line data

Results 201 - 225 of 761Sort Results By: Published Date | Title | Company Name
Published By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
Published By: Workday Netherlands     Published Date: Jul 05, 2019
"How can your growing organisation scale effectively and remain competitive? A strong HR core can help. This playbook from HR guru Jason Averbook and Workday offers step-by-step instructions for building an HR foundation that helps teams achieve success across your organisation. Read now to learn how the right technology enables you to: ? Streamline HR processes ? Better engage your workforce ? Deliver timely data-driven insights to stakeholders "
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: IBM     Published Date: Apr 18, 2017
Learn from this TDWI paper how right-sized information governance can improve the success of data warehousing or big data analytics initiatives, and how a chief data officer can help organizations to appreciate the value of data and its importance to their decisions and operations.
Tags : 
system integration, data governance, data optimization, data efficiency, data currency, data lineage, data security, data integration
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
The headlines are ablaze with the latest stories of cyberattacks and data breaches. New malware and viruses are revealed nearly every day. The modern cyberthreat evolves on a daily basis, always seeming to stay one step ahead of our most capable defenses. Every time there is a cyberattack, government agencies gather massive amounts of data. To keep pace with the continuously evolving landscape of cyberthreats, agencies are increasingly turning toward applying advanced data analytics to look at attack data and try to gain a deeper understanding of the nature of the attacks. Applying modern data analytics can help derive some defensive value from the data gathered in the aftermath of an attack, and ideally avert or mitigate the damage from any future attacks.
Tags : 
cyber attacks, data breach, advanced data analytics, malware
    
IBM
Published By: NetApp     Published Date: Feb 22, 2010
This paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs.
Tags : 
netapp, san environment, data storage infrastructure, utilization, multiprotocol unified storage, data reduction, storage virtualization, backup
    
NetApp
Published By: Adaptive Planning     Published Date: May 20, 2011
Learn how you can significantly extend the capabilities of your existing Salesforce.com, NetSuite, or other CRM application with an affordable, easy-to-use, and quick-to-deploy solution that automates sales forecasting, improves pipeline visibility, and enables what-if scenario planning.
Tags : 
adaptive planning, salesforce.com, netsuite, crm application, sales forecasting, pipeline, revenue predictability, crm data augmentation
    
Adaptive Planning
Published By: Workday     Published Date: Jan 17, 2019
At Workday, we take a unique approach to development. We build one technology platform, on a single codeline, giving you a single security model and one source of truth. See how our singular methodology delivers real-time transactional data everyone can trust.
Tags : 
methodology, security model, technology
    
Workday
Published By: NetApp     Published Date: Sep 24, 2013
"Today, IT’s customers are more mobile and global than ever before and as such expect their applications and data to be available 24x7. Interruptions, whether planned or unplanned, can have a major impact to the bottom line of the business. ESG Lab tested the ability of clustered Data ONTAP to provide continuous application availability and evaluated performance for both SAN and NAS configurations while running an Oracle OLTP workload. Check out this report to see the results."
Tags : 
mobile, global, applications, cloud, configuration, technology, knowledge management, storage
    
NetApp
Published By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : 
mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
    
McAfee
Published By: HGST     Published Date: Feb 05, 2015
Database users are increasingly interested in using Flash-based solid-state drives (SSDs) to speed up application performance. For many database administrators (DBAs), increased database performance directly impacts their user experience and bottom lines. Accelerating a single MySQL instance may allow DBAs to avoid painful sharding exercises, with all their attendant administration, application changes, and high capital and ongoing costs. With the wide range of SSDs available today, choosing any one can be difficult. This paper aims to answer the question, “Is it better to use slower SATA SSDs in RAID or a faster PCIe SSD to scale up MySQL database performance?"
Tags : 
solid-state storage, flash-based, database administrators, mysql, application changes, database users
    
HGST
Published By: NetApp     Published Date: May 29, 2018
This white paper discusses AI infrastructure challenges and how NetApp can help you build a data pipeline for your deep learning workflows today, while future-proofing investments in your AI infrastructure. Careful infrastructure planning can smooth the flow of data through your deep learning pipeline, lead to faster time to deployment, and maximize competitive differentiation.
Tags : 
    
NetApp
Published By: Dell EMC     Published Date: Aug 03, 2015
XtremIO reduces datacenter footprint and complexity with unstoppable in-line data reduction capabilities which address storage sprawl for Exchange databases. Thin provisioning doesn’t just eliminate space at the end of the drive, it eliminates all of the whitespace found within the database!
Tags : 
data reduction, deployment approaches, emc, exchange server, database availability, compression, cloud infrastructure, datacenter footprint reduction
    
Dell EMC
Published By: Waterline Data & Research Partners     Published Date: May 18, 2015
Waterline Data automates the cataloging of data assets and provides an Amazon.com-like guided shopping approach to data discovery that is intended to take the guesswork out of targeting the right data.
Tags : 
waterline, big data, automation, cataloging, processing, analysis, assets, data science
    
Waterline Data & Research Partners
Published By: Waterline Data & Research Partners     Published Date: May 18, 2015
In this report, Forrester Research recommends that application development and delivery (AD&D) professionals working on BI and big data initiatives get the best out of both by designing and integrating them in a flexible data platform.
Tags : 
waterline, big data, automation, cataloging, processing, analysis, assets, data science
    
Waterline Data & Research Partners
Published By: Waterline Data & Research Partners     Published Date: Jun 15, 2015
Information governance and master data management initiatives are complex and require participation from a broad range of enterprise constituents. We focus on five small and innovative vendors that may help information managers reach their information governance and MDM goals.
Tags : 
vendors, governance, information, mdm, management
    
Waterline Data & Research Partners
Published By: Waterline Data & Research Partners     Published Date: Jun 15, 2015
This analysis profiles products that can accelerate the shift toward business-user-oriented, visual, interactive data preparation.
Tags : 
gartner, analysis, data visualization, business tools, best practices, interactivity, vendor functionality
    
Waterline Data & Research Partners
Published By: Mimecast     Published Date: May 27, 2015
White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.
Tags : 
mimecast, migration, microsoft office 365, storage, cloud backup, email, it management
    
Mimecast
Published By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else you’re going to lose them.
Tags : 
    
FICO
Published By: Rackspace     Published Date: Apr 15, 2019
Scale events — like online sales and digital product launches — present great revenue opportunities, but they also present large risks to your business. Whether you are a retailer preparing for Black Friday and Cyber Monday, or a digital vendor launching a new service, your brand is both at its most visible and its most vulnerable during these scale events. Many more customers visit your site over a short period of time, raising the potential for resource constraints and discovery of software bugs. Information about issues spreads quickly via social media and news outlets. And, your customers typically spend more per transaction, so every lost order has a greater negative impact on your bottom line. Site reliability engineering (SRE) can help you better prepare for scale events through an iterative cycle of data-driven improvement.
Tags : 
    
Rackspace
Published By: Ping Identity     Published Date: Feb 12, 2016
Gartner projects almost 4 in 10 organizations will rely exclusively on BYOD by 2016, and 85 percent of businesses will allow some level of BYOD by 2020. If enterprises want peace of mind with regard to the security of their data and systems, they must understand employee perceptions and practices. Blurred lines between personal and work use impacts security and puts corporate data at risk.
Tags : 
    
Ping Identity
Published By: Anaplan     Published Date: Apr 06, 2016
A Harvard Business Review Analytics Services White Paper Finance is constantly tested to keep pace in today’s business environment. To keep up, planning needs to become a continuous process that spans departmental boundaries and enables managers to collectively realign resources to respond to market changes. Organizations must streamline disparate sales and operational planning with traditional financial planning and analysis by using technology to connect people, data, and processes across the organization. Download this white paper to discover the three steps to moving towards finance-led integrated business planning recommended by the Harvard Business Review.
Tags : 
analytics, planning, cfo, operations, business practices, revenue, growth, enterprise business
    
Anaplan
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat you are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
accounting, mobility, security, data encryption, data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
streamline sharing, data security, customer service, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password-protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data security, data encryption, file sharing, mobility, customer service
    
Citrix ShareFile
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA’s portfolio is designed to drive efficiency from planning through production. A core component of our continuous delivery portfolio is CA Release Automation, a market-leading application release automation solution that delivers full application deployment automation and release coordination across stages, environments and teams. The solution’s analytic capabilities enable DevOps teams to plan, manage, analyze and optimize the continuous delivery pipeline from a single control point. In addition, the portfolio includes CA Agile Central, CA Agile Requirements Designer, CA Service Virtualization and CA Test Data Manager. We continue to invest in and enhance the portfolio, most recently via the acquisition of BlazeMeter, an innovative, SaaS-based performance and load-testing solution.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.