ods

Results 1 - 25 of 644Sort Results By: Published Date | Title | Company Name
By: InsideHPC Special Report     Published Date: Aug 17, 2016
A single issue has always defined the history of HPC systems: performance. While offloading and co-design may seem like new approaches to computing, they actually have been used, to a lesser degree, in the past as a way to enhance performance. Current co-design methods are now going deeper into cluster components than was previously possible. These new capabilities extend from the local cluster nodes into the “computing network.”
Tags : 
     InsideHPC Special Report
By: IBM     Published Date: Jun 05, 2014
This demonstration shows how an organization using IBM Platform Computing workload managers can easily and securely tap resources in the IBM SoftLayer public cloud to handle periods of peak demand and reduce total IT infrastructure costs.
Tags : ibm
     IBM
By: IBM     Published Date: Feb 13, 2015
This demonstration shows how an organization using IBM Platform Computing workload managers can easily and securely tap resources in the IBM SoftLayer public cloud to handle periods of peak demand and reduce total IT infrastructure costs.
Tags : 
     IBM
By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
     VMware
By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
     BehavioSec
By: PwC     Published Date: Aug 19, 2019
There are 56.7 million contingent workers, including temporary or part-time workers, freelancers, consultants, and independent contractors in the US, making up approximately 40% of the US workforce today. In fact, 76% of HR leaders plan to hire contingent workers to deliver on growth objectives, In PwC's Future of Work study, nearly 50% of survey participants said that employees will work for more than one employer at a time, making it critical to actively manage their commitment and productivity during employment periods. Learn how to streamline the entire experience of on-boarding and retaining contingent workers to drive the greatest results for everyone involved
Tags : 
     PwC
By: Workday APAC     Published Date: Oct 07, 2019
"Following a study of hundreds of organisations about how they scale agile, this Harvard Business Review article outlines what they’ve learned, and how to scale agile effectively. They studied small firms that run their entire business with agile methods, already agile larger companies that are becoming even more agile as they’ve grown, and organisations that are making the transition from traditional hierarchies to more agile enterprises. Download the article to discover how these organisations have scaled agile effectively. "
Tags : 
     Workday APAC
By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Brands are seeing tremendous disruption in the areas of retail, consumer goods, and travel/ hospitality. To stay on pace with the changing needs and demands of these industries, you need to compete and thrive in new ways. Cognitive Enterprise is data-enabled, cloud-powered, transformational business. It doesn't see silos. It uses data to inform the next best step to improve processes spanning all areas of the business, including customer experience.
Tags : 
     Group M_IBM Q4'19
By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Brands are seeing tremendous disruption in the areas of retail, consumer goods, and travel/ hospitality. To stay on pace with the changing needs and demands of these industries, you need to compete and thrive in new ways. Cognitive Enterprise is data-enabled, cloud-powered, transformational business that breaks through organizational silos.
Tags : 
     Group M_IBM Q4'19
By: Avetta     Published Date: Sep 17, 2019
With companies and executives being held accountable for incidents in the workplace, the issue of workers’ health and safety has become a persistent concern for organizations around the world. And with varying standards across borders, confusion about what companies need to do is rampant. This need for an international consensus standard on workplace health and safety prompted the proposal of ISO 45001 in 2013. The standard, passed in March 2018, now serves as the international guide on occupational health and safety (OH&S) and outlines relevant methods and benchmarks. With insight from expert leadership, this whitepaper gives you the complete guide on how to work with the new standard. You'll learn: • Why ISO 45001 matters and its impact upon your business • The benefits and pathway to becoming certified • Important considerations for the contractor selection process
Tags : 
     Avetta
By: SAS     Published Date: Sep 05, 2019
Organizations are charging ahead with investments in cloud and analytics to deliver agility, scalability and cost savings. With computing power advancements and continuous growth of data, cloud provides the elastic workloads and flexibility required for modern business. However, the environment of flexibility and choice that cloud provides also creates complexity and challenges. In this white paper, learn how organizations are applying expertise and using the latest methods to move analytics to the cloud, including: • Why are organizations moving analytic work to the cloud? • What are the key challenges and misconceptions? • How do IT leaders provide choice while maintaining control?
Tags : 
     SAS
By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: • Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; • Parsimonious, by using as few factors as possible; • Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; • Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
     Two Sigma
By: KPMG     Published Date: Jun 06, 2019
A global mobility revolution has already begun and is accelerating rapidly, opening up major opportunities and challenges for players across the mobility ecosystem. Read this report to discover: • the likely winners and losers in the mobility revolution • how the way people and goods are moved will change dramatically • how the mobility revolution will impact eight traditional sectors • what alliances organisations must build to win in this brave new world.
Tags : 
     KPMG
By: BetterUp     Published Date: Mar 06, 2019
As HR investments become more data-driven, coaching must deliver on its ROI evidence gap. At BetterUp, we’ve created a model that can effectively measure the impact of coaching on the bottom line. Learn how coaching ROI has been measured in the past, and why these methods are flawed. Discover which inputs are factored into our ROI algorithm and you can map the ROI of coaching to tangible business results.
Tags : 
     BetterUp
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
     Ounce Labs, an IBM Company
By: Attivio     Published Date: Aug 20, 2010
Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.
Tags : attivio, data warehouse, unified information, data, content, unstructured content, integration, clob
     Attivio
By: Adobe     Published Date: Sep 23, 2019
Email provides the wedge into customer-obsessed marketing Every day, demanding customers, unforeseen competition, and disruptive new technologies hammer home that we have entered the age of the customer, where established business operations don't work. Yet most marketing functions still rely on decades-old methods that undermine their ability to create post-digital brand experiences and help their firms become customer focused. Email marketing – the workhorse of the marketers’ toolkit – can provide a way to launch customer obsessed marketing at your firm, if you use it as more than just a promotional vehicle. marketers need a more advanced email marketing program. 95% believe they would benefit from it. 64% agree that they use their email marketing program as a strategic asset for innovation But it’s difficult to achieve. 91% experience challenges, including lack of budget, vision, and cross-collaboration WHY TARGET AUDIENCE SHOULD CARE? Smart CMOs re
Tags : 
     Adobe
By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
The “Future of Identity” infographic provides highlights and surprising statistics from the "Future of Identity" study that revealed global and generational preferences and concerns on emergent sign-on methods. 3,997 respondents from the United States, European Union, and Asia Pacific regions weighed in.
Tags : 
     Group M_IBM Q4'19
By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell APAC
By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
     Cisco
By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : akamai, akamai gaming, infrastructure, distribution channel, technological advancements
     Akamai Technologies
By: Dell     Published Date: Nov 02, 2018
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com