RSS feed Get our RSS feed

News by Topic

data requirements

Results 51 - 75 of 334Sort Results By: Published Date | Title | Company Name
By: Google     Published Date: Oct 26, 2018
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
     Google
By: Group M_IBM Q418     Published Date: Oct 23, 2018
The General Data Protection Regulation (GDPR) framework seeks to create a harmonized data protection framework across the European Union, and aims to give back EU citizens control of their personal data by imposing stricter requirements for those hosting and processing this data, anywhere in the world. IBM is committed to putting data responsibility first and providing solutions that are secure to the core for all customers. As such, IBM Cloud has fully adopted the EU Data Protection Code of Conduct for Cloud Service providers – meaning we agree to meet the entirety of its stringent requirements.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Oct 23, 2018
Trust can be viewed as a key factor amongst clients and service providers working together towards preparing for readiness with the EU General Data Protection Regulation (GDPR). These stringent regulations come into force in May 2018 to ensure that personal data is processed adhering to strict privacy and security requirements.
Tags : 
     Group M_IBM Q418
By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
     Mimecast
By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
     Mimecast
By: Lenovo - APAC     Published Date: Oct 11, 2018
While many organizations have acknowledged the importance of digitally transforming their businesses and processes to deliver speed and agility, most are just starting their cloud journey. Cloud-in-a-Box delivers an enterprise cloud platform with a mix of on- and off-premises private cloud and public cloud, with orchestration between them. This will provide the organization with the ability to avoid vendor lock-in, find the optimal cloud services for a particular business or technical need, and increase redundancy. Download IDC Infobrief on “Cloud-in-a-Box” to understand: • How you can deliver the different functions of a data center and meet business requirements by deploying a “Cloud-in-a-Box.” • Understand how industries such as financial services, manufacturing and healthcare can benefit from “Cloud-in-a-Box” technology. • Self-discovery questions and focus areas that every organization needs to go through for successful cloud deployment.
Tags : 
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Oct 11, 2018
Lenovo’s VMware vSAN-based hyperconverged solution reduces TCO by 40% within the datacenter. VMware-based hyperconverged solutions from Lenovo come with a set of certified components that can be deployed to create platforms that support a broad array of workloads, performance, and budgetary requirements. With VMware vSAN pre-installed, pre-configured, and pre-tested, Lenovo’s VMware-based hyperconverged solutions help improve productivity, and cut complexity quickly and easily. VMware-based hyperconverged solutions from Lenovo represent proven solutions that are enterprise-class and are already being leveraged within mission-critical environments around the world. Download IDC’s Infobrief on “The Real-World Value of Hyperconverged Infrastructure” and learn how you can: • Cut the cost of scaling infrastructure • Reduce time spent on infrastructure provisioning • Improve application performance • Eliminate complexity and cost related to refreshing traditional infrastructure
Tags : 
     Lenovo - APAC
By: Juniper Networks     Published Date: Oct 02, 2018
Exploring four commonalities that drive organziations toward hybrid IT can help you make a business case for expanding and automating your data center. • Cloud’s role in providing your high-performance computing requirements • Evolving asset refresh cycle and expansion needs in the face of security threats • Strategic innovation investments to gain competitive market advantage
Tags : 
     Juniper Networks
By: Group M_IBM Q418     Published Date: Sep 25, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
     Group M_IBM Q418
By: Infosys     Published Date: Sep 11, 2018
Infosys has been recognized as a ‘Leader’ in NelsonHall’s Vendor Evaluation and Assessment (NEAT) report on big data and analytics services 2018.We have also been highly rated for our focus on automation. Our ability to meet future client requirements as well as deliver immediate benefits such as analytics, data management and support functions to our clients with a specific focus on process automation enabled us to secure this position.
Tags : 
     Infosys
By: Group M_IBM Q418     Published Date: Sep 10, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
     Group M_IBM Q418
By: NetApp     Published Date: Sep 04, 2018
Learn why Gartner believes that more than 70% of new DBMS deployments will leverage the cloud for at least one use case by 2018. Find out how to assess modern data management capabilities and determine which DBMS best meets your business requirements.
Tags : 
     NetApp
By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
Distributed cloud databases are transforming the way organizations do business. Read this new, informative guide to learn what distributed cloud databases are and why they’re what’s required to power Right-Now Economy applications. You'll also get straightforward yet detailed information on the database requirements for today’s applications, the limitations of relational databases, and the importance of data autonomy in database selection. With Designing a Distributed Cloud Database for Dummies, you'll learn how enterprises can meet and exceed customer expectations by way of modern applications and distributed cloud databases.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
     Datastax
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
16 key questions for buyers to ask flash storage vendors. Also includes data protection requirements for getting the most out of flash.
Tags : 
     Hewlett Packard Enterprise
By: Splunk     Published Date: Aug 21, 2018
How can you utilize machine data to support compliance with the General Data Protection Regulation of the European Union? This white paper, “How Machine Data Supports GDPR Compliance”, answers this question and identifies three use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment – on-premises, in the cloud or hybrid Download the white paper to: *Master the risks necessary to be prepared for GDPR through real-world scenarios *Understand which articles of GDPR will impact your business *Learn how machine data can help you overcome those requirements
Tags : 
     Splunk
By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
     Datastax
By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
     Oracle
By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
     Datastax
By: Datastax     Published Date: Aug 03, 2018
Distributed cloud databases are transforming the way organizations do business. Read this new, informative guide to learn what distributed cloud databases are and why they’re what’s required to power Right-Now Economy applications. You'll also get straightforward yet detailed information on the database requirements for today’s applications, the limitations of relational databases, and the importance of data autonomy in database selection. With Designing a Distributed Cloud Database for Dummies, you'll learn how enterprises can meet and exceed customer expectations by way of modern applications and distributed cloud databases.
Tags : 
     Datastax
By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
     Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics