Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

data model

Results 251 - 275 of 380Sort Results By: Published Date | Title | Company Name
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
This paper introduces five architectural principles guiding the development of the next generation data center (NGDC). It describes key market influences leading a fundamental enterprise IT transformation and the technological trends that support it. The five principles are: scale-out, guaranteed performance, automated management, data assurance, and global efficiencies. Cloud infrastructure delivery models such as IaaS, private clouds, and software-defined data centers (SDDC) are foundations for the NGDC. In an era where IT is expected to ensure productiongrade support with a plethoric flow of new applications and data, these models demonstrate how to eliminate bottlenecks, increase self-service, and move the business forward. The NGDC applies a software-defined everything (SDx) discipline in a traditional, hardware-centric business to gain business advantage.
Tags : 
    
SolidFire_NetApp
Published By: Microsoft     Published Date: Oct 06, 2016
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
microsoft, analytics, data, business impact
    
Microsoft
Published By: AdRoll     Published Date: Oct 05, 2016
AdRoll looked in detail at the attribution strategies that agencies and brands across these markets are employing to find out how well they are leveraging their data to attract, convert and grow their customer base, as well as the challenges they face in integrating attribution into their marketing. From all of this AdRoll and Econsultancy deliver key insights and actionable insights which you can apply to your business in implementing or optimising attribution modeling.
Tags : 
    
AdRoll
Published By: GE Power     Published Date: Oct 05, 2016
Gathering machine sensor data for analysis across a power plant is only the beginning. The Digital Twin takes analytics to the next level by creating a virtual analytic model of assets within the plant. With the GE Digital Twin power companies can understand how assets are performing in real time, and predict future performance.
Tags : 
digital power plant, digital power, digital power station, distributor solution, efficiency of power generation, industrial power
    
GE Power
Published By: IBM     Published Date: Sep 30, 2016
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Tags : 
ibm, security, data, privacy, forrester, forrester research
    
IBM
Published By: Oracle ODA     Published Date: Aug 15, 2016
Oracle added two new models to the Oracle Database Appliance family in addition to the existing high availability model. With an entry list price starting at a fourth of the cost of the prior generation Oracle Database Appliance hardware and flexible Oracle Database software licensing, these new models bring Oracle Engineered Systems to within reach of every organization. Read about how the Oracle Database Appliance X-6 series expands the reach of the database appliance family to support various workloads, deployment scenarios, and database editions. They are especially designed for customers requiring only single instance databases, but who desire the simplicity, optimization, and affordability of the Oracle Database Appliance. These new models are ideal for customers who seek to avoid the complexity, tuning requirements, and higher costs of “build-your-own” database solutions.
Tags : 
    
Oracle ODA
Published By: Pega     Published Date: Aug 12, 2016
Digital transformation has fundamentally disrupted global manufacturing. It’s not just a single technological advancement; it’s a full range of emerging technologies that are revolutionizing the industry. Social, mobile, Big Data, analytics, cloud, and the Internet of Things are re-defining every organization’s operating models. Within the next decade, many manufacturers will find themselves managing operations that are virtually unrecognizable from the past century.
Tags : 
pega, mobil, big data, analytics, cloud
    
Pega
Published By: CDW     Published Date: Aug 04, 2016
As IT advances, organizations are adopting infrastructures that enhance agility and improve efficiency. Data centers are evolving to a state that is almost unrecognizable from only a few years ago. Numerous forces, such as cloud computing and powerful orchestration solutions, are combining to fundamentally change data centers, making them more powerful, sophisticated, flexible and efficient. Many organizations are adopting a hybrid infrastructure data center model that combines a variety of technologies and methodologies, including virtualization, private clouds and other internal IT resources, along with external options such as hosting, colocation, Software as a Service (SaaS) applications and Infrastructure as a Service (IaaS) offerings.
Tags : 
data center, best practices, technology, data, cloud, cloud computing
    
CDW
Published By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics incorporates many governed discovery features, with which business users can easily expose the underlying data modelling of existing reports and modify it to an individual or departmental requirements
Tags : 
ibm, ibm cognos analytics, analytics, business intelligence, business analytics
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi, security
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco
Published By: VMware     Published Date: Jul 01, 2016
Cloud computing adoption continues to expand as the overall benefits of cloud (cost efficiency, self-service, and IT standardization) are becoming more broadly recognized. While private cloud is the primary type of cloud infrastructure that is in use today, organizations are finding that cloud can no longer be a standalone IT sourcing and consumption model. Enterprises demand greater flexibility and scalability, leading them to invest in hybrid cloud models, which supply them with a seamless application, data, and management environment across all of their IT resources. IDC expects that the percentage of users who adopt private or public cloud models will diminish over the next several years, as enterprises increasingly choose to implement a hybrid cloud model.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension
    
VMware
Published By: Dell EMC     Published Date: Jun 29, 2016
IDC believes that EMC Isilon is indeed an easy to operate, highly scalable and efficient Enterprise Data Lake Platform. IDC validated that a shared storage model based on the Data Lake can in fact provide enterprise-grade service-levels while performing better than dedicated commodity off-the-shelf storage for Hadoop workloads.
Tags : 
storage, data, enterprise, best practices, platform
    
Dell EMC
Published By: SumTotal, a Skillsoft Company     Published Date: Jun 24, 2016
In the latest developments in technology for HCM, Nucleus sees an inexorable march to upend conventional approaches to on-the-job learning. Training scheduled around static variables such as regulatory policy or company initiatives, for instance, is one-dimensional. This type of learning will persist. The emergence of prescriptive analytics made possible by real-time data models, however, makes trigger-based, in-the-moment learning possible (Nucleus Research p199 – The coming mass extinction in HCM, November 2015). Further supporting this are social media–style user interfaces (UIs), which promote continual collaboration. It’s learning that happens whenever an employee needs it, not when the organization or law decrees it. Data across HCM prompts these triggers.
Tags : 
best practices, business optimization, business management, organization, talent management, technology
    
SumTotal, a Skillsoft Company
Published By: Qlik     Published Date: Jun 24, 2016
This paper outlines the benefits of a distributed model, and includes insights and case studies from leading executives.
Tags : 
qlik, data, business data, business intelligence, distributed model
    
Qlik
Published By: Skillsoft     Published Date: Jun 23, 2016
In the latest developments in technology for HCM, Nucleus sees an inexorable march to upend conventional approaches to on-the-job learning. Training scheduled around static variables such as regulatory policy or company initiatives, for instance, is one-dimensional. This type of learning will persist. The emergence of prescriptive analytics made possible by real-time data models, however, makes trigger-based, in-the-moment learning possible (Nucleus Research p199 – The coming mass extinction in HCM, November 2015). Further supporting this are social media–style user interfaces (UIs), which promote continual collaboration. It’s learning that happens whenever an employee needs it, not when the organization or law decrees it. Data across HCM prompts these triggers.
Tags : 
best practices, business optimization, business management, organization, talent management, technology
    
Skillsoft
Published By: Cisco     Published Date: Jun 21, 2016
Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System (Cisco UCS) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: IBM     Published Date: Jun 07, 2016
The database you pick for your next application matters now more than ever. It can be difficult, and oftentimes impossible, to quickly join today's data into the relational model. Learn how a NoSQL database can act as a viable alternative to or compliment an existing relational database.
Tags : 
ibm, nosql database, database, analytics, networking, enterprise applications
    
IBM
Published By: Cisco     Published Date: Apr 20, 2016
Note: Part two of Karen Walker’s blog series continues her insights about Digital Transformation and spotlights how Cisco’s Marketing and Communications team is using technology to transform their function. Excerpt: Today’s marketers are delivering more and more content digitally, but to be effective that digital content can’t just be generic reference material. Rather, effective content must be relevant, timely, and personalized. And its goal should be to create a dialogue with the customer. This is no easy task. It requires investing in marketing technologies that help deliver personalized content with speed and agility. For modern marketers, technology opens the door to new revenue pipelines. Digital platforms and applications combined with data and analytics augment our go-to-market model.
Tags : 
cisco, digital, marketing, technology, mobile, marketing strategy
    
Cisco
Published By: IBM     Published Date: Apr 01, 2016
Read the eBook to: 1) Expand what you know about Big Data; 2) Learn about the Big Data Zones Model that brings a new approach to managing data, faster to deploy, faster to insights and with less risk; 3) Gain confidence in your Big Data projects and learn about the importance of governance in a Big Data world
Tags : 
ibm, ibm connect, big data, big data zones model, data management
    
IBM
Published By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection
    
Logrhythm
Published By: Cisco     Published Date: Jan 05, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Read more to learn how Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance.
Tags : 
    
Cisco
Published By: Looker     Published Date: Dec 03, 2015
The focus of modern business intelligence has been self-service; pushing data into the hands of end users more quickly with more accessible user interfaces so they can get answers fast and on their own. This has helped alleviate a major BI pain point: centralized, IT-dominated solutions have been too slow and too brittle to serve the business. What has been masked is a lack of innovation in data modeling. Data modeling is a huge, valuable component of BI that has been largely neglected. In this webinar, we discuss Looker’s novel approach to data modeling and how it powers a data exploration environment with unprecedented depth and agility. Topics covered include: • A new architecture beyond direct connect • Language-based, git-integrated data modeling • Abstractions that make SQL more powerful and more efficient
Tags : 
    
Looker
Published By: VMware     Published Date: Oct 05, 2015
Most data center security emphasizes strong perimeter defense to keep threats on the outside. But this model is ineffective against today’s new types of threats, which may be borne by east-west traffic inside your data center. Some of these intrusions may lurk for days, weeks, or months to discover and exploit vulnerabilities. An existing concept called micro-segmentation is the solution. But until now, it was hardware-intensive and costly. In this solution overview, you’ll learn why micro-segmentation is now within your organization’s reach. Get your free copy now.
Tags : 
vmware, data center security, data center, micro segmentation, micro segmentation solution, security
    
VMware
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.