RSS feed Get our RSS feed

News by Topic

data requirements

Results 151 - 175 of 325Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
     Cisco
By: Commvault     Published Date: Jul 06, 2016
Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions that have been overwhelmed by data growth. The challenge is that native array snapshot tools – and alternative 3rd party solutions – have varying degrees of functionality, automation, scripting requirements, hardware support and application awareness. These approaches can add risk as well as administrative complexity and make it more difficult to realize the full potential of snapshots – whether in single disk vendor estates or in heterogeneous storage environments. This checklist will enable you to build a shortlist of the 'must have' features needed for snapshots to deliver exactly what you require in your application environment or Private Cloud.
Tags : commvault, snapshot management, replication, array based snapshots, data protection solutions, gui driven, intellisnap, no scripting
     Commvault
By: IBM     Published Date: May 17, 2016
Is your data architecture up to the challenge of the big data era? Can it manage workload demands, handle hybrid cloud environments and keep up with performance requirements? Here are six reasons why changing your database can help you take advantage of data and analytics innovations. 
Tags : ibm, business analytics, business intelligence, data, analytics, database
     IBM
By: Pentaho     Published Date: Apr 28, 2016
As data warehouses (DWs) and requirements for them continue to evolve, having a strategy to catch up and continuously modernize DWs is vital. DWs continue to be relevant, since as they support operationalized analytics, and enable business value from machine data and other new forms of big data. This TDWI Best Practices report covers how to modernize a DW environment, to keep it competitive and aligned with business goals, in the new age of big data analytics. This report covers: • The many options – both old and new – for modernizing a data warehouse • New technologies, products, and practices to real-world use cases • How to extend the lifespan, range of uses, and value of existing data warehouses
Tags : pentaho, data warehouse, modernization, big data, bug data analytics, best practices
     Pentaho
By: Citrix Systems     Published Date: Apr 15, 2016
Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop allows you to balance user requirements and costs for each use case.
Tags : vdi, it challenges, desktop virtualization, xendesktop
     Citrix Systems
By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : best practices, customer support, business intelligence, business optimization
     Cherwell Software
By: CDW - NetApp     Published Date: Apr 07, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
     CDW - NetApp
By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data security, risk management, big data, security
     IBM
By: CDW     Published Date: Apr 04, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
     CDW
By: Rackspace     Published Date: Mar 08, 2016
Determining which model works best for your organization means understanding the following requirements: Technical: Can the workload actually be hosted in the cloud? Compliance: Regulation may determine where and how their data and workloads can be run and stored. Security: Each workload has separate security requirements, creating challenges to run in the public cloud.
Tags : cloud model, public cloud, diy cloud, hybrid cloud, rackspace, compliance, cloud security
     Rackspace
By: IBM     Published Date: Feb 22, 2016
Survive the big data storm by getting ahead of integration and governance functional requirements
Tags : ibm, data, big data, integration, governance, security
     IBM
By: Blue Coat     Published Date: Feb 09, 2016
Don’t let SaaS data security concerns stop you from migrating to the cloud. Learn how encryption and tokenization satisfy legal requirements and industry mandates for protecting sensitive data in SaaS cloud applications.
Tags : 
     Blue Coat
By: APC by Schneider Electric     Published Date: Jan 21, 2016
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : cbs interactive, data, security, cloud
     APC by Schneider Electric
By: Code42     Published Date: Jan 13, 2016
Read this white paper to learn how the common approaches to e-Discovery miss the mark and how endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : code42, e-discovery, endpoint backup, e-discovery methods, data collection, compliance requirements, security
     Code42
By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance
     Vormetric, Inc.
By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : cisco, financial services, perception gaps, small business
     Cisco
By: Dell EMC     Published Date: Nov 10, 2015
No matter how advanced data centers may become, they remain in a perpetual state of change in order to meet the demands of virtualized environments. But with the advent of software-defined storage (SDS) architecture, capabilities associated with hyperconverged technologies (including compute, storage, and networking), help data centers meet virtualization requirements with less administrator intervention at webscale.
Tags : 
     Dell EMC
By: IBM     Published Date: Nov 09, 2015
IBM believes the Data Warehouse market continues to expand and adapt to address new requirements for user self-service, increased agility, requirements for new data types, lower cost solutions, adoption of open source, driving better business insight, and faster time to value.
Tags : ibm, data, magic quadrant, data management, analytics
     IBM
By: Altiscale     Published Date: Oct 19, 2015
In this age of Big Data, enterprises are creating and acquiring more data than ever before. To handle the volume, variety, and velocity requirements associated with Big Data, Apache Hadoop and its thriving ecosystem of engines and tools have created a platform for the next generation of data management, operating at a scale that traditional data warehouses cannot match.
Tags : big data, analytics, nexgen, hadoop, apache
     Altiscale
By: Dell EMC     Published Date: Oct 08, 2015
This paper discusses how the many Dell | Cloudera Hadoop solutions help organizations of all sizes, and with a variety of needs and use cases, tackle their big data requirements.
Tags : 
     Dell EMC
By: IBM     Published Date: Sep 30, 2015
Automate and strengthen security and endpoint management to better protect data and meet HIPAA and meaningful use requirements
Tags : 
     IBM
By: Citrix Systems     Published Date: Sep 17, 2015
Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop with FlexCast allows you to use a variety of methods to balance user requirements and costs for each use case in your organization.
Tags : desktop virtualization, citrix xendesktop, flexcast, business transformation
     Citrix Systems
By: Dell     Published Date: Aug 24, 2015
This paper discusses how the many Dell | Cloudera Hadoop solutions help organizations of all sizes, and with a variety of needs and use cases, tackle their big data requirements.
Tags : dell, big data, data management, cloud solutions, hadoop, servers, cloud computing, storage
     Dell
By: SnapLogic     Published Date: Aug 17, 2015
This report summarizes the changes that are occurring, new and emerging patterns of data integration, as well as data integration technology that you can buy today that lives up to these new expectation
Tags : data integration, cloud computing, mass data storage, integration requirements, integration strategies, non-persisted data streaming, device native data, data encryption
     SnapLogic
By: BMC Software     Published Date: Jul 22, 2015
The rise of the digital enterprise has created an explosion of valuable, yet unharnessed data for IT organizations. Traditional IT tools and processes, founded on the notion of control and management, are unable to support the speed and agility requirements of the digital enterprise. IT organizations must reengineer their approach from traditional analytics and reporting to adaptive, real-time digital service analytics.
Tags : 
     BMC Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics