transaction data

Results 126 - 150 of 156Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Sep 08, 2014
In today’s app-centric world, poor performance is bad business. It’s your job to protect the end-user experience—but that’s a tall order without a UNIFIED VIEW of performance that puts your network and application health in crystal-clear focus.
Tags : 
apm, transactions, big data, analytics, performance monitoring
    
Riverbed
Published By: Coupa Software Inc.     Published Date: Jul 10, 2017
Many companies think of their accounts payable (AP) department as a transactional function—it’s essential to your operation, but too often it’s weighed down with people-heavy paper processes. If your AP department is focused on data entry and resolving escalations, you’re missing a valuable business opportunity.
Tags : 
coupa, accounts payable, capital management, finance, eprocurement, suppliers, business technology
    
Coupa Software Inc.
Published By: Thawte     Published Date: Oct 05, 2015
As online attacks become more frequent and easier to execute, organisations around the world are under increasing scrutiny to ensure all online transactions involving confidential data are secure. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL that helps protect the entire user experience from start to finish, making it safer to search, share and shop online. Discover more about this best practice protection by downloading our new reference guide now.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: IBM     Published Date: Dec 06, 2013
Partners and customers expect instantaneous response and continuous uptime from data systems, but the volume and velocity of data make it difficult to respond with agility. IBM PureData System for Transactions enable businesses to gear up and meet these challenges.
Tags : 
ibm, ibm puredata system, data, data mangement, database, integration, transactions, workload, availability, data system, data management, business technology, data center
    
IBM
Published By: IBM     Published Date: Dec 06, 2013
Data workloads are rapidly evolving and changing. Today's enterprises have many different types of applications, with different usage patterns, all constantly accessing data. As a result, data services need to be more robust and scalable. IBM PureApplication System and IBM PureData™ System for Transactions are designed to meet these needs. This paper shows how the latest technology and expertise built into these systems gives businesses an innovative approach to rapidly create and manage highly scalable data services, without the complexity of traditional approaches.
Tags : 
ibm, ibm puredata system, ibm pureapplication system, data, data center, data management, applications, workloads, data services, scalable, scalability, availability, knowledge management
    
IBM
Published By: IBM     Published Date: Dec 06, 2013
Most enterprise datacenters are so cluttered with individually constructed servers, including database servers, that staff time is largely taken up with just the maintenance of these systems. As a result, IT service to business users suffers, and the agility of the enterprise suffers. Integrated systems represent an antidote to this problem. By dramatically reducing the amount of setup and maintenance time for the applications and databases they support, integrated systems enable the technical staff to spend more of their time supporting users and enabling the enterprise to thrive.
Tags : 
ibm, ibm puredata system, transaction, datacenter, data management, integrated system, configuration, consolidation, business technology, data center
    
IBM
Published By: IBM     Published Date: Dec 18, 2013
Learn about 3 optimizations of IBM PureData System for Transactions that can help your organization meet today's big data challenges.
Tags : 
ibm, ibm puredata for transactions, data, big data, data center, data management, optimization, integration, software, automation, it management
    
IBM
Published By: Intel Corporation     Published Date: Aug 25, 2014
Sponsored by: NEC and Intel® Xeon® processor Servers with the Intel® Xeon® processor E7 v2 family in a four-CPU configuration can deliver up to twice the processing performance, three times the memory capacity, and four times the I/O bandwidth of previous models. Together with their excellent transaction processing performance, these servers provide a high level of availability essential to enterprise systems via advanced RAS functions that guarantee the integrity of important data while also reducing costs and the frequency of server downtime. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
enterprise systems, platform, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, performance testing, server virtualization, it management
    
Intel Corporation
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers
    
Symantec
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Published By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : 
data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics, database transactions, streaming environments, real-time data replication, data configuration
    
Attunity
Published By: IBM     Published Date: Aug 21, 2008
The world has embraced payment cards to support commercial transactions for almost every kind of business. Unfortunately, the data associated with these payment cards is the focus of many identity theft activities. This white paper outlines Payment Card Industry (PCI) requirements, as well as the benefits of compliance and the penalties for noncompliance.
Tags : 
ibm, ibm mi, ibm grm, pci, pci dss, pci-dss, pci compliance, data theft, cardholder data, identity theft
    
IBM
Published By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : 
mobile applications, ecosystem, risk, defense, application, risk
    
HP - Enterprise
Published By: Network Automation     Published Date: Dec 10, 2008
The challenge of creating a robust errors database, the core of iCheck, is that information must be pulled from a multitude of disparate sources. Sometimes, the data source is a database with its unique schema and field names that must be mapped to the iCheck database. Other times, the data source is a text file which must be accessed via FTP, parsed, and loaded into iCheck. And other times, the data is in RETS (Real Estate Transaction Standard) format, a real estate data format similar to XML, which is accessed via HTTP.
Tags : 
network automation, data sources, data accuracy, database errors, networking, data management
    
Network Automation
Published By: Subrago     Published Date: Apr 30, 2009
The key objective of this white paper is to highlight the key issues and discuss processes and controls required to build a high performing IT support organization.
Tags : 
it support, subrago, it costs, customer transaction, high performing it support, it dependency, tolerance level, production services, change management, itil, itil v3, efficiency, it infrastructure, cab, change advisory board, segregation of duties, zero down, metrics, hardware performance, database performance
    
Subrago
Published By: SAS     Published Date: Mar 06, 2018
The Connected Customer is an individual who is intimately connected to the data, outcomes, decisions, and staff associated with any relationship to an organization. This intensely personal connection is not just a matter of the most recent transaction, but represents a combination of connected data, connected analytics, and collaborative decisions associated with improving the customer’s relationship with the organization over time. In this report, Blue Hill explores the key traits associated with supporting the Connected Customer through the Internet of Things, and provides guidance on why the Internet of Things will be essential across the general business landscape
Tags : 
    
SAS
Published By: Wipro     Published Date: May 03, 2011
What sets the truly innovative and efficient companies apart is the way they put the underlying transaction data to use. Efficient and imaginative use of the data gives remarkable insights into the way the company conducts bu
Tags : 
business intelligence, insurance, business transformation
    
Wipro
Published By: Trillium Software     Published Date: Jun 06, 2011
The fourth Web seminar in the series is titled "Tips, Tools & Best Practices" which shows how you can learn to deliver high performance data quality in real-time.
Tags : 
trillium software, operational data quality, odq, performance management, real-time transactions, high performance data quality, business processes optimization, information integrity, reusable data quality, application optimization
    
Trillium Software
Published By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
business, sap, white paper, technology, location, intelligence, business value, data services, business technology
    
SAP
Published By: Oracle     Published Date: Jul 05, 2017
Your company’s website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Today’s slightly sluggish network could become tomorrow’s downtime disaster. No matter what challenge may arise, you don’t get extra time, staff, or budget to deal with it. Plus, since the whole company relies on IT, everyone notices when you’re underwater.
Tags : 
revenue loss, tarnish brand, consumer confidence, dns services, high performing networks, workflow, dns
    
Oracle
Published By: Oracle     Published Date: Mar 22, 2018
s your information technology (IT) organization pressured to get more work done with fewer people or on a constricted budget? Do you need to make IT a competitive asset rather than a cost center? Does your business struggle with slow software applications or data that's too often unavailable? If you answered "yes" to any of these questions, it's time to take a close look at Oracle Exadata, the world's fastest database machine exclusively designed to run Oracle Database. It is the first database machine optimized for data warehousing, online transaction processing (OLTP), and database consolidation workloads as well as in-memory databases and database as a service (DBaaS).
Tags : 
    
Oracle
Published By: IBM     Published Date: Aug 06, 2014
Customer Profitability Analytics enables banks to analyze customer, account, product, and transaction data and apply costing models to determine a bank-wide view of profitability. Applying predictive analytics, they can model future behavior and derive a lifetime value for each customer.
Tags : 
ibm, banking, customer, profit, analytics, costing models
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
You’ll learn: - About the mandates that will significantly increase transaction complexity and transaction volumes for payers and providers - How to reduce costs and improve processing efficiencies while also decreasing the risk associated with data movement - Ways to improve customer service and ensure compliance with evolving regulations while reducing IT operating expenses
Tags : 
ibm, healthcare, affordable care act, b2b, hipaa, edi regulations, knowledge management, business technology
    
IBM
Published By: IBM     Published Date: Mar 30, 2017
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as extract, transfer and load (ETL), data replication or data virtualization.
Tags : 
data integration, data security, data optimization, data virtualization, database security
    
IBM
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.