data source

Results 501 - 525 of 761Sort Results By: Published Date | Title | Company Name
By: AuditBoard     Published Date: Nov 26, 2018
Aggregating and analyzing internal organizational data, external subject matter expertise, and internal control-related data should provide the internal audit team a solid understanding of how the process works, the key risks managed by the process, and how the internal audit team should spend their time and resources to carry out the process.
Tags : 
     AuditBoard
By: CDW     Published Date: Apr 04, 2016
Poor rack cable management has proven to many data center operators to be a source of downtime and frustration during moves, adds and changes. It can also lead to data transmission errors, safety hazards, poor cooling efficiency, and a negative overall look and feel of the data center. This paper discuses the benefits of effective rack cable management, provides guidance for cable management within IT racks including high density and networking IT racks, which will improve cable traceability and troubleshooting time while reducing the risk of human error.
Tags : data management, business practices, data center. data application, rack cable management, data center
     CDW
By: CDW - APC     Published Date: Apr 07, 2016
Poor rack cable management has proven to many data center operators to be a source of downtime and frustration during moves, adds and changes. It can also lead to data transmission errors, safety hazards, poor cooling efficiency, and a negative overall look and feel of the data center. This paper discuses the benefits of effective rack cable management, provides guidance for cable management within IT racks including high density and networking IT racks, which will improve cable traceability and troubleshooting time while reducing the risk of human error.
Tags : data management, business practices, data center. data application, rack cable management, data center
     CDW - APC
By: Adobe     Published Date: Mar 03, 2017
When it comes to audience engagement, the landscape has been completely rewritten. Media and entertainment companies need to embrace new technologies to achieve revenue goals. The Adobe guide, Play to Win in Audience Intelligence, shows you how. Read the guide to learn: • How to bring your data sources together into a unified view of the customer • How to move beyond basic demographic attributes to behavior attributes • How to use look-alike modeling to improve customer targeting and acquisition
Tags : audience intelligence, audience engagement, unified data source, behavior attributes, look-alike modeling, data management
     Adobe
By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
     AlienVault
By: IBM     Published Date: May 07, 2015
Hurwitz & Associates announced the findings of its inaugural Victory Index for predictive analytics. This assessment highlights both the diverse uses of predictive analytics and vendors who make those applications.
Tags : predictive analytics, data sources, vendor selection, data mining
     IBM
By: Juniper Networks     Published Date: Jun 29, 2017
The bank wanted to modernize its global data center core and edge networks to move to the next stage of its private cloud journey. The bank has long recognized the advantages of server virtualization, and it wanted to move more aggressively to a software-defined data center. The bank was virtualizing all services, including compute, storage, and network, to gain greater business flexibility and deliver cost savings. But first, it needed an elastic, flexible, and production ready network to connect its data centers. The bank wanted a dynamically scalable network to interconnect its data centers in Europe, Asia, and North America, so that it could move toward a fully automated, self provisioned cloud. The global network needed to deliver performance at scale for the company’s highly virtualized resources, while also supporting integration of legacy assets into its software-defined data centers.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Juniper Networks
By: NetSuite     Published Date: Mar 09, 2007
This exclusive Yankee Group White Paper reveals and examines how mid-size businesses can now build a real-time enterprises and leverage real-time information. Learn how to reduce scattered information and silo databases that prevent your enterprise from achieving operational excellence.
Tags : crm, netsuite, erp, real time enterprise, mid-size businesses, silo database, customer relationship management, enterprise resource planning, netsuite, it management, enterprise applications
     NetSuite
By: Rackspace     Published Date: Aug 15, 2016
A Microsoft Private Cloud enables businesses to balance the benefits of cloud computing with the benefits of a private data center. Building and maintaining a Microsoft® Cloud Platform environment can be challenging, though, and most organizations don’t have the resources to effectively manage the environment. This white paper examines how businesses can address those challenges and leverage the benefits of a Microsoft Private Cloud by using Rackspace to host and manage their Microsoft Cloud Platform environment.
Tags : 
     Rackspace
By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
     CrowdStrike
By: IBM     Published Date: Aug 10, 2009
This whitepaper captures the lessons learned from various Project Liberate engagements worldwide and presents best practices from these case studies as well as advice on negotiating strategies. The information is based on publicly available data sources (which are subject to change as offerings change), customer feedback, and IBM’s own experience in dealing with these offerings. Learn more today!
Tags : ibm, wibm, consulting engagement, customer experience, microsoft enterprise agreement, microsoft enterprise agreements, cal, core client access license, sms, moss, configuration management, mui, product deployment, epp, employee purchase program, epp, hup, enterprise applications
     IBM
By: Symantec     Published Date: Nov 04, 2013
Small and midsized businesses have a particularly challenging time protecting company data. They have many of the same security and backup challenges as large enterprises, but fewer resources in terms of funding, time and specialized expertise.
Tags : symantec, security, protecting data, smbs, symantec’s state of information survey, projected data stores, software development, it management
     Symantec
By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : business content, volume, cloud-based, enterprise content management, ecm
     Group M_IBM Q1'18
By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
     Lookout
By: Red Hat     Published Date: Sep 25, 2014
Enterprises are increasingly adopting Linux as a secure, reliable and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions. In particular, the Red Hat Enterprise Linux (RHEL) operating environment, which is based on the Linux open-source kernel, has become widely deployed by medium-sized and large businesses, by enterprises in their data centers, and in private and public cloud infrastructures. RHEL is distributed and supported by Red Hat Inc., the world’s largest provider of open-source software solutions, accounting for 74.7% of worldwide Linux operating system (OS) revenue. As a development and deployment platform, RHEL offers an efficient, scalable and robust operating environment with certified security and flexible deployment options in physical and virtualized environments.
Tags : enterprise solutions, open-source software, it management, storage, data center
     Red Hat
By: CDW     Published Date: Apr 04, 2016
Prefabricated modular data centers offer many advantages over traditionally built data centers, including flexibility, improved predictability, and faster speed of deployment. Cost , however, is sometimes stated as a barrier to deploying these designs. In this paper, we focus on quantifying the capital cost differences of a prefabricated vs. traditional 440 kW data center, both built with the same power and cooling architecture, in order to highlight the key cost drivers, and to demonstrate that prefabrication does not come at a capex premium . The analysis was completed and validated with Romonet’s Cloud-based Analytics Platform, a vendor-neutral industry resource.
Tags : analysis, development management, data management, business intelligence, best practices, data center
     CDW
By: CDW - APC     Published Date: Apr 07, 2016
Prefabricated modular data centers offer many advantages over traditionally built data centers, including flexibility, improved predictability, and faster speed of deployment. Cost , however, is sometimes stated as a barrier to deploying these designs. In this paper, we focus on quantifying the capital cost differences of a prefabricated vs. traditional 440 kW data center, both built with the same power and cooling architecture, in order to highlight the key cost drivers, and to demonstrate that prefabrication does not come at a capex premium . The analysis was completed and validated with Romonet’s Cloud-based Analytics Platform, a vendor-neutral industry resource.
Tags : analysis, development management, data management, business intelligence, best practices
     CDW - APC
By: Tripp Lite     Published Date: Jun 28, 2018
When you’re designing a data center, server room or network closet, deciding which racks to deploy and how to configure them should be at the top of your list. Just like building a house, the surface details may steal the spotlight, but it’s the quality of the underlying foundation that makes the difference between success and frustration. Racks organize IT equipment, such as servers and network switches, into standardized assemblies that make efficient use of space and other resources. Depending on the options you choose, they can also improve power protection, cooling, cable management, device management, physical security, mobility, ease of installation and protection from harsh environmental conditions. Choosing the right racks and configuring them to match your needs will ensure that your IT equipment operates reliably and efficiently, saving your organization from costly downtime and other needless expenses.
Tags : 
     Tripp Lite
By: Rackspace     Published Date: Jan 19, 2016
Many companies want to take advantage of public cloud features, but aren’t willing to compromise on the performance, security and control that they require for their business applications and data. Public clouds have the potential to introduce performance issues caused by “noisy neighbors,” security concerns associated with placing sensitive data in a shared infrastructure environment, and a lack of control driven by the inability to customize and fine-tune cloud resources to meet the needs of a given application.
Tags : rackspace, private cloud, enterprise, application, data, software development, data management
     Rackspace
By: VSS Monitoring     Published Date: Aug 01, 2014
Learn how to make a case for bringing network data into the big data infrastructure and see why such a move will allow for resources to be shared more easily across disparate data sets.
Tags : bid data, network data, data infrastructure, backend architecture, bid data deployments
     VSS Monitoring
By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
The relational database has been the foundation of enterprise data management for over thirty years. But the way we build and run applications today, coupled with unrelenting growth in new data sources and growing user loads are pushing relational databases beyond their limits. This can inhibit business agility, limit scalability and strain budgets, compelling more and more organizations to migrate to alternatives like MongoDB or NoSQL databases.
Tags : rdbms, mongodb, migration, data, enterprise, management
     AstuteIT_ABM_EMEA
By: AWS     Published Date: Jul 24, 2019
Modernize your applications quickly Many organizations are finding their legacy technology to be inadequate due to its rigidity and high costs. In search of more flexible and cost-effective solutions, many are turning to the cloud. Most Independent Software Vendors (ISVs), however, still build their solutions on commercial databases that are expensive and time-consuming for their customers to deploy and maintain. This is a significant undertaking that can hinder adoption. To address these challenges head on, ISVs can modernize their applications on Amazon Aurora, a database offering from AWS that combines the reliability and performance of commercial databases with the cost-effectiveness and flexibility of open source solutions. In this webinar, you will learn how Virtusa, an AWS Partner Network (APN) Premier Consulting Partner, can accelerate your application modernization journey and help you grow your business. PTNR_ipc-database-migration-icon_245×155_Mar-2019.png View the webin
Tags : 
     AWS
By: Inside HPC Media LLC     Published Date: Sep 24, 2019
Artificial Intelligence (AI) is rapidly becoming an essential business and research tool, providing valuable new insights into corporate data and delivering those insights with high velocity and accuracy. Enterprises, universities, and government organizations are investing tremendous resources to develop a wide array of future-focused Deep Learning (DL) and Machine Learning (ML) solutions such as: • Autonomous vehicles that circulate unassisted in our cities • Real-time fraud detection that protects shopping and internet transactions • Natural language translators that remove language barriers • Augmented reality that delivers a far richer entertainment experience • Accelerated drug discovery • Fully enabled personalized medicine and remote health diagnostics
Tags : 
     Inside HPC Media LLC
By: RedHat     Published Date: May 10, 2017
The leading open source platform for modern datacenters
Tags : data centers, red hat, linux, enterprise linux, open source, open source platform
     RedHat
By: Red Hat, Inc.     Published Date: Jul 10, 2012
Today, as IT departments struggle to design and implement solutions capable of managing exponential data growth with strict requirements for application scale and performance, many of them are turning to in-memory data grids (IMDGs).
Tags : it departments, data growth, managing data growth, application scale, application performance, in-memory data grids, imdgs, big data, data volume, data velocity, data variability, data management, data collection, data processing, data scaling, data storage systems, data access, data solutions, data challenges, management tooling
     Red Hat, Inc.
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com