line data

Results 201 - 225 of 757Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : gdpr, risk mitigation, email resiliency, personal data protection
     Mimecast
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
     Cisco Umbrella EMEA
By: IBM     Published Date: May 17, 2016
Wikibon conducted in-depth interviews with organizations that had achieved Big Data success and high rates of returns. These interviews determined an important generality: that Big Data winners focused on operationalizing and automating their Big Data projects. They used Inline Analytics to drive algorithms that directly connected to and facilitated automatic change in the operational systems-of-record. These algorithms were usually developed and supported by data tables derived using Deep Data Analytics from Big Data Hadoop systems and/or data warehouses. Instead of focusing on enlightening the few with pretty historical graphs, successful players focused on changing the operational systems for everybody and managed the feedback and improvement process from the company as a whole.
Tags : ibm, big data, inline analytics, business analytics, roi
     IBM
By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
     Carbonite
By: Workday Netherlands     Published Date: Jul 05, 2019
"How can your growing organisation scale effectively and remain competitive? A strong HR core can help. This playbook from HR guru Jason Averbook and Workday offers step-by-step instructions for building an HR foundation that helps teams achieve success across your organisation. Read now to learn how the right technology enables you to: ? Streamline HR processes ? Better engage your workforce ? Deliver timely data-driven insights to stakeholders "
Tags : finance, workday, workforce technology, digital strategy
     Workday Netherlands
By: IBM     Published Date: Apr 18, 2017
Learn from this TDWI paper how right-sized information governance can improve the success of data warehousing or big data analytics initiatives, and how a chief data officer can help organizations to appreciate the value of data and its importance to their decisions and operations.
Tags : system integration, data governance, data optimization, data efficiency, data currency, data lineage, data security, data integration
     IBM
By: IBM     Published Date: Jul 26, 2017
The headlines are ablaze with the latest stories of cyberattacks and data breaches. New malware and viruses are revealed nearly every day. The modern cyberthreat evolves on a daily basis, always seeming to stay one step ahead of our most capable defenses. Every time there is a cyberattack, government agencies gather massive amounts of data. To keep pace with the continuously evolving landscape of cyberthreats, agencies are increasingly turning toward applying advanced data analytics to look at attack data and try to gain a deeper understanding of the nature of the attacks. Applying modern data analytics can help derive some defensive value from the data gathered in the aftermath of an attack, and ideally avert or mitigate the damage from any future attacks.
Tags : cyber attacks, data breach, advanced data analytics, malware
     IBM
By: NetApp     Published Date: Feb 22, 2010
This paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs.
Tags : netapp, san environment, data storage infrastructure, utilization, multiprotocol unified storage, data reduction, storage virtualization, backup
     NetApp
By: Adaptive Planning     Published Date: May 20, 2011
Learn how you can significantly extend the capabilities of your existing Salesforce.com, NetSuite, or other CRM application with an affordable, easy-to-use, and quick-to-deploy solution that automates sales forecasting, improves pipeline visibility, and enables what-if scenario planning.
Tags : adaptive planning, salesforce.com, netsuite, crm application, sales forecasting, pipeline, revenue predictability, crm data augmentation
     Adaptive Planning
By: Workday     Published Date: Jan 17, 2019
At Workday, we take a unique approach to development. We build one technology platform, on a single codeline, giving you a single security model and one source of truth. See how our singular methodology delivers real-time transactional data everyone can trust.
Tags : methodology, security model, technology
     Workday
By: NetApp     Published Date: Sep 24, 2013
"Today, IT’s customers are more mobile and global than ever before and as such expect their applications and data to be available 24x7. Interruptions, whether planned or unplanned, can have a major impact to the bottom line of the business. ESG Lab tested the ability of clustered Data ONTAP to provide continuous application availability and evaluated performance for both SAN and NAS configurations while running an Oracle OLTP workload. Check out this report to see the results."
Tags : mobile, global, applications, cloud, configuration, technology, storage, data center
     NetApp
By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
     McAfee
By: HGST     Published Date: Feb 05, 2015
Database users are increasingly interested in using Flash-based solid-state drives (SSDs) to speed up application performance. For many database administrators (DBAs), increased database performance directly impacts their user experience and bottom lines. Accelerating a single MySQL instance may allow DBAs to avoid painful sharding exercises, with all their attendant administration, application changes, and high capital and ongoing costs. With the wide range of SSDs available today, choosing any one can be difficult. This paper aims to answer the question, “Is it better to use slower SATA SSDs in RAID or a faster PCIe SSD to scale up MySQL database performance?"
Tags : solid-state storage, flash-based, database administrators, mysql, application changes, database users
     HGST
By: NetApp     Published Date: May 29, 2018
This white paper discusses AI infrastructure challenges and how NetApp can help you build a data pipeline for your deep learning workflows today, while future-proofing investments in your AI infrastructure. Careful infrastructure planning can smooth the flow of data through your deep learning pipeline, lead to faster time to deployment, and maximize competitive differentiation.
Tags : 
     NetApp
By: Dell EMC     Published Date: Aug 03, 2015
XtremIO reduces datacenter footprint and complexity with unstoppable in-line data reduction capabilities which address storage sprawl for Exchange databases. Thin provisioning doesn’t just eliminate space at the end of the drive, it eliminates all of the whitespace found within the database!
Tags : data reduction, deployment approaches, emc, exchange server, database availability, compression, cloud infrastructure, datacenter footprint reduction
     Dell EMC
By: Waterline Data & Research Partners     Published Date: May 18, 2015
Waterline Data automates the cataloging of data assets and provides an Amazon.com-like guided shopping approach to data discovery that is intended to take the guesswork out of targeting the right data.
Tags : waterline, big data, automation, cataloging, processing, analysis, assets, data science
     Waterline Data & Research Partners
By: Waterline Data & Research Partners     Published Date: May 18, 2015
In this report, Forrester Research recommends that application development and delivery (AD&D) professionals working on BI and big data initiatives get the best out of both by designing and integrating them in a flexible data platform.
Tags : waterline, big data, automation, cataloging, processing, analysis, assets, data science
     Waterline Data & Research Partners
By: Waterline Data & Research Partners     Published Date: Jun 15, 2015
Information governance and master data management initiatives are complex and require participation from a broad range of enterprise constituents. We focus on five small and innovative vendors that may help information managers reach their information governance and MDM goals.
Tags : vendors, governance, information, mdm, management
     Waterline Data & Research Partners
By: Waterline Data & Research Partners     Published Date: Jun 15, 2015
This analysis profiles products that can accelerate the shift toward business-user-oriented, visual, interactive data preparation.
Tags : gartner, analysis, data visualization, business tools, best practices, interactivity, vendor functionality
     Waterline Data & Research Partners
By: Mimecast     Published Date: May 27, 2015
White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.
Tags : mimecast, migration, microsoft office 365, storage, cloud backup, email, security, it management
     Mimecast
By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else you’re going to lose them.
Tags : 
     FICO
By: Rackspace     Published Date: Apr 15, 2019
Scale events — like online sales and digital product launches — present great revenue opportunities, but they also present large risks to your business. Whether you are a retailer preparing for Black Friday and Cyber Monday, or a digital vendor launching a new service, your brand is both at its most visible and its most vulnerable during these scale events. Many more customers visit your site over a short period of time, raising the potential for resource constraints and discovery of software bugs. Information about issues spreads quickly via social media and news outlets. And, your customers typically spend more per transaction, so every lost order has a greater negative impact on your bottom line. Site reliability engineering (SRE) can help you better prepare for scale events through an iterative cycle of data-driven improvement.
Tags : 
     Rackspace
By: Ping Identity     Published Date: Feb 12, 2016
Gartner projects almost 4 in 10 organizations will rely exclusively on BYOD by 2016, and 85 percent of businesses will allow some level of BYOD by 2020. If enterprises want peace of mind with regard to the security of their data and systems, they must understand employee perceptions and practices. Blurred lines between personal and work use impacts security and puts corporate data at risk.
Tags : 
     Ping Identity
By: Anaplan     Published Date: Apr 06, 2016
A Harvard Business Review Analytics Services White Paper Finance is constantly tested to keep pace in today’s business environment. To keep up, planning needs to become a continuous process that spans departmental boundaries and enables managers to collectively realign resources to respond to market changes. Organizations must streamline disparate sales and operational planning with traditional financial planning and analysis by using technology to connect people, data, and processes across the organization. Download this white paper to discover the three steps to moving towards finance-led integrated business planning recommended by the Harvard Business Review.
Tags : analytics, planning, cfo, operations, business practices, revenue, growth, enterprise business
     Anaplan
By: Citrix ShareFile     Published Date: Jul 11, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat you are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : accounting, mobility, security, data encryption, data
     Citrix ShareFile
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com