RSS feed Get our RSS feed

News by Topic

data requirements

Results 1 - 25 of 328Sort Results By: Published Date | Title | Company Name
By: Dell EMC Storage     Published Date: Aug 20, 2019
The move to data-centric business models is geared to enable organizations to turn their data into data capital. Because of the more stringent performance, scalability, availability, flexibility, and management requirements of the data-centric model, these organizations must modernize their storage and data protection infrastructure through the process of IT transformation. This white paper defines data capital, describes how boosting data capital is a critical ingredient for competitive differentiation, and discusses the implications for data storage and data protection infrastructure. It then turns to an overview of the Dell EMC storage and data protection portfolio, exploring the benefits these solutions offer to organizations interested in crafting the most effective infrastructure to maximize the value of data capital.
Tags : 
     Dell EMC Storage
By: Cohesity     Published Date: Aug 09, 2019
As organizations continue to look for ways to increase business agility, a need for a modern database architecture that can rapidly respond to the needs of business is more apparent than ever. While an RDBMS still serves as a lifeline for many organizations, the adoption of technologies such as NoSQL and Hadoop are enabling organizations to best address database performance and scalability requirements while also satisfying the goals of embracing hybrid cloud and becoming more data-driven. And with organizations relying so heavily on these new technologies to yield rapid insights that positively impact the business, the need to evaluate how those new technologies are managed and protected is essential. Hadoop and NoSQL workloads are now pervasive in production environments and require “production-class” data protection, yet few data protection solutions offer such capabilities today.
Tags : 
     Cohesity
By: Cohesity     Published Date: Aug 09, 2019
The growing importance—and complexity—of data protection means old approaches no longer will get the job done in an era of exploding data volumes and ever-changing business requirements. It’s time to reimagine and reengineer your IT infrastructure for a more efficient, affordable and manageable data protection framework.
Tags : 
     Cohesity
By: IBM APAC     Published Date: Jul 19, 2019
It’s important to understand the impact of AI workloads on data management and storage infrastructure. If you’re selecting infrastructure for AI workloads involving ML and deep learning, you must understand the unique requirements of these emerging workloads, especially if you’re looking to use them to accelerate innovation and agility. This Gartner report highlights three main impacts that AI workloads have on data management and storage.
Tags : 
     IBM APAC
By: ETQ     Published Date: Jul 10, 2019
According to Gartner, "supply chain leaders responsible for quality management are shifting to software solutions that standardize processes, optimize data and ensure compliance. This research provides guidance for structuring a process for QMS software selection." Download this Gartner Analyst Guide to learn: Key challenges in the QMS software selection processes What to expect from different QMS solutions across the market Analysis of the current state of quality management to help define software requirements Self assessment questions and commonly sought QMS system functionalities to use in your decision making process
Tags : 
     ETQ
By: Adobe     Published Date: Jul 10, 2019
Every organisation is at a different point in their progression with campaign management. Maybe you’ve had some success with email marketing and you want to expand your efforts across additional channels. Perhaps you invested in a campaign management solution several years ago when you had fewer marketing channels, simpler data sets and less sophisticated customers. It could be you’re a new marketing team, eager to set yourself up for success with an enterprise-class campaign management solution that meets all the requirements you know about—and even some you don’t.
Tags : 
     Adobe
By: Cisco EMEA     Published Date: Jun 19, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
     Cisco EMEA
By: Dell EMEA     Published Date: Jun 14, 2019
The manufacturing industry has always been at the forefront of embracing new ways of doing things faster, smarter and better. Today, we’re at a fascinating inflection point. Industry 4.0 — a long-used term in manufacturing — has become increasingly mainstream, due to the availability of affordable IoT infrastructure, the desire to gain new business insights from data plus the arrival of advanced connectivity technologies, such as 5G. As a solution builder, you can help your manufacturing customers realize benefits in the era of new industrial revolution. We can help you manage data across the entire manufacturing process and supply chain, from the edge to the core to the cloud, speeding up you application development and compressing time to market. Our team of engineers and project managers are ready to help you design and build solutions on Tier 1 infrastructure to meet your unique requirements. Download this eBook to learn how to take advantage of Industry 4.0 and deliver Next Gen
Tags : 
     Dell EMEA
By: Spectrum Enterprise     Published Date: Jun 05, 2019
The success of every business is driven by the quality of its connections, whether with clients, employees, investors, suppliers, manufacturers or other key stakeholders. Increasingly, these relationships are measured through data-driven analytics, enhanced through video communication, and empowered through cloud computing and collaboration. As the volume of data grows, so do bandwidth requirements.
Tags : 
     Spectrum Enterprise
By: Schneider Electric     Published Date: May 31, 2019
Data center designs have become much more safe, reliable, & efficient. However, we must continue to adopt new designs & emerging technologies to stay ahead of the pace of change. In this webinar, Steve Wallage, Managing Director of BroadGroup Consulting, shares his expertise to help global colocation providers: 1. Learn what changes colocation providers can make to adapt to the marketplace 2. Understand the future requirements of hyperscale cloud players 3. Hear of successful projects around the world and why they succeeded
Tags : data center, business growth, schneider electric
     Schneider Electric
By: Sage EMEA     Published Date: May 31, 2019
Making Tax Digital (MTD) is part of a global trend. Governments around the world are making moves to implement electronic data submission and auditing requirements. It makes sense for them, of course – governments say that they are losing billions in tax revenue every year due to non-compliance, whether that’s through simple error or conscious fraud.
Tags : 
     Sage EMEA
By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
     Alert Logic
By: HERE Technologies     Published Date: May 22, 2019
Operational readiness depends on rich location data. When managing logistics and tracking high-value assets, there is no room for error and our new data-driven world demands richer, smarter advanced mapping and navigation services. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors—including Google, TomTom and Mapbox—and it named HERE the “undisputed leader” in location based services. Counterpoint recognized HERE for its integrated analytical capability and commitment to open partnerships, allowing for custom operational requirements and a truly mobile location intelligence platform. See how HERE provides the industry leading tools and expertise to process that data—streamlining the logistics supply chain, boosting responsiveness, and guaranteeing mission success.
Tags : mapping, defence, location data.
     HERE Technologies
By: HERE Technologies     Published Date: May 22, 2019
For 100% operational readiness in a data-driven culture, you need an optimized location platform. Ovum’s Location Platform Index: Mapping and Navigation can help you identify what you should expect from a platform, and discover the platform that best meets your operational requirements. Founded in 1985, Ovum has one of the most experienced analyst teams in the industry and is a respected source of guidance for technology and intelligence leaders. Ovum's report assesses and ranks the major vendors in the location platform market with a focus on the mapping and navigation space. Download this free report to learn more about Why HERE topped Google to take 1st place in the ranking The relative strengths and weaknesses for each vendor- including data, enablers, and features The strategies vendors use to stay responsive towards changes in technology and trends To understand the location platform market, what constitutes a healthy location platform, and which provider offers the correct portfolio—and necessary flexibility—to achieve mission success, download your copy of this report by completing this form.
Tags : mapping, defence, location data.
     HERE Technologies
By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Forcepoint     Published Date: May 14, 2019
The EU General Data Protection Regulation (GDPR) is not in effect, requiring global organizations to significantly address how they process and protect the personal data of EU citizens. Yet, Gartner predicted, “Less than 50% of all organizations impacted will fully comply with GDPR.”* Confused about the requirements and what next steps to take? Read our GDPR eBook to learn about the regulation and its key requirements. *Gartner, GDPR Clarity: 19 Frequently Asked Questions Answered, by Bart Wilemsen, 29 August 2017
Tags : 
     Forcepoint
By: Infinidat EMEA     Published Date: May 14, 2019
Continuous data availability is a key business continuity requirement for storage systems. It ensures protection against downtime in case of serious incidents or disasters and enables recovery to an operational state within a reasonably short period. To ensure continuous availability, storage solutions need to meet resiliency, recovery, and contingency requirements outlined by the organization.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat® enterprise storage solutions are based upon the unique and patented Infinidat storage architecture—A fully abstracted set of Software-Defined Storage (SDS) functions integrated with the best-of-breed off-the-shelf commodity hardware. Infinidat’s software-focused architecture, an evolution and revolution in data management design over 30 years in the making, solves the conflicting requirements of bigger, faster, and less expensive. This paper discusses the technology that enables Infinidat to be the only enterprise storage provider that achieves multi-petabyte capacity with faster than all-flash performance (over 1.3M IOPS at microsecond latency) and an unprecedented seven-nines availability, all at the lowest Total Cost of Ownership (TCO).
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Veeam '18     Published Date: May 01, 2019
The digital revolution is transforming every industry. Yet it also brings new challenges: threats to the security and Availability of mission-critical data and services. Approximately 80% of IT decision-makers say their organization has an Availability gap, that is, a failure to meet recovery requirements—a common issue across all industries. 75% say they also have a data protection gap, meaning they are unable to protect their data frequently enough to ensure that business units’ expectations against data loss are being met.
Tags : 
     Veeam '18
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics