data solutions

Results 926 - 950 of 995Sort Results By: Published Date | Title | Company Name
By: HP     Published Date: Aug 03, 2009
Medical research is surging into the 21st Century, and includes the dawn of personalized medicine. The realization of personalized medicine is being driven by the increasing speed and dropping costs of gene sequencing. These new technologies for rapid sequencing have created a dramatic need for storage technologies that will radically increase the speed, while reducing costs for research storage. Read this white paper to learn how the exponential growth in genome-mapping data has spawned the growth in affordable, petabyte-capacity storage solutions that can scale as quickly as the data is produced.
Tags : hp storageworks, data storage, petabyte-scale storage, network-attached storage (nas), storage, data management
     HP
By: HP     Published Date: Aug 03, 2009
In the world of biomedical research, particularly in the fields of genomics and personalized medicine, the exponential volumes of data created are rapidly overtaking conventional data storage technologies. In answer to this challenge, the next generation of petabyte-scale data storage technologies is here. Watch this archived Webinar to learn about affordable and easily scalable data storage solutions that are ready to partner with and facilitate the future of biomedical research breakthroughs.
Tags : storage, petabyte-scale, data challenge
     HP
By: HP     Published Date: Jul 08, 2009
Data deduplication technology represents one of the most significant storage enhancements in recent years, promising to reshape future data protection and disaster recovery solutions. Data deduplication offers the ability to store more on a given amount of storage and replicate data using lower bandwidth links at a significantly reduced cost. This white paper explains how deduplication technologies work in practice, the pros and cons of each approach, and when to choose a particular type.
Tags : data, data deduplication, data dedupe, disaster recovery, data protection, storage, bandwidth, virtual library system, vls, d2d, disk to disk, san, vtl, virtual tape libraries, pacs, retention, data rate, recovery point objectives, rpos, service level agreements
     HP
By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness, fda, solutions, solution, electronic systems, hipaa, policy, requirements
     Tripwire
By: SAP     Published Date: Jun 22, 2009
Traditional BI solutions face many obstacles and limitations.  However, the need for timely and succinct business intelligence (BI) continues to grow.  
Tags : sap, dashboard, dashboards, business intelligence, business solutions, integration, ziff davis, live data, it solutions, data management, interactivity, c-level, accurate information, information, enterprise applications, platforms
     SAP
By: IBM     Published Date: Jun 15, 2009
The average SMB has most of the same data protection needs as its larger competitors. But most SMBs can't afford a trained staff assigned specifically to storage management and protection. As a result, when they buy storage management software they look for solutions that are both less expensive and easier to use than traditional products.
Tags : ibm, tivoli, storage management, smbs, small business, data protection, mom-and-pop, ema, tivoli continuous data protection, cdp, storage, data management
     IBM
By: IBM     Published Date: Jun 15, 2009
The ability to make quick, well-informed decisions is critical to competitiveness and growth for most companies. Read the white paper to see how Data warehouse solutions can deliver business insight across virtually any business process or function. And also how they're particularly valuable for understanding sales, profiling customers and analyzing business costs.
Tags : ibm, data warehouses, warehouse, data, data solutions, sales, business costs, olap, online, analytical processing, customer relationship management, crm, ibm db2 warehouse, regulatory, compliance, enterprise applications, data management
     IBM
By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
     Vision Solutions
By: SRC,LLC     Published Date: Jun 01, 2009
Today, organizations are collecting data at every level of their business and in volumes that in the past were unimaginable. Data sets are stored in different database systems or in files with distinctive formats, all reflecting business process, application, program software, or information type dependencies. Adding to this complexity is the distribution of these data sets across the enterprise in silos requiring a varied set of tools and/or specialized business rules for data transformation, classification, matching, and integration. Because of the massive amounts of data stored in a variety of representation formats, decision makers strain to derive insights and create business solutions that adequately span and integrate information from these disparate technology islands. Learn more today!
Tags : src, data transformation, classification, business value, geographic business intelligence, geo-bi, etl, extract, transform, load, spatial analysis, operational data stores, ods, spatial data, etl, cdi, point of sale, retail floor space management, rfsm, alteryx
     SRC,LLC
By: Eaton Corp.     Published Date: Jun 01, 2009
If IT and Facilities could work collaboratively, organizations can operate more efficiently and effectively while still meeting their business objectives.  That's why Eaton® is partnering with organizations that develop IT management systems to create an integrated approach to energy management.  This white paper describes how a joint monitoring and management solution links IT assets, the data center infrastructure and Facilities assets into a holistic perspective aligned with business processes.
Tags : white paper, facilities, collaborate, single pane, joint monitoring, management solution, it assets, data center. solutions
     Eaton Corp.
By: SAGE     Published Date: May 11, 2009
It's a scary climate for small and mid-size businesses. Besides economic, many growing businesses also experience problems and frustrations when it comes to data management and business software integration. Sage has introduced an eBook, On the Hotseat: How Your Peers Are Tackling the Questions That Matter Now, that provides insight on how other businesses are handling these problems.
Tags : sage, smb, small medium size business, software solutions, fortune magazine, roi, crm, customer relationship management, data management, erp software, enterprise applications, competitive advantage, unified solutions, software integration, dedicated it staff
     SAGE
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
     Trend Micro, Inc.
By: IBM     Published Date: Apr 17, 2009
Integrate facilities and IT. Realize the value of the green data center.As data center costs continue to rise, green is the word of the day. What it means is cost savings through consolidation and lower energy usage, as this white paper shows. See the role energy consumption plays in today’s data centers, and how IBM Tivoli® solutions can help optimize energy use.
Tags : ibm, green data center, ibm mbi, data center costs, cost savings, consolidation, energy use, ibm tivoli, power, cooling, service level objectives slos, service level agreements, slas, ip enablement everywhere, thermal metrics, maximo, spatial asset management, ibm totalstorage, energy consumption
     IBM
By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical, medical grade servers, electronic medical records, emr, patient health records, phrs, computerized health record system, community health record (chr), diagnostic records, lab results, prescribed medication, downtime risk, stratus ftserver
     Stratus Technologies
By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
     Mimecast
By: WebEx     Published Date: Apr 02, 2009
This white paper presents a simple two-step process to kicking the NetMeeting habit: 1. Admitting there is a problem by recognizing the symptoms. 2. Creating a recovery plan by finding new applications and implementing a new solution.
Tags : webex, web conferencing, netmeeting, firewalls, apis, asp, live meeting, itu-t t.120 data conferencing, mcu, network address translation devices, nats, public switched telephony network, pstn, crm, roi, it support costs, web communications, full-time employee, fte, enterprise print management solutions
     WebEx
By: HP Data Center     Published Date: Mar 25, 2009
Experience customers' first impressions of the new HP POD - Performance Optimized Datacenter - the massive scale-out and the cloud-enabling data center-to-go.
Tags : hp data center, hp pod, network solutions, hp data center, it spending, it management, performance optimization, scalability, cloud-enabled, data center, green databasing, networking
     HP Data Center
By: InMage     Published Date: Feb 24, 2009
The AODA currently provides IT support and management for 32 remote offices serving approximately 1,000 end users. In a field dependent upon the highest standards of data integrity, protection and retention, it was critical for the AODA to implement the disaster recovery (DR) and business continuity solutions necessary for fulfillment of its objectives.
Tags : inmage, data recovery, disaster recovery, business continuity, new mexico state aoda, dr scout, continuous data protection, cdp, disaster recover software, data management
     InMage
By: InMage     Published Date: Feb 18, 2009
Disaster recovery involves continuous data availability and much more. Companies that understand the key steps to ensuring smooth recovery from a disaster can choose solutions that meet today’s need and tomorrow’s. This white paper explains the five steps that are necessary to develop and implement a disaster recovery plan, and recommends tools, techniques and best practices to make your efforts a success.
Tags : inmage, drp, disaster recovery plan, data management, rpo, recovery point objective, rto, recovery time objective, strategic disaster recover, local backup
     InMage
By: TDI Transistor Devices     Published Date: Feb 06, 2009
Uninterruptible Power Solutions are often solved at the facility level with unnecessarily large, inefficient, expensive and complex AC UPS systems. While this provides an easy demarcation line between the facility and end equipment, with each focusing on a different part of the problem, it also results in overall operating efficiency and total cost of ownership being difficult to ascertain and optimize.
Tags : tdi, transistor devices, data processing, uninterruptible power solutions, ups, operating efficiency
     TDI Transistor Devices
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com