RSS feed Get our RSS feed

News by Topic

fast

Results 1 - 25 of 2318Sort Results By: Published Date | Title | Company Name
By: Silver Peak     Published Date: Dec 31, 9999
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : offsite data, remote replication, reliable, storage flexibility, cloud, virtualization, technology, offsite disaster recovery
     Silver Peak
By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a “Goldilocks’ for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. They’ll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. We’ll dive into Zeek’s creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
     Gigaom
By: KPMG     Published Date: Oct 15, 2019
Navigating technology disruption is now a business norm, propelling organizations to both experiment with and deploy advanced digital products and services that increasingly collect, leverage and ultimately create value from abundant amounts of data. The continuous nature of technology development, and the ability to drive customer engagement and gain performance enhancements through digital transformation, generates significant excitement at a board level — both as an opportunity to gain a competitive advantage, as well as being a catalyst for disruption. The ability to achieve agility in what is now a continuous process of transformation and innovation is fast defining success for organizations, and maintaining trust in the age of the customer is becoming a differentiator for those able to act and demonstrate an understanding of their consumer’s concerns. In this new survey, our aim was to assess whether there has been a shift in consumer expectations regarding digital trust, and whe
Tags : 
     KPMG
By: KPMG     Published Date: Oct 15, 2019
Welcome to KPMG’s third annual report tracking developments in China’s pension industry. This is a topic of great economic significance. As the world’s most populous country, China has an ageing society and is developing the infrastructure to take care of a growing number of elderly people. The topic also has business significance, especially for financial companies able to find opportunities in the fast-growing pension sector. This report updates and builds on our findings from last year. That report identified sector convergence as one of the most distinct features of the Chinese pension industry, as well as highlighted several strategic themes that will influence its long-term development. In the pages that follow, we explain the most recent developments and their strategic implications.
Tags : 
     KPMG
By: AWS     Published Date: Oct 14, 2019
Containers have become the new infrastructure standard for development teams. While the “DIY container approach” (un-orchestrated containers) still has its use cases (e.g. low latency, longer compute jobs, predictable traffic), production-grade deployments require orchestration. DevOps teams are increasingly leveraging the benefits of Kubernetes and accelerating its adoption, taking it from a 27% adoption rate in 2018 to a 48% adoption rate in 2019 according to the RightScale “2019 State of the Cloud Report,” from Flexera. The same report also positions Amazon Elastic Kubernetes Service (Amazon EKS) as one of the fastest-growing managed Kubernetes offerings available, with a 44% adoption rate. Previously, containers were a technology deployed by individual teams – and were typically used for “application testing” in the enterprise world. Today, many organizations are now not only seeing the benefits of operationalizing containers to deploy production applications, but also re-positioni
Tags : 
     AWS
By: The Economist Group     Published Date: Oct 10, 2019
While great products are great, having a great product is no longer enough. Products alone simply don’t win anymore. Say you’ve just launched a brilliant product or service. A myriad of near-identical alternatives from competitors will likely flood the market almost immediately. Differentiating yours from theirs has become a lot more difficult. Not to mention that technology has made it easier than ever for customers to shop around. From gathering information, to interacting with brands and purchasing products, it’s never been simpler to find the cheapest, fastest, smartest alternative, anywhere in the world.
Tags : 
     The Economist Group
By: The Economist Group     Published Date: Oct 10, 2019
While great products are great, having a great product is no longer enough. Products alone simply don’t win anymore. Say you’ve just launched a brilliant product or service. A myriad of near-identical alternatives from competitors will likely flood the market almost immediately. Differentiating yours from theirs has become a lot more difficult. Not to mention that technology has made it easier than ever for customers to shop around. From gathering information, to interacting with brands and purchasing products, it’s never been simpler to find the cheapest, fastest, smartest alternative, anywhere in the world.
Tags : 
     The Economist Group
By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
     AWS
By: Adobe     Published Date: Oct 08, 2019
With customers spending almost one-third of their days engaging with digital content and frequently engaging on multiple channels, developers need a better and faster way to create digitally engaging experiences across multiple channels. Yet despite the appeal of headless for developers, a headless-only CMS may not be the best approach. A better strategy for embracing new technology is taking a hybrid approach. 
Tags : 
     Adobe
By: Shell U.K. Limited     Published Date: Oct 08, 2019
Der Erfolg Ihres Bauunternehmens hängt von Ihrer Fähigkeit ab, Ihre Maschinen effizient und zuverlässig am Laufen halten zu können. Dennoch geben fast die Hälfte (43 %) aller Bauunternehmen an, dass sie häufig Ausfälle aufgrund einer ineffektiven Schmierung hinnehmen müssen – und 72 % sind sogar der Ansicht, dass ihre Wartungsteams eine bessere Schulung benötigen. Aus diesem Grund haben wir Shell Driveline eingeführt, eine Reihe an leistungsstarken Schmierstoffen und fachmännischer Beratung, die zusammen weit mehr ergeben als nur die Summe ihrer Teile – und die Ihre Maschinen effizienter, produktiver und wettbewerbsfähiger machen. Zur Verdeutlichung: Kunden, die Shell Technical Services nutzen, haben eine deutliche Verbesserung ihres Betriebs verzeichnet. Dies entspricht nachweislich Einsparungen in Höhe von über USD 68 Mio. auf Seiten aller Shell B2B-Kunden. Erfahren Sie mehr: Laden Sie unseren Bericht herunter Lesen Sie unseren neuen Branchenreport zur Bauwirtschaft „Mehr Effizien
Tags : 
     Shell U.K. Limited
By: Gigaom     Published Date: Oct 07, 2019
While interest in Machine Learning/Artificial Intelligence/ (ML/AI) has never been higher, the number of companies deploying it is only a subset, and successful implementations a smaller proportion still. The problem isn’t the technology; that part is working great. But the mere presence and provision of tools, algorithms, and frameworks aren’t enough. What’s missing is the attitude, appreciation, and approach necessary to drive adoption and working solutions. To learn more, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and panelists Jen Stirrup, Lillian Pierson, and special guest from Cloudera Fast Forward Labs, Alice Albrecht. Our panel members are seasoned veterans in the database and analytics consulting world, each with a track record of successful implementations. They’ll explain how to go beyond the fascination phase of new technology towards the battened down methodologies necessary to build bulletproof solutions th
Tags : 
     Gigaom
By: AWS     Published Date: Oct 07, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
Software development has evolved from rigid waterfall methodologies to more streamlined approaches, like Agile and more recently DevOps. This evolution has taken place in large part to shorten development life cycles and meet increased business demands. Today, businesses of all sizes have built an advantage by implementing a DevOps culture and processes, which break down silos between development and operations, allowing organizations to create better software faster. As organizations implement DevOps on Amazon Web Services (AWS), they need to understand the security implications. The AWS Shared Responsibility Model makes clear that AWS secures what’s “on the cloud,” while the customer is responsible for securing their assets “in the cloud.” When AWS customers go about securing their DevOps environments, they need to do so in a way that provides robust protection without limiting developer agility.
Tags : 
     AWS
By: Amazon Web Services EMEA     Published Date: Oct 07, 2019
The proliferation of fast, affordable computing has allowed companies of all sizes to create internal efficiencies and reach more customers through digital products. However, the ubiquity of tools, multiple paths to market, and changing consumer preferences means that businesses must innovate faster than ever to remain competitive. The way that digital products have been traditionally built just isn’t fast enough to enable the innovation that’s needed to win in the market.
Tags : 
     Amazon Web Services EMEA
By: Workday APAC     Published Date: Oct 07, 2019
"Workday provides financial services organizations with the technology foundation they need to spend less time gathering data and more time creating real value. But don’t just take our word for it. Hear from our customers in the banking industry that have used Workday to: Make better business decisions Uncover new sources for growth Become a magnet for top talent "
Tags : 
     Workday APAC
By: KPMG     Published Date: Oct 04, 2019
Life is coming at us fast, so our thinking about policy solutions for the future needs to be bigger, bolder and much more imaginative. We have just launched the second edition of Reimagine public policy. 20 truly, disruptive and innovative ideas to help solve today’s policy challenges. Four of them are brand new for this year – Reimagine high streets, digital platforms for life-long learning, workforce and migration. The Reimagine ideas show how to: • Revitalise the Great British High Street • Remove the need for any family to choose between heating and eating • Match hirers and firers to give workers facing redundancy new skills
Tags : 
     KPMG
By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
     BehavioSec
By: ASME     Published Date: Oct 03, 2019
When Verizon wanted to add new digital and internet-connected kiosks around New York City, they turned to Boyce Technologies and Boyce turned to 3D printing to save them time and money. Boyce Technologies is one of the leading manufacturers of security and communication equipment for the mass transit market in New York. Since incorporating large-format 3D printing, Boyce has seen firsthand how 3D printing helps compress the design, engineering, and production time so they can meet tighter deadlines and get to production faster. Boyce uses its BigRep large-format 3D printers across a variety of applications including prototyping, end-use parts, and vacuum forming molds. Download now to discover: Best practices for integrating 3D printing How a prototyping exercise turned into end use parts for Verizon kiosks around New York City Case studies for end use parts, molds, and prototypes Making the business case for investing in AM
Tags : 
     ASME
By: AWS     Published Date: Oct 01, 2019
Containers have become the new infrastructure standard for development teams. While the “DIY container approach” (un-orchestrated containers) still has its use cases (e.g. low latency, longer compute jobs, predictable traffic), production-grade deployments require orchestration. DevOps teams are increasingly leveraging the benefits of Kubernetes and accelerating its adoption, taking it from a 27% adoption rate in 2018 to a 48% adoption rate in 2019 according to the RightScale “2019 State of the Cloud Report,” from Flexera. The same report also positions Amazon Elastic Kubernetes Service (Amazon EKS) as one of the fastest-growing managed Kubernetes offerings available, with a 44% adoption rate. Previously, containers were a technology deployed by individual teams – and were typically used for “application testing” in the enterprise world. Today, many organizations are now not only seeing the benefits of operationalizing containers to deploy production applications, but also re-positioni
Tags : 
     AWS
By: Jeppesen     Published Date: Oct 01, 2019
What’s $6.12 to you? A fast food meal? A pair of dry-cleaned pants? In the airline industry, that’s the net profit per passenger. It’s a time of razor-thin margins and shrinking profits—in 2018 they were down 23% from the year before. Which means every savings opportunity is meaningful. And technology can help uncover a myriad of them. Taking real, anonymized data, we calculated how technology can make a serious dent in the costs of one of the top-five U.S. carriers.
Tags : 
     Jeppesen
By: HERE Technologies     Published Date: Oct 01, 2019
Rising urbanization and upward of a billion vehicles in operation across the world have brought unprecedented levels of traffic and congestion to our major towns and cities. On the frontline are the emergency dispatchers and responders. Every day, they face complex challenges as they attempt to navigate through congested traffic, unexpected road closures and work zones in a timely manner. It is therefore vital for the real-time information they receive to be as accurate and fresh as possible, so that crucial, split-second decisions can be taken correctly, enabling all designated units to reach the incident location as fast as possible.
Tags : 
     HERE Technologies
By: Oracle     Published Date: Sep 30, 2019
Sticking to email blasts and spreadsheets will leave you lagging behind the competition. Forge a clear path for your marketing strategy with marketing automation. Equip yourself with the language they will understand at C-level and prove to them that modern marketing will drive your organization into the future: Get more done, faster and with fewer resources. • Reach the right prospects more effectively. • Radically increase conversion rates, revenue, and alignment between marketing and sales. The trick is to convince those in your leadership of the value of marketing automation. To succeed, it is imperative to influence your CEO, CFO and CIO by crafting a persuasive argument that’s relevant to each of their objectives and concerns. Join the thousands of sales and marketing professionals who have already secured executive buy-in and are benefiting from the power of marketing automation. This guide offers a look into the mind of an exec: what keeps them up at night, how do they vie
Tags : 
     Oracle
By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
     BehavioSec
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics