model

Results 151 - 175 of 1913Sort Results By: Published Date | Title | Company Name
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
How HPE is Addressing Changing Storage Consumption Models to Support Hybrid IT
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
6-Nines is a standard benefit of being our customer. That’s why this is a cost-nothing, do-nothing different guarantee. • Applicable on all models and configurations • Automatic on new arrays and on existing arrays with a support renewal • Guaranteed for as long as the product is supported HPE InfoSight monitors your uptime and if you experience less than 99.9999% availability, we’ll work with you to resolve the issue and provide support credit(s) at no cost
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
"Multicloud Storage for Dummies consists of five short chapters that explore the following: - How the multicloud storage model aligns with modern business and IT initiatives - Common barriers to cloud adoption and how a multicloud storage model addresses them - How to build a multicloud data center - What to look for in multicloud storage services - Real-world multicloud use cases
Tags : 
     Hewlett Packard Enterprise
By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
     CrowdStrike
By: SAP     Published Date: Nov 01, 2017
View this webinar to find out how to address challenges with PaaS such as Macro Trends, Dynamic Workforce, Disruptive Technology Adoption and New Digital Business Models.
Tags : 
     SAP
By: Microsoft     Published Date: Jun 19, 2017
Gartner reports that 75% to 80% of organizations are using some form of agile project management process. Although agile project management has been around for many years, the way we adapt it has changed significantly, especially as project portfolio management (PPM) practices have evolved. In today’s businesses, technology plays a crucial role in our success, but technology can also make things more uncertain. This uncertainty has given us the motive to be more flexible and requires a “think on your feet” mentality. For this reason, we've seen a big spike in Agile PPM over the last few years. So how do we continue to deliver stability and efficiency, the result of traditional style PPM, while also giving in to necessary risks that lead to innovation and competitive edge? It’s simple: accept the value in each method, avoid the inevitable pains that may develop with segregation, and opt for a unified agile and traditional PPM model.
Tags : 
     Microsoft
By: FICO     Published Date: May 11, 2017
Competing in telecommunications markets is becoming extremely complicated. Responding to disruptive change from many directions, telecom companies are experimenting with new business models and offering new types of services. With this comes the potential to draw new waves of regulatory oversight, further complicating the picture.
Tags : customer experience, customer management, telecom, customers
     FICO
By: FICO     Published Date: May 11, 2017
Agencies have long provided telecommunications companies with scalability for collections in a high-growth industry. Today, with markets and business models changing, your collections agencies have a growing impact — for good or ill — on your success.
Tags : customer experience, analytics, risk management
     FICO
By: Adobe     Published Date: Mar 27, 2018
Imagine a young, urban couple with their third baby on the way. They’re ready to make the oft-dreaded leap to a minivan, and it’s time to decide on a brand and a model. While dad checks safety ratings and online reviews, mom calls her friends to ask how they like their own vans. Together, they review and compare features on the manufacturer’s website and later “build” their dream minivan, choosing colors, fabrics, floor mats, and other accessories—all without leaving their living room. Perfect car in hand and confident that they’ve chosen the best one for their needs, they arrive at the dealership and walk onto the showroom floor, ready to finally meet their salesperson.
Tags : 
     Adobe
By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
     Oracle CX
By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
     Oracle CX
By: Gigamon     Published Date: Oct 19, 2017
Download the Gigamon white paper, Addressing the Threat Within: Rethinking Network Security Deployment, to learn how evolving cyber security threat conditions are changing the trust model for security and how a structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. See how the benefits of increased security and cost effectiveness are making the Security Delivery Platform a foundational building block to deploying security solutions. Read now!
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 19, 2017
The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today's mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in today’s mobile network, which facilitates efforts toward cloudification. This architecture provides maximum, centralized control to the mobile operator’s network planning and operations teams. Read to learn more.
Tags : 
     Gigamon
By: Dell and Nutanix     Published Date: Oct 26, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented.
Tags : 
     Dell and Nutanix
By: Dell EMC     Published Date: Aug 17, 2018
Dell EMC technology for Digital Manufacturing harnesses the workstation, HPC and storage capabilities that combine to enable better products, more efficient design and production processes, and meet rapidly changing customer preferences. Collecting, collating and digesting more and more data in the entire ecosystem, from product modelling to after-sales trends, are making the digital factory a powerful and necessary reality in the manufacturing landscape.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 26, 2018
Die Dell EMC Technologie für die digitale Fertigung nutzt Workstation-, HPC- und Speicherfunktionen, die zu besseren Produkten sowie effizienteren Design- und Produktionsprozessen führen und sich an rasch ändernde Kundenpräferenzen anpassen. Das Erheben, Zusammenstellen und Verarbeiten von immer mehr Daten im gesamten Ökosystem, von der Produktmodellierung bis hin zu After- Sales-Trends, machen die digitale Fabrik zu einer wichtigen und erforderlichen Realität in der Fertigungslandschaft. Erfahren Sie mehr über Dell-Lösungen von Intel® Xeon® processors
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 26, 2018
La tecnologia Dell EMC per la produzione digitale sfrutta le funzionalità combinate di workstation, HPC e storage per offrire prodotti migliori e processi di progettazione e produzione più efficienti, nonché per soddisfare le preferenze in rapida evoluzione dei clienti. La raccolta, il confronto e la sintesi di una quantità di dati sempre maggiore nell'intero ecosistema, dalla modellazione dei prodotti alle tendenze post-vendita, stanno facendo della produzione digitale una realtà potente e necessaria nello scenario della produzione. Scopri di più sulle soluzioni Dell in collaborazione con Intel® Xeon® processors
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 26, 2018
Dell EMC technology for Digital Manufacturing harnesses the workstation, HPC and storage capabilities that combine to enable better products, more efficient design and production processes, and meet rapidly changing customer preferences. Collecting, collating and digesting more and more data in the entire ecosystem, from product modelling to after-sales trends, are making the digital factory a powerful and necessary reality in the manufacturing landscape. Learn more about Dell Precision® workstations featuring Intel® Xeon® processors
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 26, 2018
Dell EMC technology for Digital Manufacturing harnesses the workstation, HPC and storage capabilities that combine to enable better products, more efficient design and production processes, and meet rapidly changing customer preferences. Collecting, collating and digesting more and more data in the entire ecosystem, from product modelling to after-sales trends, are making the digital factory a powerful and necessary reality in the manufacturing landscape. Learn more about Dell Precision® workstations featuring Intel® Xeon® processors
Tags : 
     Dell EMC
By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
     Dell EMC & Intel
By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
     Dome9
By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
     Dome9
By: KPMG     Published Date: Nov 13, 2018
Zero-basing is re-emerging as a bold approach to optimising cost and spend allocation. This paper explains how to create the conditions for success. Read on to discover: how to lay the foundations for a successful zero-basing programme how to define your impact of zero-basing on the future operating model why emotional intelligence is critical to successful implementation.
Tags : 
     KPMG
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com