external sources

Results 1 - 25 of 33Sort Results By: Published Date | Title | Company Name
By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
     SAP
By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
A hybrid infrastructure strategy needs to define your right mix of cutting edge infrastructure, power your right mix with the best internal and external resources and optimize your right mix with leading management tools to ensure success every step of the way. Download now to learn more!
Tags : 
     Hewlett Packard Enterprise
By: AWS     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
     AWS
By: Dell     Published Date: Feb 02, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure.
Tags : 
     Dell
By: Dell EMC     Published Date: Feb 07, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure. Intel®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
     Dell EMC
By: HP     Published Date: Feb 02, 2015
In response to accelerating business demands and the need for internal IT to remain competitive with external sources (i.e., public clouds), business and IT managers alike realize they need to transform their IT environments. IDC is seeing enterprise IT move away from unmanageable virtualized systems, siloed servers, storage, information, and processes to embrace more integrated infrastructures that enable cloud-based technologies.
Tags : 
     HP
By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
     MobileIron
By: OracleSMB     Published Date: Jan 04, 2018
Compliance and risk management issues affect small and medium-sized businesses. They are not just a concern for larger, public companies, but smaller companies have fewer resources to deal with the regulatory demands that affect them. Instead of hiring expensive external resources to ensure compliance, invest in financial compliance cloud technology to continuously monitor and provide feedback on your compliance efforts. It will lower long-term costs, improve collaboration, and increase confidence in data security and financial reports.
Tags : 
     OracleSMB
By: Dell Storage     Published Date: Oct 17, 2011
The VMware® vCenter Plug-In for Dell PowerVault MD Series storage arrays enables VMware administrators to perform a wide range of storage provisioning and management tasks themselves - without having to rely on external IT resources.
Tags : vnware, dell, technology, powervault, storage management, storage, virtual
     Dell Storage
By: Dell Storage     Published Date: Nov 08, 2011
The VMware® vCenter Plug-In for Dell PowerVault MD Series storage arrays enables VMware administrators to perform a wide range of storage provisioning and management tasks themselves - without having to rely on external IT resources.
Tags : vnware, dell, technology, powervault, storage management, storage, virtual
     Dell Storage
By: AWS     Published Date: Nov 14, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources. This e-book aims to provide you with expert tips on how to use Amazon Redshift Spectrum to increase performance and potentially reduce the cost of your queries.
Tags : 
     AWS
By: Amazon Web Services     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
     Amazon Web Services
By: Salesforce.com     Published Date: Sep 16, 2013
Picking up the phone is not only one of the best ways to connect with customers, it’s one of the best prospecting tools you can have in your arsenal. It’s the way to take the lead. and succeed. Product Features: • Best practices to prepare for a call • How to efficiently organize your sales team • Tips on how to make a connection every time • A list of external resources for further study Download now.
Tags : sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections, sales kpis, sales prospecting, sales forecasting, sales forecast, sales pipeline, analytics, sales, enterprise applications, data management, data center
     Salesforce.com
By: Computhink     Published Date: Dec 10, 2007
To properly serve their customers, Cortes & Hay must create files of documents that need to be distributed to appropriate parties. The documents that comprise a title insurance binder come from two places. There are documents generated internally, and documents that come from external sources.
Tags : document management, title insurance, paperless, cortes & hay, insurance, documents, electronic document management, best practices, computhink, viewwise, viewise
     Computhink
By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences, collaboration applications, online training, online meetings, portals, instant messaging, online webinars/events, human resources technology, enabling knowledge workers, erp, crm, external audiences, vendor solutions
     WebEx
By: Dyn     Published Date: Nov 10, 2015
Read this Gartner Research Report and learn why without properly functioning external DNS, Internet-based resources may "disappear" without warning.
Tags : dyn, dns, digital business, gartner, internet-based, security, it management
     Dyn
By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
     Microsoft Office 365
By: Logicworks     Published Date: Feb 27, 2013
This white paper makes the case that any and all compliance obligations with which an organization must comply can be fully satisfied using cloud-based services.
Tags : cloud, manage, organizations, compliance, services, external sources
     Logicworks
By: AuditBoard     Published Date: Nov 26, 2018
Aggregating and analyzing internal organizational data, external subject matter expertise, and internal control-related data should provide the internal audit team a solid understanding of how the process works, the key risks managed by the process, and how the internal audit team should spend their time and resources to carry out the process.
Tags : 
     AuditBoard
By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
     Tripwire
By: IBM     Published Date: Oct 01, 2014
Salesforce.com is an industry leading cloud CRM solution which helps organizations streamline and effectively manage sales processes, customers and opportunities. The effectiveness of these initiatives can be improved dramatically by providing Salesforce with a 3600 view of the Customer to overcome the limitation of fragmented data that Salesforce currently relies on. This paper discusses how InfoSphere capabilities can be used to create comprehensive and accurate 3600 views of your customers from internal and external sources. This data is integrated seamlessly within Salesforce.com to help your sales teams get a complete view of the customer to help find the right contacts, allocate resources efficiently and identify new opportunities. This helps your sales teams be more efficient, effective and ultimately improve your win rate and drive more revenue.
Tags : salesforce, crm solution, data integration, data management
     IBM
By: Microsoft Dynamics     Published Date: Jul 11, 2007
The CPG manufacturing industry is large and thriving; however, margins are slim and competition is furious. There are hundreds of product categories, and to compete, firms must constantly innovate. How can the small-to-medium CPG manufacturer survive in the face of the same external pressures and fewer resources?
Tags : retailer, consumer goods, manufacturing, manufacturer, scm, supply chain, supply chain management, microsoft, microsoft dynamics, productivity, plm, product lifecycle management, radio frequency, rfid, wal-mart, procurement, fulfillment, distribution, cpg, globalization
     Microsoft Dynamics
By: IBM     Published Date: Jul 13, 2015
This paper discusses how InfoSphere capabilities can be used to create comprehensive and accurate 3600 views of your customers from internal and external sources.
Tags : crm cloud solution, salesforce, user productivity, data enrichment, security, data quality, customer data search, customer relationship management
     IBM
By: EMC UK     Published Date: May 06, 2010
Find out how private clouds deliver unprecedented flexibility and economies of scale by leveraging the speed of virtualization and preparing you to federate applications across internal or external IT resources. EMC Consulting can help you to quickly seize these benefits by deploying a private cloud strategy.
Tags : emc consulting, private cloud, virtualization, cloud computing, virtualized data center, public cloud
     EMC UK
By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : acceptable use, communications systems, text messaging, acceptable use policy, confidentiality, security, it management, data management
     SpectorSoft
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com