leverage data

Results 126 - 150 of 191Sort Results By: Published Date | Title | Company Name
Published By: HPE     Published Date: Feb 11, 2015
HP Backup & Recovery Modernization Service leverages proven methodologies and best practices to develop comprehensive data protection solutions for HP StoreOnce Backup.
Tags : 
    
HPE
Published By: HP     Published Date: Feb 02, 2015
Customers across all industries are transitioning to the 3rd Platform, where IT organizations are seeking to leverage mobile, social, cloud, and big data solutions to drive business value. At the same time, the pace at which the business operates is continually accelerating.
Tags : 
    
HP
Published By: Visier     Published Date: Jan 30, 2015
Until recently, ConAgra Foods struggled to collect accurate, analyzable data about its workforce. Information was spread across the organization in siloed systems within various departments and was often difficult to reconcile. In a few short years, however, ConAgra Foods has been able to leverage technology solutions to gain real-time insights into its employee data and can now analyze its workforce across a wide range of subject areas. Download this case study to see how ConAgra Foods transformed the role of HR through analytics, and to get guidance on how your organization can adopt a similar approach.
Tags : 
visier, conagra, workforce, hr analytics, real-time insights
    
Visier
Published By: HP     Published Date: Jan 20, 2015
Big Data is an opportunity for CSPs to create the intelligence for operating networks more efficiently, to analyze the success of the services that telcos are offering, and to create a better personal experience for their customers. Learn how to leverage the Big Data opportunity.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: iCims     Published Date: Dec 29, 2014
In this recorded webinar, you will learn how implementing the iCIMS Recruiting Software will help increase your recruitment and reporting efficiencies while increasing candidate engagement with branded career portals.
Tags : 
icims, recruiting, social recruiting, recruitment advertising, new hires, onboarding, recruitment reporting, talent platform, icims connect, hire expectation, leverage data, review candidates
    
iCims
Published By: VMware, Inc     Published Date: Oct 30, 2014
VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud solution built on vSphere®, which empowers government customers to leverage existing investments in applications and infrastructure. As a result, government agencies can avoid the cost and complexity of re-architecting and retraining sta for public cloud infrastructure that is radically dierent from what is in place today. Instead of operating a combination of onsite and osite IT environments and struggling to maintain both new and legacy applications and infrastructure, vCloud Government Service provides the right mix of internal controls with the ability to securely scale to meet demand for IT resources. As you contemplate migrating basic workloads and/or mission-critical and sensitive data to the cloud, be sure to address these top 5 considerations.
Tags : 
hybrid cloud solution, enterprise-class hybrid, applications and infrastructure, it environments, sensitive data, it management, data center
    
VMware, Inc
Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, it management, knowledge management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: HPE     Published Date: Oct 07, 2014
So far, most data centers have virtualized their least-critical workloads as a matter of basic cost containment. Virtualizing mission-critical applications is still forthcoming for the majority,though, largely due to infrastructural concerns. Complicating matters is the shift in IT purchasing decisions from IT to business management. Integrated Computing Platforms (ICPs), private cloud computing, and public cloud services all leverage virtualization to achieve a number of IT and business goals, including increased ROI, reduced OpEx, and business process improvement. Now more than ever, it makes sense to explore the benefits of ICPs. Find expert data center considerations here.
Tags : 
virtualization, data center, cloud, infrastructure, integrated, optimization, solution, it management, data management
    
HPE
Published By: IBM     Published Date: Aug 05, 2014
Watson Explorer provides organizations with a combined, trusted 360-degree view of both structured and unstructured data. The solution indexes information from unstructured data sources (PDFs, Microsoft SharePoint, flat files, social media, blogs and so on) as well as structured sources for search and discovery. Organizations can leverage their data in place, respecting existing security models when creating this virtual access point to all information. Watson Explorer requires trusted master data to ensure that links are accurate and reliable, so the end user can confidently leverage a holistic view of a customer or product.
Tags : 
ibm, data, customer, watson explorer, master data, structured, it management, data management
    
IBM
Published By: VSS Monitoring     Published Date: Aug 01, 2014
Learn how to leverage a big data model in the network monitoring domain and see how IT is shifting away from the long-term viability of the existing network monitoring model.
Tags : 
networking, big data, network monitoring, optimization, data center
    
VSS Monitoring
Published By: HP     Published Date: Jul 30, 2014
EMC to 3PAR Online Import Utility leverages storage federation and Peer Motion to migrate data from EMC Clariion CX4 and VNX systems to HP 3PAR StoreServ. In this ChalkTalk, HPStorageGuy Calvin Zito gives an overview.
Tags : 
emc, 3par, storage, technology, data, online import utility, data management, business technology
    
HP
Published By: Phunware     Published Date: Jul 30, 2014
Retailers and Marketers have not yet begun to take total advantage of the newest technologies to leverage bid data and mobile. Download this whitepaper for the key best practices that will allow mobile marketers to utilize these technologies and capture a larger market share.
Tags : 
phunware, apps for sports, apps for event marketing, apps for live events
    
Phunware
Published By: Phunware     Published Date: Jul 30, 2014
Retailers and Marketers have not yet begun to take total advantage of the newest technologies to leverage bid data and mobile. Download this whitepaper for the key best practices that will allow mobile marketers to utilize these technologies and capture a larger market share.
Tags : 
phunware, best practices ibeacon, big data ibeacon, push notifications
    
Phunware
Published By: NetApp     Published Date: Jun 19, 2014
This ebook explores the many uses and benefits of flash storage technology in the enterprise. Check it out to discover and learn all you need to: * Optimize storage performance * Leverage server flash as storage cache * Reduce the footprint of your storage infrastructure in the data center
Tags : 
netapp, flash storage, storage technology, storage performance, storage cache, storage infrastructure, it management, data center
    
NetApp
Published By: NetApp     Published Date: Jun 16, 2014
This ebook explores the many uses and benefits of flash storage technology in the enterprise. Check it out to discover and learn all you need to: * Optimize storage performance * Leverage server flash as storage cache * Reduce the footprint of your storage infrastructure in the data center
Tags : 
netapp, flash storage, storage technology, storage performance, storage cache, storage infrastructure, it management, data center
    
NetApp
Published By: HP     Published Date: Jun 05, 2014
HP commissioned Forrester Consulting in October 2013 to leverage existing Forrsights data and to survey IT hardware decision-makers in North America and Europe about their storage requirements for this Technology Adoption Profile.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication, storeonce, it management, data management
    
HP
Published By: IBM     Published Date: May 28, 2014
Read the whitepaper to find out how one client improved business value of their data by implementing InfoSphere Optim processes and technologies.
Tags : 
ibm, data lifecycle management, infosphere optim, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence, virtualize data, lifecycle management
    
IBM
Published By: IBM     Published Date: May 28, 2014
Different types of data have different data retention requirements. In establishing information governance and database archiving policies, take a holistic approach by understanding where the data exists, classifying the data, and archiving the data. IBM InfoSphere Optim™ Archive solution can help enterprises manage and support data retention policies by archiving historical data and storing that data in its original business context, all while controlling growing data volumes and improving application performance. This approach helps support long-term data retention by archiving data in a way that allows it to be accessed independently of the original application.
Tags : 
ibm, data retention, information governance, archiving, historical data, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence
    
IBM
Published By: HP     Published Date: May 14, 2014
HP commissioned Forrester Consulting in October 2013 to leverage existing Forrsights data and to survey IT hardware decision-makers in North America and Europe about their storage requirements for this Technology Adoption Profile.
Tags : 
forrester, it hardware, storage requirements, it decision makers, it management
    
HP
Published By: IBM     Published Date: May 02, 2014
The end-to-end information integration capabilities of IBM® InfoSphere® Information Server are designed to help organizations understand, cleanse, monitor, transform and deliver data—as well as collaborate to bridge the gap between business and IT.
Tags : 
ibm, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence, virtualize data, it management, data management, data center
    
IBM
Published By: IBM     Published Date: May 02, 2014
This eBookoutlines the best practices for data lifecycle management and how InfoSphere Optimsolutions enable organizations to support and implement them.
Tags : 
ibm, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence, virtualize data, lifecycle management, big data strategy, it management
    
IBM
Published By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need. Bersin’s Research, Why Reputations and Networks Matter in the Open Talent Economy, indicates that this approach works in driving value—organizations that have effectively used internal reputation networks and profile databases have been able to increase key metrics such as employees’ time to productivity and innovation levels.
Tags : 
talent management, employee enagement, human resources
    
Achievers
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.