cip

Results 1 - 25 of 1041Sort Results By: Published Date | Title | Company Name
By: Cray     Published Date: Jul 02, 2015
The Cray XC series is a distributed memory system developed as part of Cray’s participation in the Defense Advanced Research Projects Agency’s (DARPA) High Productivity Computing System (HPCS) program. Previously codenamed “Cascade,” the Cray XC system is capable of sustained multi-petaflops performance and features a hybrid architecture combining multiple processor technologies, a high performance network and a high performance operating system and programming environment.
Tags : 
     Cray
By: Intel     Published Date: Aug 06, 2014
Powering Big Data Workloads with Intel® Enterprise Edition for Lustre* software The Intel® portfolio for high-performance computing provides the following technology solutions: • Compute - The Intel® Xeon processor E7 family provides a leap forward for every discipline that depends on HPC, with industry-leading performance and improved performance per watt. Add Intel® Xeon Phi coprocessors to your clusters and workstations to increase performance for highly parallel applications and code segments. Each coprocessor can add over a teraflop of performance and is compatible with software written for the Intel® Xeon processor E7 family. You don’t need to rewrite code or master new development tools. • Storage - High performance, highly scalable storage solutions with Intel® Enterprise Edition for Lustre* software and Intel® Xeon Processor E7 based storage systems for centralized storage. Reliable and responsive local storage with Intel® Solid State Drives. • Networking - Intel® True Scale Fabric and Networking technologies – Built for HPC to deliver fast message rates and low latency. • Software and Tools: A broad range of software and tools to optimize and parallelize your software and clusters.
Tags : 
     Intel
By: Altair     Published Date: Feb 19, 2014
The Weizmann Institute of Science is one of the world’s leading multidisciplinary research institutions. Hundreds of scientists, laboratory technicians and research students embark daily on fascinating journeys into the unknown, seeking to improve our understanding of nature and our place within it. Groundbreaking medical and technological applications that have emerged from basic research conducted by Weizmann Institute scientists include: amniocentesis, a prenatal diagnostic test; sophisticated laser systems for high-precision diamond cutting; living polymerization, one of the most fundamental techniques of the modern polymer industry; and ribosome structure analysis, for which the Institute’s Professor Ada Yonath was awarded a Nobel Prize in Chemistry.
Tags : 
     Altair
By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
     VMware
By: KPMG     Published Date: Oct 15, 2019
Environmental/climate change risk, disruptive technologies and a return to territorialism were ranked the top threats to company growth. Specifically, 68 percent of CEOs agreed that their organisational growth will be determined by their ability to anticipate and navigate the global shift to a low-carbon, clean technology economy. Read now KPMG's CEO outlook report to understand what is on top of the asset management CEO agenda and to find out what investments CEOs are prioritising to improve organisation’s resilience.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 06, 2019
Businesses increasingly see cloud as the best route to enhanced agility and digital transformation. But this survey reveals that keeping the lid on cloud costs is far from straightforward. Read this report to discover: • whether businesses are realising the benefits they anticipated from cloud migration • how effective companies are at managing cloud investments • the risks and consequences of getting locked into inefficient architectures.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
     KPMG
By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
• Simplify business process modeling: Quickly build processes in a straightforward cloud-based interface designed for both IT and business users • Improve process efficiency and accuracy: A central process repository eliminates version control and consistency issues by providing users real-time access to process workflows • Enhance cross-team collaboration: A shared team workspace engages all business process owners, encouraging cross-team participation and continuous process improvement
Tags : 
     Group M_IBM Q4'19
By: IBM APAC     Published Date: Sep 30, 2019
Digital technology is changing the financial services industry rapidly with automated process, AI insights, customized experiences, new operating models and next generation applications. In such a scenario how should banks innovate and stay ahead of the game? This e-book will provide you the best strategies and recommendations for modernizing your IT infrastructure and operations. You’ll learn how to lead disruption and manage rapid change for your bank, its operations and its customers. Here are the five key takeaways: • Personalize customer experiences by maximizing your data • Borrow strategies from open banking and new business models • Step up your security game • Drive innovation from the inside out • Design an agile infrastructure to support participation in new digital marketplaces Find out more in the e-book.
Tags : 
     IBM APAC
By: TIBCO Software     Published Date: Sep 16, 2019
TIBCO Data Virtualization é uma solução comprovada que é usada por quatro das cinco principais companhias de energia integradas para fornecer mais rapidamente um maior volume de dados analíticos nas operações de exploração e produção. Os casos de uso específicos descritos incluem: • Análise de dados em plataformas offshore • Manutenção e reparação de poços • Serviços de dados web em refinarias • SAP Master Data Quality Se uma empresa de energia está enfrentando desafios relacionados com dados e suas análises, deve considerar o TIBCO Data Virtualization.
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
A tendência atual na indústria de manufatura se inclina para os produtos feitos sob medida em lotes pequenos e com tempo de entrega reduzido. Com frequência, esta mudança pode alterar a produção, o que acarreta em um maior tempo de inatividade das máquinas, custos de produção mais altos, desperdício de produtos e a necessidade de voltar a produzir os produtos defeituosos. Para satisfazer a demanda dos clientes por trás dessa tendência, os fabricantes devem passar rapidamente para novos modelos de produção. O controle de qualidade é a principal área que a TI deve apoiar. Ao mesmo tempo, a rastreabilidade dos produtos se torna essencial para a conformidade, bem como para a qualidade. A rastreabilidade pode ser alcançada interconectando fontes de dados em toda a fábrica, analisando dados históricos e de streaming para obter insights e tomando medidas imediatas para controlar todo o processo de ponta a ponta. Isso pode levar a notáveis reduções de custo e ganhos de eficiência, confiabili
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
TIBCO Data Virtualization es una solución probada que es utilizada por cuatro de las cinco principales compañías de energía integradas para obtener más rápidamente una mayor cantidad de datos analíticos las operaciones de exploración y producción. Los casos de uso específicos que se describen incluyen: • Analítica de Datos de Plataformas Marítimas • Mantenimiento y Reparación de Pozos • Servicios de Datos Web en Refinerías • SAP Master Data Quality Si una compañía de energía está enfrentando desafíos relacionados con los datos y la analítica similares, debe considerar TIBCO Data Virtualization.
Tags : 
     TIBCO Software
By: KPMG     Published Date: Jun 06, 2019
Traditional strategies for driving sales are no longer enough. Brands that only connect with customers on a transactional basis are losing out to more innovative brands that create a richer experience for customers. Read this story to find out: • how we developed a digital strategy to restore growth to an iconic sporting brand • how data can drive a dynamic connection with customers and create new opportunities for growth • key principles for developing your own digital strategy.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 06, 2019
Rapidly changing business models are driving fresh interest in zero-based cost management. Read this insight to discover: • the potential benefits of zero-based budgeting • how to avoid key mistakes associated with this budgeting approach • five principles to apply to create the conditions for zero-based success.
Tags : 
     KPMG
By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
     ASG Software Solutions
By: NetSpi     Published Date: Oct 01, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify any misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
     NetSpi
By: Principled Technologies     Published Date: Aug 22, 2013
Database performance and cost comparison: AMD-based Open Compute 3.0 server vs. HP ProLiant DL360p Gen8
Tags : 
     Principled Technologies
By: Ability Commerce     Published Date: May 18, 2009
As direct marketers, you know "the devil is in the details." Being able to drill-down on results is important to determine future strategies. It takes discipline and the application of direct marketing tenets. But you can fine-tune your results, target better and reap the rewards.
Tags : ability commerce, seo, email frequency, metrics, roi, pci, ecommerce, e-commerce, order management, load time
     Ability Commerce
By: PCRecruiter     Published Date: Oct 28, 2010
Only a decade or so ago, those human resources professionals who hadn't yet found their way onto the Internet were finding themselves increasingly left out in the cold.As we slip swiftly into the second decade of the 21st century, it's those who haven't yet begun to participate in 'social media and networking' that are starting to feel the chill.
Tags : pcrecruiter, recruiting, social networking, network, facebook, twitter, email program, networking, databases
     PCRecruiter
By: PCRecruiter     Published Date: Oct 28, 2010
Only a decade or so ago, those human resources professionals who hadn't yet found their way onto the Internet were finding themselves increasingly left out in the cold. As we slip swiftly into the second decade of the 21st century, it's those whohaven't yet begun to participate in 'social media and networking' that are starting to feel the chill.
Tags : pcrecruiter, recruiting, social networking, network, facebook, twitter, email program, networking, databases
     PCRecruiter
By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : astaro, cloud computing, botnets, network, security
     Astaro
By: Cisco EMEA     Published Date: Jun 19, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. To find out more download this whitepaper today.
Tags : 
     Cisco EMEA
By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
     Red Hat
By: Cisco     Published Date: Dec 20, 2018
This research finds that huddle spaces deliver tremendous value to businesses, with 9 out of 10 participants stating the adoption of open space environments is increasing the need for these huddle spaces. Huddle spaces require a wide variety of technologies to enable users and the business, such as audio and video conferencing abilities, digital whiteboards and scheduling solutions. Users stated that ease of use, solution reliability, and similar technology in each huddle space is key to their productivity. But nearly 8 out 10 users shared they were frustrated with meeting room technology recently. These problems generate support calls to IT on a weekly, if not daily, basis
Tags : 
     Cisco
By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
     Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com