app data

Results 2301 - 2325 of 2533Sort Results By: Published Date | Title | Company Name
By: Teradata     Published Date: Jan 30, 2015
Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.
Tags : hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications, data management
     Teradata
By: Teradata     Published Date: May 01, 2015
Creating value in your enterprise undoubtedly creates competitive advantage. Making sense of the data that is pouring into the data lake, accelerating the value of the data, and being able to manage that data effectively is a game-changer. Michael Lang explores how to achieve this success in “Data Preparation in the Hadoop Data Lake.” Enterprises experiencing success with data preparation acknowledge its three essential competencies: structuring, exploring, and transforming. Teradata Loom offers a new approach by enabling enterprises to get value from the data lake with an interactive method for preparing big data incrementally and iteratively. As the first complete data management solution for Hadoop, Teradata Loom enables enterprises to benefit from better and faster insights from a continuous data science workflow, improving productivity and business value. To learn more about how Teradata Loom can help improve productivity in the Hadoop Data Lake, download this report now.
Tags : data management, productivity, hadoop, interactive, enterprise, enterprise applications
     Teradata
By: Teradata     Published Date: Jun 12, 2013
The ever-changing environment has offered fraudsters some tactical advantages to probe for holes in the defenses of financial services companies. Conventional approaches to fraud detection and remediation remain effective to a point, but conventional tools cannot effectively and economically process what is known as big data.
Tags : enterprise risk intelligence, fraud detection, big data, fraud prevention
     Teradata
By: Teradata     Published Date: Jan 27, 2015
There is little question about the role that SAP® BW has historically played in the SAP® infrastructure. It has been a key element in unlocking SAP’s vast and complex store of operational data housed in their ERP applications. One can easily think of BW as the original Rosetta Stone for this data. For without it, end users and IT shops would have faced daunting coding tasks attempting to cull the proper elements out of the SAP® ERP code for reporting. However, BW and the associated tools around it were rudimentary to begin with, and have not advanced to where it meets the pressing demands of todays’ end users. The New Rosetta Stone 2.0 for SAP® ERP Data —And More. Download now!
Tags : rosetta stone, data, erp, sap®, teradata, it management
     Teradata
By: Teradata     Published Date: Feb 04, 2015
The Enterprise Priorities in Digital Marketing report, produced by Econsultancy in partnership with Teradata, provides guidance for the future through specific benchmarks from digital marketing leaders at enterprise organizations. The report focuses on the technology priorities of the world's largest companies, the strategies they support and the marketing budgets with which they're aligned. The report is based on an international survey of 402 senior marketers (director and above) from global enterprises. Respondents were from companies with more than $500 million in revenue, with 56% having revenues over $3 billion.
Tags : teradata, marketing, strategic direction, attribution, cloud, application, audience, management
     Teradata
By: Teradata     Published Date: Jul 15, 2015
This paper examines the value of big data applications as a means to ensure pervasive availability of big data analytics in the organization.
Tags : analytics, big data, applications, lob
     Teradata
By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption
     Teradata
By: Texas Memory Systems     Published Date: Feb 25, 2012
With flash based systems now commonly in the TBs of capacity and rapidly becoming more affordable, it may be time to look at using solid state storage with high bandwidth applications. Read this white paper to find out more.
Tags : solid state storage, bandwidth, high bandwidth, applications, data warehousing, tbs, tb capacity, storage
     Texas Memory Systems
By: Texas Memory Systems     Published Date: Feb 25, 2012
Most companies have only put limited effort toward the system architecture that surrounds the flash memory modules. In this white paper, Storage Switzerland focuses on the importance of architecture design in solid state storage systems.
Tags : ssd, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth
     Texas Memory Systems
By: Texas Memory Systems     Published Date: Feb 25, 2012
It is common knowledge that PCIe SSD is faster, right? Maybe not, says George Crump from Storage Switzerland. Read on to find out why.
Tags : pcie, pcie ssd, ssd, architecture, design, zero-latency, retrieval, solid state storage
     Texas Memory Systems
By: Texas Memory Systems     Published Date: Feb 25, 2012
In this part II of Enhancing Server And Desktop Virtualization With SSD, Storage Switzerland focuses on the next challenge of integrating SSD into a virtual server or desktop infrastructure and effectively using the technology in this environment.
Tags : integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization, architecture
     Texas Memory Systems
By: Texas Memory Systems     Published Date: Feb 25, 2012
For data centers looking to get the maximum performance from Flash-based storage supporting their virtual infrastructure, the RamSan-720 should be given strong consideration.
Tags : ramsan-720, integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization
     Texas Memory Systems
By: Texas Memory Systems     Published Date: Feb 25, 2012
In this final piece on server virtualization and SSD, Storage Switzerland discusses the power of performance, specifically, the dramatic impact that latent-free storage can make on the virtual environment. Read on to find out more!
Tags : desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth
     Texas Memory Systems
By: thawte     Published Date: Nov 06, 2006
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : ssl, encryption, security, application security, online data transfer, data security, secure socket layer, ssl certificate
     thawte
By: Thawte     Published Date: Aug 08, 2013
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, networking
     Thawte
By: Thawte     Published Date: Aug 08, 2013
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : thawte, ssl certificate, application, web server, data collection, technology, networking, security
     Thawte
By: Thawte     Published Date: Aug 08, 2013
Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
Tags : thawte, ssl certificate, application, web server, data collection, technology, networking, security
     Thawte
By: Thawte     Published Date: Aug 08, 2013
Why Self-Signed Certificates are Much Costlier-and Riskier- Than Working with a Trusted Security Vendor. Download this white paper for more information.
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security
     Thawte
By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security
     Thawte
By: Thawte     Published Date: Aug 08, 2013
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, networking
     Thawte
By: Thawte     Published Date: Aug 08, 2013
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : thawte, ssl certificate, application, web server, data collection, technology, networking, security
     Thawte
By: Thawte     Published Date: Aug 09, 2013
SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don’t take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, here are 10 best practices that everyone should follow when using this collaboration tool.
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security
     Thawte
By: The Economist Group     Published Date: Aug 22, 2019
In a digital world, customers expect banks to connect all the dots and deliver omnichannel experiences that are seamless, personalized, and yes, delightful. Whether your customers visit branch locations or engage on mobile apps, it’s essential that at the enterprise level, you're able to understand and anticipate their needs. Understanding your data is key to this kind of responsiveness. When you’re able to harness data and segment customers in new and exciting ways, target the right markets, and offer relevant products at the right time you can drive new opportunities, generate new revenue streams, and increase the value of every customer. To find out more download this whitepaper today.
Tags : 
     The Economist Group
By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips
     Third Brigade
By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
When application and database numbers increase, how does an organisation avoid overstretching its staff, multiplying costs, and complications? Many companies are using Oracle Exadata—a platform that’s powerful, optimised, and cloud-ready when you are. And they’re seeing, on average, a five-year ROI of 429 percent, 94 percent less unplanned downtime, and 103 percent improvement in transaction rates. See our infographic for more significant findings.
Tags : 
     This program is brought to you by Oracle and Intel
Start   Previous    86 87 88 89 90 91 92 93 94 95 96 97 98 99 100    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com