ios

Results 1 - 25 of 918Sort Results By: Published Date | Title | Company Name
By: SGI     Published Date: Nov 17, 2015
In the pantheon of HPC grand challenges, weather forecasting and long-term climate simulation rank right up there with the most complex and com- putationally demanding problems in astrophysics, aeronautics, fusion power, exotic materials,and earthquake prediction, to name just a few. Modern weather prediction requires cooperation in the collection of observed data and sharing of forecasts output among all nations, a collabora- tion that has been ongoing for decades. This data is used to simulate effects on a range of scales— from events, such as the path of tornados, that change from minute to minute and move over distances measured in meters, to turnover of water layers in the ocean, a process that is measured in decades or even hundreds of years, and spans thousands of miles. The amount of data collected is staggering. Hundreds of thousands of surface stations, including airborne radiosondes, ships and buoys, aircraft, and dozens of weather satellites, are streaming terabytes of i
Tags : 
     SGI
By: IBM     Published Date: Feb 13, 2015
This major Hollywood studio wanted to improve the computer time required to render animated films. Using HPC solution powered by Platform LSF increased compute capacity allowing release of two major feature films and multiple animated shorts.
Tags : 
     IBM
By: Avere Systems     Published Date: Jun 27, 2016
This white paper reviews common HPC-environment challenges and outlines solutions that can help IT professionals deliver best-in-class HPC cloud solutions—without undue stress and organizational chaos. The paper: • Identifies current issues—including data management, data center limitations, user expectations, and technology shifts- that stress IT teams and existing infrastructure across industries and HPC applications • Describes the potential cost savings, operational scale, and new functionality that cloud solutions can bring to big compute • Characterizes technical and other barriers to an all cloud infrastructure and describes how IT teams can leverage a hybrid cloud for compute power, maximum flexibility, and protection against locked-in scenarios
Tags : 
     Avere Systems
By: VMware     Published Date: Sep 12, 2019
Companies today understand there are significant business benefits to modernizing and automating their IT processes. By doing so, they can improve operational efficiencies, boost productivity and agility, reduce costs and — with the resultant savings — invest in new initiatives and innovations to become even more competitive. But how do you go about transforming IT infrastructure and operations, and how do you measure progress? After all, efforts to harness IT transformation as an engine to drive business transformation have been underway for years and will continue into the foreseeable future. Fortunately, a ready source of detailed IT transformation insights exists. For nearly a decade, Dell EMC and VMware have helped CIOs define and prioritize the steps needed to transform their IT organizations as part of a series of IT Transformation Workshops with their customers
Tags : 
     VMware
By: VMware     Published Date: Sep 12, 2019
Over the next few years, chief information officers (CIOs) will preside over a maelstrom of change that will fundamentally alter the way their companies do business in the future.
Tags : 
     VMware
By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
     VMware
By: KPMG     Published Date: Oct 15, 2019
When we first launched the Women In Alternative Investments Report (WAI Report) in 2001, we were among the few voices talking about women’s advancement in alternative investments. It was a delicate conversation and one that few people were comfortable having. But now, eight years later, the conversation has shifted. The issues have moved mainstream, the dialogue has broadened, and the voices are many, but change is afoot. Investors are pressuring Alternative Investment Firms to increase gender diversity at the funds and portfolios they invest in. Read the KPMG report to understand why achieving gender diversity is a business imperative.
Tags : 
     KPMG
By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
     BehavioSec
By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
     BehavioSec
By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
     BehavioSec
By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
     BehavioSec
By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
     BehavioSec
By: Workable     Published Date: Oct 09, 2019
Do you need an ATS? Broadly speaking, we’ve found three common scenarios driving the search for a better way to hire: Growing pains - companies with growing pains are typically looking for some predictability and structure across candidate sourcing and hiring. Drowning in email and spreadsheets - companies are looking for more efficient ways to manage candidates and collaborate as a team Outdated software - companies are looking for a modern, efficient approach to deliver on the original promise of an ATS A modern ATS, chosen with the right criteria, will relieve these common pain points. Take a step back and think about how your recruiting could be improved with the right tool.
Tags : 
     Workable
By: Centercode     Published Date: Oct 16, 2019
Today's technology is getting more and more complex, and it's moving from the lab to homes and offices faster than ever. Increasing competition, expanding markets, and a growing expectation for seamlessness mean IoT and SaaS companies alike are looking for a thorough but fast-paced means to validate the quality of their products and releases. This e-book gives a straight-forward introduction to Customer Validation -- the modern framework for beta testing. It anchors the four key components of traditional beta (people, products, environment, and time frame) around the needs of present-day product development. This includes: establishing the building blocks for thoroughly testing interoperability, creating accurate user scenarios, carving out channels for direct customer interaction, and identifying solutions that will delight your audience.
Tags : 
     Centercode
By: Infinidat EMEA     Published Date: May 14, 2019
Digital transformation is a business enabler, one that also translates to an increase in the demand for greater storage capacity and performance. This increasing demand requires IT organizations to re-examine their data storage strategy as the growth in capacity doesn’t align with a shrinking IT budget. To support the growth of the business and remain competitive in a global digital market, CIOs are asked more than ever to “do more with less,” while improving performance and availability at the same time.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: Oct 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken.
Tags : 
     Infinidat EMEA
By: Intel     Published Date: Sep 20, 2019
Skilled IT teams understand that one cloud does not fit all. Compliance issues may demand that some data be held internally. Budget-imposed total cost of ownership (TCO) limits may push other data out to public clouds. Hence, a scalable multi-cloud infrastructure becomes imperative. This whitepaper addresses key questions commonly raised by CIOs considering the move to multi-cloud. Further, it sheds light on how Intel® technologies such as the 2nd Generation Intel® Xeon® Scalable processors and Intel® Optane™ DC Persistent Memory can help boost your cloud credentials.
Tags : 
     Intel
By: Datastax     Published Date: Oct 21, 2019
The majority of enterprises using cloud will be living in a hybrid deployment world for the foreseeable future. Data and analytics leaders must understand the risks and benefits in using the primary scenarios for hybrid cloud DBMS, and how they align with core use cases and architectures. Read this Gartner report to learn more about how you can evolve your data management strategy to reflect the latest trends and technologies.
Tags : 
     Datastax
By: SAS     Published Date: Sep 05, 2019
Envision this situation at a growing bank. Its competitive landscape demands an agile response to evolving customer needs. Fortunately, analytically minded professionals in different divisions are seeing results that positively affect the bottom line. • A data scientist in the business development team analyzes data to create customized • experiences for premium customers. • A digital marketer tracks and influences the customer journey for prospective • mortgage customers. • A risk analyst builds risk models for the bank’s loan portfolios. • A data analyst examines data about local customers. • A technical architect defines a new system to protect bank data from internal and • external cyberthreats. • An application developer builds a new mobile app for online customer portfolio • management. Between them, these employees might be using more than a dozen packages for analytics and data management.
Tags : 
     SAS
By: TIBCO Software     Published Date: Sep 16, 2019
A indústria de petróleo está sendo transformado de maneira dinâmica graças ao poder de conexão da Internet, aos avanços nos sensores conectados remotamente e às possibilidades que o machine learning e a inteligência artificial (IA) oferecem. À medida que a busca por hidrocarbonetos e fontes alternativas de energia se estende a ambientes mais profundos e hostis, operadores, empresas de serviços e proprietários de ativos estão aproveitando os avanços tecnológicos para garantir que seus funcionários estejam mais seguros, seus campos sejam mais produtivos e seus ativos operem com eficiência máxima.
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
TIBCO Data Virtualization é uma solução comprovada que é usada por quatro das cinco principais companhias de energia integradas para fornecer mais rapidamente um maior volume de dados analíticos nas operações de exploração e produção. Os casos de uso específicos descritos incluem: • Análise de dados em plataformas offshore • Manutenção e reparação de poços • Serviços de dados web em refinarias • SAP Master Data Quality Se uma empresa de energia está enfrentando desafios relacionados com dados e suas análises, deve considerar o TIBCO Data Virtualization.
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
A Endesa é uma empresa líder em energia na Espanha e em Portugal, com cerca de 10.000 funcionários, prestando serviços para mais de 11 milhões de clientes. A empresa está comprometida em difundir uma cultura energética mais sustentável e busca estar na vanguarda da transformação tecnológica do setor de energia. Para atingir esse objetivo, a Endesa se uniu ao Grupo Enel em 2009, uma empresa multinacional de energia e operadora líder nos mercados globais de eletricidade e gás, com foco especial nos mercados europeu e latino-americano.
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
Os bancos em todo o mundo estão apostando muito em inteligência artificial e machine learning para lhes dar a vantagem tecnológica necessária para obter serviços bancários em tempo real, personalizados e preditivos. Um marco ajudará a diferenciar os primeiros ganhadores e fornecerá vantagens contínuas em inteligência. Faça o download deste IDC Analyst Infobrief para saber como os melhores bancos do mundo estão se tornando mais pessoais, preditivos e mais em tempo real do que nunca. O que você conhecerá: • 8 tendências que refletem o nível de preparação do banco para a inteligência conectada • 9 armadilhas para evitar e 9 maneiras de pular os obstáculos • Os elementos básicos pessoais, preditivos e em tempo real da IA e ML para os bancos • Líderes de destaque com base na pesquisa da IDC Financial Insights e em seus respectivos casos de uso • Orientação essencial do IDC para os bancos líderes
Tags : 
     TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com