RSS feed Get our RSS feed

News by Topic

data requirements

Results 301 - 325 of 331Sort Results By: Published Date | Title | Company Name
By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand the key requirements enterprise IT administrators should consider as they begin their initial deployments or expand
Tags : 
     Dell EMC
By: Data Stax     Published Date: Oct 14, 2016
Financial services companies engage with customers across multiple channels and across a range of financial products. This wealth of customer information is often stored in isolated data silos. Building a 360° view of the customer can directly impact customer experience and help banks grow customer retention, upsell products and provide compelling interactions. This paper examines the challenges these institutions face when creating a 360° view of every customer interaction, what database requirements the lines of business should look into, and use cases to benefit from by leveraging DataStax Enterprise, the database platform purpose built to power cloud applications.
Tags : datastax, netflix, mint bills, digital, personalization
     Data Stax
By: EMC Corporation     Published Date: Dec 08, 2014
Traditional methods for provisioning and maintaining storage resources are no longer sufficient to achieving business goals due to the fact that technology layers mask the relationship of application workloads to the physical storage devices that support them. The broad adoption of disruptive technologies - including cloud, virtualization, mobility, software-defined data centers, and big data - have introduced new and more challenging requirements for enterprise IT. Find our more in this whitepaper.
Tags : cloud, big data, software-defined data, virtualization, storage, mobility
     EMC Corporation
By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness
     Tripwire
By: Schneider Electric     Published Date: Oct 17, 2016
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : 
     Schneider Electric
By: APC by Schneider Electric     Published Date: Jan 21, 2016
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : cbs interactive, data, security, cloud
     APC by Schneider Electric
By: Schneider Electric     Published Date: Feb 17, 2017
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : data centers, container, it space, cooling, prefabricated modular data centers
     Schneider Electric
By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology
     LogRhythm
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Diligent Technologies     Published Date: Apr 11, 2008
Data de-duplication has the power to revolutionize the data protection process by significantly reducing capacity requirements. Plagued by media hype and vendor FUD, this message can be easily lost. This paper serves as a primer on data de-duplication.
Tags : deduplication, diligent, diligent technologies, storage
     Diligent Technologies
By: Delphix     Published Date: Apr 14, 2015
ERP upgrades are necessary, but they too often exceed budget and schedule. Technologies in the emerging Data as a Service (DaaS) category promise to accelerate data delivery and reduce infrastructure requirements. DaaS eliminates time, cost, and risk associated with these business-critical projects.
Tags : 
     Delphix
By: Interactive Intelligence     Published Date: Apr 23, 2014
Customer Experience (CX) and Net Promoter Score (NPS) are two of the benchmark measurements companies now use to gauge customer satisfaction. And to understand how budgetary decisions impact CX and NPS outcomes, companies are turning to advanced contact center technology for strategic planning and big data. But business requirements to manage these outcomes successfully must incorporate back-office operations as well as the contact center. Read why.
Tags : contact center, contact center strategy, customer experience, optimization, strategic planning, budgeting tools, workforce management solutions, call center
     Interactive Intelligence
By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : likewise, pci data security, linux, unix, mac os x, windows
     Likewise Software
By: Dell EMC     Published Date: Sep 12, 2016
Your business has tiers of applications and data. The protection needs of those application and data across a spectrum—starting with basic low cost daily backup, and ranging up to zero data loss with zero downtime. Along the spectrum, compliance requirements must also be met.
Tags : 
     Dell EMC
By: Citrix Systems     Published Date: Sep 17, 2015
Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop with FlexCast allows you to use a variety of methods to balance user requirements and costs for each use case in your organization.
Tags : desktop virtualization, citrix xendesktop, flexcast, business transformation
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop allows you to balance user requirements and costs for each use case.
Tags : vdi, it challenges, desktop virtualization, xendesktop
     Citrix Systems
By: Delphix     Published Date: Apr 15, 2011
See how Delphix database virtualization shrinks nonproduction database storage requirements by up to 10x, and reduces database provisioning and refresh times from days to minutes with zero impact to production systems.
Tags : delphix, database virtualization, storage requirement, development, testing
     Delphix
By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : virtualization, security, consolidation, data, infrastructure, network, technology
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : security, data, users, infrastructure, bluecoat
     Blue Coat Systems
By: CDW     Published Date: Sep 17, 2014
We now live in a flash centric world where all active data must be on flash. This doesn’t mean, however, that all data must be on flash. The best approach is to understand your application mix and workload requirements. Some key apps, like databases, are latency intolerant and should be pinned to flash. Others apps can benefit from fully-automated storage tiering. EMC’s market leading VMAX and VNX systems are flexible choices that can deliver all-flash and hybrid services. CDW and EMC has you covered!
Tags : data, market, flash, systems, key apps, centric, application, tiering
     CDW
By: Dell EMC     Published Date: Nov 08, 2016
Your data center struggles with competing requirements from your lines of business and the finance, security and IT departments. While some executives want to lower cost and increase efficiency, others want business growth and responsiveness. But today, most data center teams are just trying to keep up with application service levels, complex workflows, and sprawling infrastructure and support costs.
Tags : data, converged infrastructure, integration, vmware, private clouds, business application
     Dell EMC
By: Oracle ODA     Published Date: Aug 15, 2016
Oracle added two new models to the Oracle Database Appliance family in addition to the existing high availability model. With an entry list price starting at a fourth of the cost of the prior generation Oracle Database Appliance hardware and flexible Oracle Database software licensing, these new models bring Oracle Engineered Systems to within reach of every organization. Read about how the Oracle Database Appliance X-6 series expands the reach of the database appliance family to support various workloads, deployment scenarios, and database editions. They are especially designed for customers requiring only single instance databases, but who desire the simplicity, optimization, and affordability of the Oracle Database Appliance. These new models are ideal for customers who seek to avoid the complexity, tuning requirements, and higher costs of “build-your-own” database solutions.
Tags : 
     Oracle ODA
By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance
     Vormetric, Inc.
By: IBM     Published Date: Feb 22, 2016
Survive the big data storm by getting ahead of integration and governance functional requirements
Tags : ibm, data, big data, integration, governance, security
     IBM
By: IBM     Published Date: Oct 13, 2016
Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : ibm, big data, trusted data, data management, data solutions
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics