RSS feed Get our RSS feed

News by Topic

data potential

Results 1 - 25 of 197Sort Results By: Published Date | Title | Company Name
By: SAP     Published Date: Aug 14, 2018
As legacy ERP data structures and technology begin winding down, they are making way for a whole new generation of technology that brings exponential performance and dramatically new problem-solving capabilities. Download the whitepaper to discover the demands driving this evolution, explore the potential promised by next-gen ERP, and learn why ‘playing it safe’ is no longer an option.
Tags : 
     SAP
By: Cloudian     Published Date: Feb 15, 2018
Not so long ago, if you asked a business executive, “what is the most irreplaceable part of your business?” they might have pointed at their building or their employees. The really forward-thinking execs may have chosen their customers. But the reality is that businesses have insurance to deal with the loss of a building; they can hire new employees; and they can acquire new customers. The one thing that is truly irreplaceable is their data. Lose that and you really are out of business. The potential risks to your data can be as subtle as the malfunction of tiny areas on a disk drive or as enormous as the failure of an entire data center. That means it’s not enough just to protect your data — you must also select the best way to protect it. To deliver that protection in an economical and rapidly recoverable way requires a system that gives you complete control to determine levels of data protection based on the type of data. In this paper, we’ll talk about the science of data protect
Tags : 
     Cloudian
By: NAVEX Global     Published Date: Apr 20, 2018
Discover how organisations similar to your own are developing an effective ethics and compliance programme to improve workplace culture and reduce compliance risk. Our new research will help you identify the most appropriate activities to consider for your own programme, provide the data to help benchmark your results, and the guidance to improve buy-in and programme resources. What you'll learn: How are new regulations changing potential ethics and compliance risks? What challenges do compliance professionals face when trying to improve company culture? How are organisations investing in compliance activities? What results are compliance programmes achieving?
Tags : 
     NAVEX Global
By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
     Dome9
By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : renewable energy, customer profile, emc, risk management, best practices, storage, technology, security
     EMC Corporation
By: IBM     Published Date: Jan 14, 2015
Cloud-delivered big data analytics presents an enormous opportunity for organizations that want to become more agile, more efficient and more competitive. To capitalize on the full potential of this opportunity, businesses need cloud-enabled big data analysis solutions that are flexible, simple, secure and open.
Tags : big data, data management, the cloud, cloud solutions, data, data analytics, client engagement, computing model
     IBM
By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : cyberthreat, healthcare, gdpr, ransomware
     Mimecast
By: Host Analytics     Published Date: Jun 05, 2017
Best-in-class firms have realized that budgeting, planning and reporting can't ALL be done with Excel. And running a successful business starts with effective planning and performance management, and the data you generate during these critical processes is among the most important and sensitive in your organization. A miscalculation, oversight, or a security breach could be financially devastating. By recognizing the 5 signs of Excel abuse, and making the necessary changes, best-in-class organizations can: -streamline planning and performance management -keep sensitive data secure -significantly reduce the potential for human error
Tags : 
     Host Analytics
By: Bounty Jobs     Published Date: Oct 14, 2015
In this e-book, you'll learn how to: -Increase hiring velocity for high-demand talent -Create stronger recruiting teams -Find and engage the right agencies The six data points in this e-book are critical to unlocking the full potential of direct hire agencies in order to land those highly sought-after job candidates. Commanding this data will also position your recruiting teams to become strategic advisors to your company and its business units.
Tags : direct hire agencies, headhunters, job candidates, recruiting teams, recruitment
     Bounty Jobs
By: QTS Data Centers     Published Date: Feb 17, 2017
This white paper provides an in-depth look at key considerations to keep in mind when selecting a data center provider in Chicago. From connectivity to compliance to customer service, these 7 key considerations offer a checklist for evaluating potential data center providers.
Tags : 
     QTS Data Centers
By: Grand Rounds     Published Date: Dec 16, 2015
In this white paper you'll learn how to: • Use data to improve care and reduce costs • Create an outcomes-focused program • Make your employees more informed healthcare consumers • Unlock the ROI potential within your existing provider network
Tags : roi, employer-funded healthcare, quality of care, cost reduction, provider network
     Grand Rounds
By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors
     Websense
By: Pure Storage     Published Date: Dec 05, 2018
Data is the new currency. Is your organization capitalizing on the full potential of data analytics? In this big data primer, you will learn about the 3 key challenges facing organizations today: managing overwhelming amounts of data, leveraging new complex tools/technologies, and developing the necessary skills and infrastructure. And since storage is where your organization's data lives, it’s a pivotal part of the infrastructure jigsaw puzzle. Thus with a “tuned for everything” storage solution that is purpose-built for modern analytics, you can confidently harness the power of your data to drive your enterprise forward.
Tags : 
     Pure Storage
By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
     Splunk
By: Pure Storage     Published Date: Apr 18, 2018
Massive amounts of data are being created driven by billions of sensors all around us such as cameras, smart phones, cars as well as the large amounts of data across enterprises, education systems and organizations. In the age of big data, artificial intelligence (AI), machine learning and deep learning deliver unprecedented insights in the massive amounts of data. Amazon CEO Jeff Bezos spoke about the potential of artificial intelligence and machine learning at the 2017 Internet Association‘s annual gala in Washington, D.C., “It is a renaissance, it is a golden age,” Bezos said. “We are solving problems with machine learning and artificial intelligence that were in the realm of science fiction for the last several decades. Natural language understanding, machine vision problems, it really is an amazing renaissance.” Machine learning and AI is a horizontal enabling layer. It will empower and improve every business, every government organization, every philanthropy
Tags : 
     Pure Storage
By: IBM     Published Date: Mar 28, 2016
Workforce analytics is a very significant development in human resources. It promises the potential for deeper understanding of the ways workers contribute to organizational performance. However, workforce analytics is not just about analyzing data to reveal exciting insights; it also requires the active involvement of a firm’s workers if the potential of analytics is to be fully realized. Without active employee participation, workforce analytics efforts face at best, restricted data sources and data sets that are incomplete and at worst, the risk of damaging employee relations and, ultimately, productivity. This white paper summarizes recommendations that will encourage enthusiasm for workforce analytics and active employee participation, using the FORT (Feedback, Opt-in, Reciprocal, Transparent) framework. The FORT criteria could prove particularly useful in European countries. This is because the 1995 European Union Data Protection Directive, along with certain local legislative pr
Tags : ibm, ibm smarter workforce institute, work trends, employee engagement
     IBM
By: Altiscale     Published Date: Aug 25, 2015
Hype abounds about Big Data. And it's hard to know how to effectively exploit its potential. Learn how to separate fact from fiction in this new webinar + research note titled "Amazon EMR is Easy and 7 Other Myths." If you're considering launching a new Big Data initiative, or if you are currently struggling with Amazon EMR, view this 30 minute on-demand webinar + research note and dispel the most common untruths about Amazon EMR, as determined by leading Hadoop experts. Specifically, you'll learn: • The differences between Hadoop-as-a-Service and Amazon EMR • Why Hadoop on Amazon is not elastic • Why EMR is not a "plug-n-play" application • How costs get out of control with Amazon EMR
Tags : amazon emr, big data, haddop
     Altiscale
By: Splunk     Published Date: Nov 29, 2018
Gartner Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017 Splunk Jumps From #5 in 2016 to #2 in Top 10 Named ITOM Performance Analysis Software Vendors, Worldwide, 2017 Splunk is ranked #2 of overall ITOM Performance Analysis Software Vendors, according to Gartner’s report, Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017. This Gartner report also lists Splunk as one of several disruptors in the table “Market Share of Incumbents vs. Disruptors - ITOM Performance Analysis Software.” As a Splunk customer, are you utilizing your machine data platform to its fullest potential? Learn about newest trends in ITOM software tools across AIOps, APM, infrastructure monitoring and Network performance monitoring and diagnostics. Download this report to learn: 2017 rankings of performance analysis software vendors, overall and subsegments How digital business is driving demand for modern, agile monitoring tools via DevOps toolchains Shifts in
Tags : application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
     Splunk
By: Symantec     Published Date: Sep 14, 2015
When organizations fail to integrate their people, processes, and technology, it hinders their ability to quickly detect and respond to an incident and keep it from becoming a data breach. The result? Increased risk for every security incident they face. The proposal? Execute a holistic approach that address the before, during, and after stages of a potential breach.
Tags : data breach, data security, increased risk
     Symantec
By: F5 Networks Inc     Published Date: Aug 16, 2016
Data center refresh cycles and new initiatives tied to business growth and revenue opportunities are leading more organizations to deploy integrated systems, including both converged and hyper-converged infrastructures. IT leaders can see the potential benefits of converged, integrated systems but as applications increase in complexity, virtual workloads grow, and resource demands expand, managing these applications becomes a critical and often stubborn challenge.
Tags : application delivery services, systems deployments, integration, idg research, integrated system approach, security
     F5 Networks Inc
By: IBM     Published Date: Dec 02, 2014
Across the automotive industry, organizations are using analytics to transform all aspects of their business. In the vast majority of instances, the analytics performed is on data that is already available within the organization or wider automotive ecosystem, but has not yet been tapped to use its full potential. Analytics can unlock the value held in this data, helping to answer key “what if” questions across the organization and the value chain. For example, what if dealerships could better understand their customers’ digital journey? Or what if manufacturing could improve visibility into parts, assembly and vehicle inventory?
Tags : automotive analytics, automotive ecosystem, automotive manufacturing, advanced analytics
     IBM
By: HP and Intel ®     Published Date: May 27, 2014
This document from IDC discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : intel, converged infrastructure, mobile users, applications, virtualization, enterprises
     HP and Intel ®
By: HP     Published Date: May 27, 2014
This document discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : intel, converged infrastructure, mobile users, applications, virtualization, enterprises
     HP
By: Eaton     Published Date: Jan 26, 2016
When designing a power protection scheme for their data center, IT and facilities managers must ask themselves whether a distributed or centralized backup strategy makes more sense. Unfortunately, there is no easy answer to that question. Companies must weigh each architecture’s advantages and disadvantages against their financial constraints, availability needs and management capabilities before deciding which one to employ. This white paper will simplify the decision-making process and lessen the potential weaknesses of whichever strategy you ultimately select.
Tags : eaton, distributed backup strategy, centralized backup strategy, facility managers, data center solutions
     Eaton
By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures
     Splunk
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics