Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

big

Results 2101 - 2125 of 2160Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 13, 2016
In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. Download this white paper to learn how.
Tags : 
database, big data, analytics, infrastructure, data center
    
IBM
Published By: AWS     Published Date: Sep 04, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics.
Tags : 
    
AWS
Published By: AWS     Published Date: Sep 04, 2018
Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. It’s designed for speed and ease of use — but to realize all of its potential benefits, organizations still have to configure Redshift for the demands of their particular applications. Whether you’ve been using Redshift for a while, have just implemented it, or are still evaluating it as one of many cloud-based data warehouse and business analytics technology options, your organization needs to understand how to configure it to ensure it delivers the right balance of performance, cost, and scalability for your particular usage scenarios. Since starting to work with this technology
Tags : 
    
AWS
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Les serveurs Dell EMC PowerEdge, optimisés par la gamme de processeurs Intel® Xeon® Platinum, offrent des performances plus fiables pour la virtualisation, l’IT convergée, le Cloud hybride et le Big Data. Optimisez l’automatisation, l’évolutivité et la sécurité grâce à la mise à niveau vers la nouvelle génération de serveurs PowerEdge. Des options de financement souples sont disponibles auprès de Dell Financial Services. Processeur Intel® Xeon® Intel Inside® pour une productivité exceptionnelle. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Dell EMC PowerEdge-Server mit Intel® Xeon® Platinum Prozessoren bieten eine schnellere und zuverlässigere Performance für Virtualisierung, konvergente IT, Hybrid Cloud und Big Data. Profitieren Sie von mehr Automatisierung, Skalierbarkeit und Sicherheit, indem Sie ein Upgrade auf die PowerEdge-Server der neuen Generation durchführen. Über Dell Financial Services stehen flexible Finanzierungsoptionen zur Verfügung.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside, intel core, intel inside, intel inside logotyp, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. New Possibilities Outside Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, celeron
    
DellEMC and  Intel®
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
cloud initiative, personal security, personal device, password protection, security, data encryption
    
Citrix ShareFile
Published By: IBM     Published Date: Mar 30, 2017
In today’s competitive on-line world, the speed of change in customer behaviour is increasing. In addition, in industries such as retail banking, car insurance and to some extent retail, the Internet has become the dominant way in which customers interact with an organisation. Yet in many data warehouses today, being able to analyse customer on-line behaviour is often not possible because the clickstream web log data needed to do this is missing. It is a key point because customer access to the web has made loyalty cheap.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
IBM
Published By: IBM     Published Date: Apr 18, 2017
Master data management (MDM) programs provide ways to ensure that data is consistent in different systems throughout an organization, but poorly managed initiatives are large and complicated affairs. This handbook will provides practical advice on how to develop and implement successful MDM programs that can pay big business dividends. Discover expert advice on: - Strategies and tactics for effective MDM processes - The technology considerations that should be factored into project plans - The ramifications of incorporating pools of “big data” into MDM efforts - And more
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Jun 07, 2017
One of the biggest challenges for IT today, is that it is being asked to enable digital transformation and innovation within enterprises but is held back with aging, legacy infrastructure that does not scale and lacks the capabilities the business requires. Watch this video to hear IDC analyst Chandana Gopal’s viewpoint on why organizations need to create a modern B2B integration technology environment.
Tags : 
b2b, idc, b2b integration, digital transformation
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and greater convenience through the capabilities of better networking technologies, opportunities have never been greater to use technology to make for a truly seamless hospitality experience. However, growing dependence on your network for everything from booking to entertainment can also mean that hospitality networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
    
Cox Business
Published By: Lookout     Published Date: Mar 30, 2018
Mobile security presents one of the federal government’s biggest information technology challenges. Read the Lookout report to learn about the greatest risks, current security solutions, and the future for BYOD.
Tags : 
    
Lookout
Published By: Progress     Published Date: Jan 22, 2019
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Published By: Pure Storage     Published Date: Jul 18, 2017
The big breakthrough is coming from one of the leading innovators in the all-flash market, Pure Storage. Pure has scaled its architecture to make all of its key enterprise-class features available in an entry-level array that “democratizes” all-flash storage by making it affordable to just about any business. The new product is called the Pure FlashArray//m10.
Tags : 
enterprise reliability, flash arrays, cloud data platform, pure storage, data growth, application performance, customer needs, mobile
    
Pure Storage
Published By: Datastax     Published Date: Aug 27, 2018
The public sector has invested in big time in big data. But there’s one thing most public sector entities are dropping the ball on: real-time data, and how it can be combined with big data to increase citizen safety and make mission-critical digital transformation projects happen on-time and on budget. Read this white paper to learn why public sector entities need both big data and real-time data if they are going to deliver on their digital transformation promises.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Dec 27, 2018
The world is moving at an increasingly accelerated pace. In this new Right-Now Economy, the rampant spread of payments fraud remains one of the biggest challenges for e-commerce and financial institutions. The worldwide e-commerce market was valued at $2.3 trillion for 2017, and 2018 should see even more growth, and along with it, more fraud. In the US alone, the cost of e-commerce fraud rose from $10 billion in 2014 to roughly $19 billion in 2018.
Tags : 
    
Datastax
Published By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jun 29, 2017
The ongoing success of 7ticks depends on having an IT infrastructure that adapts and scales to unforgiving reliability, performance, and transparency requirements. To support the torrid growth of data, 7ticks needed to expand the IP/MPLS network connecting its data centers to 40 Gbps—and have an immediate path to 100 Gbps and beyond. Within its data centers, 7ticks needed network and security solutions that would keep pace—and would simplify service management and support automation. “Our biggest challenge is performance at scale,” says Scott Caudell, founder of the 7ticks business and vice president of IT infrastructure at Interactive Data. “IT is our business. The 7ticks infrastructure helps customers get a lower time to market and faster execution speeds at a cost that’s sustainable for their businesses.”
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
security, switching, routing, operating system, secure network, sdsn, solutions
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
This IDC white paper discusses Juniper's Network Lifecycle Automation Services, a suite of capabilities and services that provide customers the ability to accelerate their digital transformation in a smart, simple, cost-efficient, and more secure way.
Tags : 
cloud, big data, iot, business decisions, software defined network, sdn, virtualization, converged, hyperconverged
    
Juniper Networks
Start   Previous    73 74 75 76 77 78 79 80 81 82 83 84 85 86 87    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.