app data

Results 2176 - 2200 of 2528Sort Results By: Published Date | Title | Company Name
By: SDL Web Content Management Solutions     Published Date: Sep 01, 2010
Recent evolution in the mobile applications market now offers enterprises new opportunities for reaching customers in ways never before possible. In the past 18 months, a number of independent market forces have converged to enable goods-and-services providers to market to specific customers, at specific times, at specific locations. Importantly, such targeted messaging draws on a richer-than-ever set of consumer information, including not only detailed demographics from implicit (inferred) and explicit (user-provided) profiles, but also real-time, location-based data.
Tags : sdl, web content management, magic quadrant, wcm, content, web, mobile marketing, strategy
     SDL Web Content Management Solutions
By: Seagate     Published Date: Jan 27, 2015
This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution, Seagate ClusterStor™ Secure Data Appliance, which is designed to address government and business enterprise need for collaborative and secure information sharing within a Multi-Level Security (MLS) framework at Big Data and HPC Scale.
Tags : 
     Seagate
By: Seagate     Published Date: Sep 30, 2015
Although high-performance computing (HPC) often stands apart from a typical IT infrastructure—it uses highly specialized scale-out compute, networking and storage resources—it shares with mainstream IT the ability to push data center capacity to the breaking point. Much of this is due to data center inefficiencies caused by HPC storage growth. The Seagate® ClusterStor™ approach to scale-out HPC storage can significantly improve data center efficiency. No other vendor solution offers the same advantages.
Tags : 
     Seagate
By: Seagate Technology     Published Date: Apr 14, 2015
You can have all the latest features of iOS 8 on your iPhone, but if you’re still using an iPhone 4s, you won’t be able to take advantage of most of them. This should serve as an appropriate metaphor for this audience because when it comes to data storage, many of today’s storage solutions have been around since the 1970s…as in the the world of mobile, today’s data storage needs are revealing just how limited those older solutions are. Even if a company has updated almost everything in its IT ecosystem, it takes only one unchanged layer to prevent them from realizing the benefits of the latest technology. With petabyte scale, reliability, performance, and efficiency the order of the day we are fast approaching that point with storage. There is without question a need to change in the current storage paradigm. In this webinar you will learn about current IT storage challenges and useful insights about next-generation storage solutions.
Tags : storage solutions, mobile data storage, it ecosystem, petabyte scale
     Seagate Technology
By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware
     Secure Computing
By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. It’s easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month — and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
     SecureAuth
By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
     Secureworks
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: ServiceNow     Published Date: Oct 18, 2013
Certifying the accuracy of a CMDB with inconsistent, manual methods is unreliable. ServiceNow's built-in data certification gives you the ability to automate the process. Learn how data certification works with the ServiceNow CMDB to deliver a trustworthy single system of record you can rely on.
Tags : configuration management, data certification, product management, servicenow, enterprise it cloud, it cloud company, infrastructure applications, management applications
     ServiceNow
By: ServiceNow     Published Date: May 21, 2015
Today, enterprises are increasingly dependent on business services delivered by their IT organizations. These services underpin almost every business function, ranging from manufacturing and supply chain through to customer service and online sales. Because of their critical nature, business services need to be highly available and responsive – any disruption has a major financial and customer impact. Download this study to learn more about ServiceNow’s ServiceWatch and how it can help your organization prevent outages that could lead to: • Lost revenue • Lost employee productivity • Lost customers
Tags : servicenow, applications, databases, cloud, virtualization, it management
     ServiceNow
By: ServiceNow     Published Date: Oct 02, 2015
From students to executives, finding solutions to improve efficiency, productivity, and communication has become vital. These end users are trying to excel in their work, and while they don't mean to cause harm, in most organizations this desire leads to the use of applications, services, and data storage and sharing beyond IT's boundaries. This practice, known as “shadow IT,” walks a line that information security officers are uncomfortable with, and it's having an obvious impact on technical support teams. The good news is, there are opportunities for all support organizations, regardless of their stance on shadow IT.
Tags : 
     ServiceNow
By: ServiceNow     Published Date: Aug 20, 2018
Find out how leading healthcare providers are using a proactive approach to keep their EHR and supporting infrastructure continually running and compliant with strict regulations for health data security and privacy. Learn more about keeping critical systems operational and sensitive data secure. Download this white paper to see how eliminating outages and combatting cyberattacks can help improve patient care.
Tags : 
     ServiceNow
By: ServiceSource     Published Date: Sep 15, 2015
Companies that take a more sophisticated approach to customer success, revenue retention and revenue growth after the initial sale earn 46 percent more revenue compared to their less sophisticated peers, according to a global study conducted in 2015 across software, hardware, SaaS and life sciences companies. The study highlights the urgent need for companies to consider the full range of customer success and revenue growth activities after the initial sale—collectively called the “revenue lifecycle”—which includes onboarding, adoption, upselling/cross-selling, retention and renewal. The study shows that a company that improves people, processes, technology, data and KPIs in the revenue lifecycle can expect to improve renewal rates by more than 31 points.
Tags : 
     ServiceSource
By: SGI     Published Date: Jun 08, 2016
With High Performance Computing (HPC) supercomputer systems that comprise tens, hundreds, or even thousands of computing cores, users are able to increase application performance and accelerate their workflows to realize dramatic productivity improvements. The performance potential often comes at the cost of complexity. By their very nature, supercomputers comprise a great number of components, both hardware and software, that must be installed, configured, tuned, and monitored to maintain maximum efficiency. In a recent report, IDC lists downtime and latency as two of the most important problems faced by data center managers.
Tags : 
     SGI
By: Sierra Wireless     Published Date: Jun 19, 2019
The IoT is transforming the energy industry by eliminating tradeoffs between operation, SCADA systems, maintenance and new services for assets deployed in industrial and power facilities, buildings and across the grid. When it comes to building the best IoT system for your business application, it’s vital to keep your use case and business requirements at the forefront of your technical design strategy. In the energy industry, accessing and collecting data at the edge from disparate, heterogenous, multi-site, fixed topologies and transferring that data efficiently to the cloud to perform analytics and action business decisions is still the greatest challenge. Mission-critical data collected from the edge is integral to energy facility operations and cannot be excluded or corrupted.
Tags : 
     Sierra Wireless
By: Sierra Wireless     Published Date: Jun 19, 2019
By simplifying the ability of companies to securely extract, orchestrate and act on data from when it is generated by energy assets to when it is transmitted to the cloud, Octave simplifies the development and commercialization of Energy IoT applications. With Octave, energy companies are empowered to realize the Energy IoT’s tremendous potential, with new demand response, energy efficiency optimization, predictive maintenance and other applications that maximize the value created by energy assets and minimize their environmental impact. In doing so, these Energy IoT applications can reduce energy costs, improve customer engagement, lower greenhouse gas emissions and increase energy reliability. Start with Sierra to learn more about how our Octave D2C data orchestration solution can help you bring to market Energy IoT applications that reimagine the future of energy.
Tags : 
     Sierra Wireless
By: Silver Peak     Published Date: Dec 31, 9999
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : offsite data, remote replication, reliable, storage flexibility, cloud, virtualization, technology, offsite disaster recovery
     Silver Peak
By: Silver Peak     Published Date: Oct 28, 2013
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : silver peak, data, data replication, remote, optimize, rpo, business operations
     Silver Peak
By: Silver Peak     Published Date: Oct 28, 2013
In recent years, data deduplication has made its ways from the storage to the networking community. More specifically, it has become an important tool for optimizing application performance across the WAN. By eliminating the transfer of repetitive IP traffic, deduplication significantly improves WAN utilization and accelerates data transfers between geographically disperse locations. This saves bandwidth costs and helps to overcome many obstacles when communicating across a WAN. This paper discusses how WAN deduplication works, and how it can be effectively deployed as a complement to existing storage deduplication solutions.
Tags : wan, silver peak, deduplication, storage, data management
     Silver Peak
By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : silver peak, network memory, application caching, wan, caching, networking
     Silver Peak
By: Silver Peak     Published Date: Feb 11, 2016
he WAN has always been about connecting users to applications and moving data, but the playing field has now changed with datacenters migrating to the cloud along with missioncritical applications. .
Tags : wan, enterprises, saas, broadband internet, data, connectivity, connection, cloud
     Silver Peak
By: Silver-Peak     Published Date: Mar 21, 2012
Cloud architectures. Remote access to big data. Application performance in an increasingly networked world. A renewed focus on DR/BC based on instant replication between multiple data centers. All are driving a need for more flexible WAN optimization that can be cost effectively deployed across both private and public networks.
Tags : wan, optimization, data management, data center, silver peak, technology, network, network management
     Silver-Peak
By: Simba by Magnitude     Published Date: Mar 25, 2019
Software providers say that connecting applications to data sources, having adequate resources to do so, applying an effective maintenance strategy and addressing scalability are top-of-mind challenges. This eBook from the connectivity experts with 100s of person-years of data adapter experience is your how-to guide on the journey toward addressing these challenges to accelerate adoption of your application.
Tags : 
     Simba by Magnitude
By: Simba by Magnitude     Published Date: Jul 12, 2019
Siloed data has become the Achilles heel of marketing insights –especially in the world of B2B and B2B2C marketing. Today’s marketing and sales departments sit on a goldmine of data derived from the dozens of applications and data sources in their MarTech stack. Still, the real opportunity for insights is hidden in the combined data across applications. Combining data in a comprehensive way delivers a full picture of marketing efficacy and efficiency. In this eBook, learn about the origins of siloed data, and how data has emerged and evolved, as well as review the benefits that marketing can realize with connected data. Along the way, we’ll share some action items you can take to assess your current situation and build a plan to unify your data and fuel great marketing insights.
Tags : 
     Simba by Magnitude
Start   Previous    81 82 83 84 85 86 87 88 89 90 91 92 93 94 95    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com