Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

data requirements

Results 176 - 200 of 325Sort Results By: Published Date | Title | Company Name
Published By: Datastax     Published Date: Apr 04, 2017
As the big data ecosystem continues to expand, new technologies are addressing the requirements for managing, processing, analyzing, and storing data to help companies benefit from the rich sources of information flowing into their organizations. From NoSQL databases to open source projects to commercial products offered on-premises and in the cloud, the future of big data is being driven by innovative new approaches across the data management lifecycle. The most pressing areas include real-time data processing, interactive analysis, data integration, data governance, and security. Download this report for a better understanding of the current landscape, emerging best practices and real-world successes.
Tags : 
evolution, big data, technology, datastax, nosql
    
Datastax
Published By: Datastax     Published Date: Apr 04, 2017
For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution.
Tags : 
database, cloud, applications, endpoint, datastax
    
Datastax
Published By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 03, 2018
Distributed cloud databases are transforming the way organizations do business. Read this new, informative guide to learn what distributed cloud databases are and why they’re what’s required to power Right-Now Economy applications. You'll also get straightforward yet detailed information on the database requirements for today’s applications, the limitations of relational databases, and the importance of data autonomy in database selection. With Designing a Distributed Cloud Database for Dummies, you'll learn how enterprises can meet and exceed customer expectations by way of modern applications and distributed cloud databases.
Tags : 
    
Datastax
Published By: Infosys     Published Date: Sep 11, 2018
Infosys has been recognized as a ‘Leader’ in NelsonHall’s Vendor Evaluation and Assessment (NEAT) report on big data and analytics services 2018.We have also been highly rated for our focus on automation. Our ability to meet future client requirements as well as deliver immediate benefits such as analytics, data management and support functions to our clients with a specific focus on process automation enabled us to secure this position.
Tags : 
    
Infosys
Published By: Riverbed     Published Date: Nov 02, 2016
Digital transformation on the 3rd Platform continues to present unprecedented opportunities and challenges for enterprise networks and the IT professionals who operate them. Indeed, the requirements associated with cloud computing have already reverberated through datacenter networking, with software-defined networking (SDN) arising as an architectural approach that provided the network with the agility and responsiveness that it lacked previously but has come to require. Now, the focus is turning to how the WAN must change to accommodate the requirements of cloud applications and services. Fortunately, technologies such as hybrid WAN and software-defined WAN (SD-WAN) are coming to the rescue, giving enterprise IT the means to allow the WAN to meet these challenges directly.
Tags : 
    
Riverbed
Published By: Lenovo and Intel®     Published Date: Oct 31, 2018
Digital transformation is putting data at the core of business processes, necessitating a rethink of IT infrastructure. This new business environment is driving new requirements for performance, scalability, availability, and flexibility in data center storage. In this IDC white paper, learn about evolving enterprise infrastructure requirements and learn more about the Lenovo and NetApp strategic relationship, including IDC's take on the value this delivers to both customers and the vendors themselves.
Tags : 
    
Lenovo and Intel®
Published By: Lenovo     Published Date: Nov 01, 2018
Digital transformation is putting data at the core of business processes, necessitating a rethink of IT infrastructure. This new business environment is driving new requirements for performance, scalability, availability, and flexibility in data center storage. In this IDC white paper, learn about evolving enterprise infrastructure requirements and learn more about the Lenovo and NetApp strategic relationship, including IDC's take on the value this delivers to both customers and the vendors themselves.
Tags : 
    
Lenovo
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps
    
Cisco
Published By: McAfee EMEA     Published Date: Mar 14, 2018
As every business decision-maker should now know, the E.U. General Data Protection Regulation (GDPR) enforcement date is coming. The GDPR will be enforced starting May 2018 and will apply to those collecting, storing or using the personal data of the residents of the European Union’s 28 member states. The Regulation changes requirements around protecting the personally identifiable information of over 500 million people, and occupies the minds of anyone around the world concerned with data protection. To better understand data decision-making, McAfee® commissioned Vanson Bourne to survey the views of 800 senior business professionals across eight countries around the world from a range of industry sectors.
Tags : 
    
McAfee EMEA
Published By: EMC Corporation     Published Date: Mar 20, 2014
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Tags : 
emc, big data, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence, security
    
EMC Corporation
Published By: EMC Corporation     Published Date: Dec 08, 2014
Traditional methods for provisioning and maintaining storage resources are no longer sufficient to achieving business goals due to the fact that technology layers mask the relationship of application workloads to the physical storage devices that support them. The broad adoption of disruptive technologies - including cloud, virtualization, mobility, software-defined data centers, and big data - have introduced new and more challenging requirements for enterprise IT. Find our more in this whitepaper.
Tags : 
cloud, big data, software-defined data, virtualization, storage, mobility, it management
    
EMC Corporation
Published By: NetIQ     Published Date: Dec 23, 2010
The Payment Card Industry Data Security Standard (PCI DSS) establishes standard requirements protecting cardholder information. It applies to all entities that store, process, or transmit cardholder data, such as retail merchants, payment processors, and banks.
Tags : 
netiq, roi, pci dss, compliance
    
NetIQ
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, security
    
Attachmate
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Everything you need to know about Infrastructure for Desktop Virtualization—in one eBook. Dive into this extensive eBook to get all the details you need to consider when launching down the path of virtualization. In this eBook, from Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and editor Sachin Chheda, director of solutions and verticals marketing at Nutanix, we provide detailed analysis and key points to consider, including: • Architectural Principles • Building Blocks • Infrastructure Alternatives • Storage Requirements • Compute Sizing Get the eBook
Tags : 
infrastructure, capacity, monitoring, storage requirements, compute sizing, scalability
    
Lenovo and Intel®
Published By: VMware     Published Date: Nov 04, 2016
In order to keep pace with the business and developer demands inherent with the digital era, enterprise IT has picked up speed and scale by embracing the cloud. As a result of this mix of private on-premises clouds, hosted private clouds, and public cloud services, the modern data center has become a more complex and murky environment to manage. In the VMware eBook “How to Gain Visibility Across Your Multi-Cloud Environment,” we explore the power of the enterprise-ready cloud management platform (CMP) as a single solution for automating the delivery of IT resources, and managing those resources throughout their lifecycle across private and public clouds. Learn how you’ll gain the agility for accelerating IT delivery, the efficiency to improve OpEx and CapEx, the flexibility to leverage private or public cloud resources, and the level of control necessary to meet governance and security requirements.
Tags : 
    
VMware
Published By: Interactive Intelligence     Published Date: Apr 23, 2014
Customer Experience (CX) and Net Promoter Score (NPS) are two of the benchmark measurements companies now use to gauge customer satisfaction. And to understand how budgetary decisions impact CX and NPS outcomes, companies are turning to advanced contact center technology for strategic planning and big data. But business requirements to manage these outcomes successfully must incorporate back-office operations as well as the contact center. Read why.
Tags : 
contact center, contact center strategy, customer experience, optimization, strategic planning, budgeting tools, workforce management solutions, call center, contact communications, big data, business analytics, it management, telecom
    
Interactive Intelligence
Published By: Trillium Software     Published Date: May 19, 2011
By implementing the six pillars of data quality optimization, your organization can incrementally improve the quality of the data that drives all your operations.
Tags : 
trillium software, data quality management, iqm, information quality management, quality maturity model, enterprise data management, edm, data storage requirements, digital universe, data hygiene best practices, data standards, data monitoring
    
Trillium Software
Published By: IBM     Published Date: Oct 14, 2009
Discover the unique support for data warehousing and business intelligence offered by the IBM DB2 portfolio. This white paper shows how an IBM System z server, integrated with the IBM DB2 family of solutions, can help you meet requirements for data warehousing and business intelligence.
Tags : 
data warehousing, ibm, business intelligence, total cost of ownership, tco, integrated facility for linux, eal5, workload consolidation, scalability, disaster recovery, workload management, operational data stores
    
IBM
Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection, ebusiness, customer relationship management, software compliance, security management, security policies, secure computing, securecomputing
    
Secure Computing
Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox, sarbox, sarbanes oxley, sarbanes-oxley, pci, pci-dss, pci dss, compliance, auditing, audit, security audit, axeda, security
    
Axeda Corporation
Published By: NexGen     Published Date: Feb 09, 2015
The nature of the financial services industry places a myriad of international compliance requirements on a company's IT team, as well as an expectation by its customers to deliver the high test levels of performance and reliability. To survive and thrive, businesses in the industry must not only keep pace with customer demand but gain competitive advantage. Those demands mean the IT team must be at the forefront of adopting emerging technologies. This is certainly true for Orangefield Columbus, who recently experienced significant growth in its multiple databases which led to the serious performance degradation of its existing storage system. By focusing on a proactive data management storage array, Orangefield was able to eliminate resource contention. Download now and examine Orangefield's journey to find a solution that would meet, and exceed, their performance and capacity requirements.
Tags : 
nexgen, vmware, citrix, flash, financial services, it management
    
NexGen
Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance, netforensics
    
netForensics
Published By: EMC Corporation     Published Date: Jun 14, 2013
Learn how Brainshark is leveraging EMC infrastructure to confidently deliver software-as-a-service. Understand how EMC is helping to address increasing data growth challenges and increasing customer requirements for higher availability, performance and scalability.
Tags : 
infrastructure, data growth, customer requirements, performance, scalability, software, technology, solution, networking, security, enterprise applications
    
EMC Corporation
Published By: IBM Corp     Published Date: Sep 23, 2011
The ever-increasing pace of data growth calls for a comprehensive storage strategy that protects data infrastructure from performance problems and is also flexible enough to handle changing business requirements. Read the advisory brief from Frost & Sullivan's Stratecast group and learn how IBM's suite of storage solutions addresses big data challenges. You'll also learn how you can introduce scalability and efficiency to your storage environment - avoiding the storage Armageddon.
Tags : 
technology, storage, esg, capacity, ibm
    
IBM Corp
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.