data variety

Results 1 - 25 of 113Sort Results By: Published Date | Title | Company Name
By: HERE Technologies     Published Date: Oct 23, 2019
Vehicles aren’t making full use of map data – yet, these maps can help keep cars safe in a number of ways – even as they fulfill their primary role of efficiently getting vehicles from A to B. VSI Labs recently performed a series of real-world tests to integrate HERE HD Live Map into a variety of ADAS applications. The objective was to increase the safety of ADAS by improving the functional performance of the vehicle. In this whitepaper, discover how HERE HD Live Map: • Enabled map-enhanced adaptive cruise control (ACC), which had an advantage over regular ACC systems in areas like highway exits and school zones • Enabled map-based lane keeping that operated properly in many complicated situations where computer vision-only systems constantly failed • Enabled successful map-based lane changing in cases like lane merging, faded markings and inclement weather, where a computer vision-based system had difficulties detecting lanes • Helped to increased driver comfort during a 2,000+ mile
Tags : 
     HERE Technologies
By: Cisco EMEA     Published Date: Nov 13, 2017
Big data and analytics is a rapidly expanding field of information technology. Big data incorporates technologies and practices designed to support the collection, storage, and management of a wide variety of data types that are produced at ever increasing rates. Analytics combine statistics, machine learning, and data preprocessing in order to extract valuable information and insights from big data.
Tags : big data, analytics, virtualization, cloudera, ibm, sas, sap, splunk
     Cisco EMEA
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Big Data is not just a big buzzword. Government agencies have been collecting large amounts of data for some time and analyzing the data collected to one degree or another. Big data is a term that describes high volume, variety and velocity of information that inundates an organization on a regular basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and better services.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Hewlett Packard Enterprise
By: Commvault     Published Date: Jul 06, 2016
Snapshot-based data protection solutions were supposed to solve our backup challenges, weren’t they? Then why are your backups still broken? If your snapshots are manually managed or of the “build-it-yourself” variety, there may be several reasons that they aren’t working very well.
Tags : commvault, storage snapshot based data protection, data protection, backup and recovery, intellisnap, array snapshot management, single point of failure, it management
     Commvault
By: SAS     Published Date: Jan 17, 2018
Compliance doesn’t have to be a scary word – even when facing the multifaceted challenges of meeting the European Union’s May 2018 deadline for its General Data Protection Regulation (GDPR). SAS conducted a global GDPR survey among 340 business executives from multiple industries. Based on the results of that survey, this e-book delves into the biggest opportunities and challenges organizations face on the road to GDPR compliance. Read this e-book to learn: How to get started on the best path to compliance, based on advice from industry experts. How to turn this compliance challenge into a competitive advantage. How your peers are preparing across a variety of industries. An end-to-end approach that can help guide your journey to GDPR compliance.
Tags : 
     SAS
By: Pentaho     Published Date: Nov 04, 2015
Amid unprecedented data growth, how are businesses optimizing their data environments to ensure data governance while creating analytic value? How do they ensure the delivery of trusted and governed data as they integrate data from a variety of sources? If providing appropriately governed data across all your data sources is a concern, or if the delivery of consistent, accurate, and trusted analytic insights with the best blended data is important to you, then don’t miss “Delivering Governed Data For Analytics At Scale,” an August 2015 commissioned study conducted by Forrester Consulting on behalf of Pentaho.
Tags : pentaho, analytics, platforms, big data, predictive analytics, data management, networking, it management
     Pentaho
By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
     Oracle CX
By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
     Oracle CX
By: Oracle CX     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
     Oracle CX
By: Dell EMC     Published Date: Nov 09, 2015
While the EDW plays an all-important role in the effort to leverage big data to drive business value, it is not without its challenges. In particular, the typical EDW is being pushed to its limits by the volume, velocity and variety of data. Download this whitepaper and see how the Dell™ | Cloudera™ | Syncsort™ Data Warehouse Optimization – ETL Offload Reference Architecture can help.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
To compete in this new multi-channel environment, we’ve seen in this guide how retailers have to adopt new and innovative strategies to attract and retain customers. Big data technologies, specifically Hadoop, enable retailers to connect with customers through multiple channels at an entirely new level by harnessing the vast volumes of new data available today. Hadoop helps retailers store, transform, integrate and analyze a wide variety of online and offline customer data—POS transactions, e-commerce transactions, clickstream data, email, social media, sensor data and call center records—all in one central repository.
Tags : 
     Dell EMC
By: Amazon Web Services     Published Date: Jul 25, 2018
What is a Data Lake? Today’s organizations are tasked with managing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organizations are finding that in order to deliver insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. Data Lakes are a new and increasingly popular way to store and analyze data that addresses many of these challenges. A Data Lakes allows an organization to store all of their data, structured and unstructured, in one, centralized repository. Since data can be stored as-is, there is no need to convert it to a predefined schema and you no longer need to know what questions you want to ask of your data beforehand. Download to find out more now.
Tags : 
     Amazon Web Services
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Forward-looking organizations are looking to next-generation all-flash storage platforms to eliminate storage cost and performance barriers. Advancements in all-flash technology have led to remarkable priceperformance improvements in recent years. The latest all-flash solutions from HPE deliver breakthrough economics, speed and simplicity, while improving availability and data durability. All-flash storage can help you reduce TCO and boost the performance of traditional applications as well as accelerate the rollout of new initiatives like IoT, big data and analytics. But moving data to a new storage architecture introduces a variety of organizational and technical challenges.
Tags : 
     Hewlett Packard Enterprise
By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
     Butler Technologies
By: IBM     Published Date: Jul 26, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business. To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize
Tags : scalability, data warehousing, resource planning
     IBM
By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
     VMware AirWatch
By: Datastax     Published Date: Dec 27, 2018
Today’s data volume, variety, and velocity has made relational database nearly obsolete for handling certain types of workloads. But it’s also put incredible strain on regular NoSQL databases. The key is to find one that can deliver the infinite scale and high availability required to support high volume, web-scale applications in clustered environments. This white paper details the capabilities and uses case of an Active Everywhere database
Tags : 
     Datastax
By: Splunk     Published Date: Aug 22, 2018
The world of artificial intelligence (AI) has finally arrived at the doorstep of IT operations. As organizations move toward using both big data and machine learning functionality to support a variety of IT operations, processes and tasks, artificial intelligence for IT operations (AIOps) platforms have emerged as a one-stop solution. Gartner has released a “Market Guide for AIOps Platforms” that provides findings about the AIOps industry and its latest developments. Download your complimentary copy to: *Gain insight into the developing industry of AIOps and its future *Learn how to optimize IT operations powered by machine learning to drive business value *Compare different AIOps platform vendors and their range of capabilities
Tags : it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms
     Splunk
By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : software provider, cloud service provider, gdpr
     Mimecast
By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : mdm, big data, automation, organization
     IBM
By: IBM     Published Date: Oct 26, 2017
Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).
Tags : risk based authentication, account takeover, intellectual property, sensitive data, identity management
     IBM
By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : byod, device discovery, data privacy, data security, it security, security, it management, data management
     Kaspersky Lab
By: NetApp     Published Date: Sep 24, 2013
"Today, enormous amounts of data are being created from a variety of sources, such as applications, new mobile devices, big data analytics, and the cloud. This is changing the speed with which business gets conducted and the scale in which it occurs. Moreover, the digital explosion shows no sign of slowing and IDC expects the amount of data being stored to grow in excess of 50% per year over the next few years. Discover how flash technology is being deployed to improve performance and efficiency for these demanding environments. Access this IDC whitepaper to learn more about the role of flash technology and the importance of flash solutions that are designed specifically for the enterprise."
Tags : data, cloud, data centers, mobile devices, flash technology, flash solutions, netapp, enterprise applications
     NetApp
By: ClearStory     Published Date: Oct 07, 2014
When it comes to “big data,” Gartner boils it all down to “value.” In their 2014 Cool Vendors for Big Data report, ClearStory Data was among 4 companies profiled. According to Gartner, ClearStory is “for companies looking at big data business intelligence and analytics from a data variety perspective.”
Tags : big data, value, business intelligence, analytics, data variety, data management, data center
     ClearStory
By: Cisco DWA Security     Published Date: Sep 14, 2018
Complete enterprise security requires coordination. Firms must integrate the technologies and data that come from the endpoint and network layers to make accurate decisions that ensure optimal threat detection, containment, and remediation. Unfortunately, too many firms rely on a huge variety of solutions that require manual integration and correlation, leading to wasted time and poor threat detection. Security leaders must automate these processes to eliminate detection lag and improve prevention efforts.
Tags : 
     Cisco DWA Security
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com