date: Jun 23, 2016
FICO, a data analytics software company, wanted to diversify into new markets its core offering of providing on-premise software to major corporations. To do this, the company launched FICO Analytic Cloud, a cloud delivery channel that enables FICO to serve organizations of all sizes. FICO Analytic Cloud was first launched in 2013 and provides Platform-as-a-Service (PaaS) access to FICO Decision Management Platform, which allows customers to use FICO tools and technology to create, customize, and deploy applications and services. FICO Decision Management Platform is built on OpenShift Enterprise by Red Hat, which provides the PaaS tools and support FICO needed to rapidly scale the platform and Analytic Cloud.
Tags : technology, data, enterprise, best practices, software
     Red Hat
By: SolidFire_NetApp     Published Date: Oct 10, 2016
This paper introduces five architectural principles guiding the development of the next generation data center (NGDC). It describes key market influences leading a fundamental enterprise IT transformation and the technological trends that support it. The five principles are: scale-out, guaranteed performance, automated management, data assurance, and global efficiencies. Cloud infrastructure delivery models such as IaaS, private clouds, and software-defined data centers (SDDC) are foundations for the NGDC. In an era where IT is expected to ensure productiongrade support with a plethoric flow of new applications and data, these models demonstrate how to eliminate bottlenecks, increase self-service, and move the business forward. The NGDC applies a software-defined everything (SDx) discipline in a traditional, hardware-centric business to gain business advantage.
Tags : 
     SolidFire_NetApp
By: VMware     Published Date: Jul 01, 2016
Cloud computing adoption continues to expand as the overall benefits of cloud (cost efficiency, self-service, and IT standardization) are becoming more broadly recognized. While private cloud is the primary type of cloud infrastructure that is in use today, organizations are finding that cloud can no longer be a standalone IT sourcing and consumption model. Enterprises demand greater flexibility and scalability, leading them to invest in hybrid cloud models, which supply them with a seamless application, data, and management environment across all of their IT resources. IDC expects that the percentage of users who adopt private or public cloud models will diminish over the next several years, as enterprises increasingly choose to implement a hybrid cloud model.
Tags : vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension
     VMware
By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : mobile devices, enterprise, best practices, management
     Microsoft
By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : technology, best practices, data, enterprise, business analytics, business intelligence, business management
     Microsoft
By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics