aps data

Results 26 - 50 of 130Sort Results By: Published Date | Title | Company Name
Published By: HPE Service Virtualization     Published Date: Aug 18, 2016
Voke conducted a survey of 505 participants from technology and non-technology companies to explore their use of service virtualization and its results. Organizations using service virtualization experienced fewer defects, reduced software cycles, and increased customer satisfaction. The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
service virtualization, data, market snapshot, voke research, software development, knowledge management
    
HPE Service Virtualization
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 04, 2016
VCE VxRail Appliances enable organizations to create IT certainty by eliminating complexity and collapsing cost structures while leveraging their existing VMware investments. Based on VMware's market-leading Hyper-Converged Software, VxRail delivers a known and proven building block for the software defined data center. It provides IT organizations with a full range of options to create a flexible, optimized infrastructure that dramatically simplifies their IT operations while reducing costs.
Tags : 
storage, vmware, protection, hyper-convergence, ssd, hdd
    
Dell EMC
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : 
data visualization, sas, big data, visual analytics, data exploration, analysis, networking, knowledge management, data management
    
SAS
Published By: Emerson Network Power     Published Date: Aug 19, 2010
While both IT and facilities organizations have invested heavily in technology resources (people, processes and tools) to manage the data center infrastructure, they have failed to achieve the promise and potential due to critical gaps between their data center facilities and IT infrastructure components. A new perspective on managing the critical infrastructure gaps is emerging. Read on for more.
Tags : 
emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud
    
Emerson Network Power
Published By: VMware     Published Date: Oct 05, 2015
Undoubtedly you are aware of network virtualization, but perhaps you’ve yet to hear a compelling case for it. If the extended network capabilities and simplified management enabled by network virtualization aren’t compelling enough reasons, data center security should be. To manage today’s coordinated and persistent security threats, which often come from within, data centers need to implement “Zero Trust” networking. Virtualization puts it within your reach. Discover why — download this free business case white paper now.
Tags : 
vmware, network virtualization, data center, data security, vmware nsx, zero trust, zero trust network, networking, security
    
VMware
Published By: Venafi     Published Date: Mar 26, 2015
Lax SSH security and management can lead to significant gaps in security controls. Cybercriminals target these gaps to gain full access to sensitive, regulated, and valuable systems and data. Read the solution brief, Stop Unauthorized Privileged Access, to close these SSH security gaps and protect your business: • Learn about the top SSH vulnerabilities • Discover how to reduce risk of SSH key misuse • Develop a strategy to manage and secure SSH keys
Tags : 
ssh security, ssh management, security controls, ssh vulnerabilities
    
Venafi
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Choosing Azure revolutionises your environment's agility, simplicity, and innovation, but have you achieved the cost savings you expected? Discover 10 ways you can reduce your spend in Azure, including: Terminate Zombie Assets Delete Aged Snapshots Rightsize Virtual Machines Rightsize SQL Databases Read 10 Best practices for Reducing Spend in Azure, to learn key strategies for optimising cloud spend and saving 10-20?% on your monthly Azure costs.
Tags : 
    
CloudHealth by VMware
Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management, apt, automated applications
    
Venafi
Published By: JBoss Developer     Published Date: Feb 05, 2016
As Oracle Java Composite Application Platform Suite (CAPS) nears the end of its life cycle, healthcare organizations are switching to Red Hat JBoss Fuse to prepare for future business needs. Red Hat JBoss Fuse represents existing use cases on a more flexible, standards-compliant platform. With over 100 different connectors, Red Hat JBoss Fuse offers extensive integration coverage to optimize data flow — both to internal users and to external healthcare partners — on-premise, on mobile devices, or in the cloud.
Tags : 
jboss, redhat, oracle, java, java composite application platform, fuse, integration, data optimization, data management
    
JBoss Developer
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
There are five ways to provision test data. You can copy or take a snapshot of your production database or databases. You can provision data manually or via a spreadsheet. You can derive virtual copies of your production database(s). You can generate subsets of your production database(s). And you can generate synthetic data that is representative of your production data but is not actually real. Of course, the first four examples assume that the data you need for testing purposes is available to you from your production databases. If this is not the case, then only manual or synthetic data provision is a viable option. Download this whitepaper to find out more about how CA Technologies can help your business and its Test Data problems.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Jan 09, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes.
Tags : 
ibm, security, ponemon institute, technology, fraud, sap, cyber breaches, enterprise applications, business technology
    
IBM
Published By: Success Factors     Published Date: Aug 10, 2012
Will the people you need for your future workforce be there? This complimentary SuccessFactors white paper shows how to shorten the journey to data-driven decision-making about talent. Download it today.
Tags : 
successfactors, sap, best practices, workforce planning, data-driven decisions, workforce analytics, data mining, predictive modeling, skills gaps, workforce manager, big data, fact-based decisions
    
Success Factors
Published By: SumTotal Systems     Published Date: Oct 10, 2013
If you’re like everyone else in HR today, you’re probably thinking about how your organisation can handle data better. Maybe your executives want the power to make data-driven decisions from comprehensive workforce analytics. Perhaps you’d like to streamline the efficiency of your HR operation or put more actionable information in the hands of your line managers and employees. With the elixHR Platform, you can integrate your HR data and processes so your people can access information quickly and easily, and make better decisions. You can also lower your operational costs because you can increase efficiency and eliminate the need to replace HR systems that you already have in place.
Tags : 
sumtotal, sumtotal elixhr, sumtotal elixhr platform, elixhr, human resources, hr data, hr processes, hr systems, hr technology, integration, master data management, mdm, mdm technology, talent expansion, platforms, human resource technology, business technology
    
SumTotal Systems
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Delphix     Published Date: Feb 28, 2013
This paper by analyst firm ESG describes the key challenges in ERP upgrade projects, and maps specific database virtualization functions to each challenge.
Tags : 
erp, enterprise resource planning, database virtualization, data management, virtualization
    
Delphix
Published By: Dell EMC     Published Date: Aug 03, 2015
This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.
Tags : 
afa, snapshot technology, data protection, recovery strategies, cloud adoption, production data, emc, snapshot performance, enterprise workflows, hdd
    
Dell EMC
Published By: IBM Watson Health     Published Date: Jul 09, 2018
Gaps in care in health systems cause higher mortality rates and inflate costs. Download this case study for a closer look at how one health system used IBM CareDiscovery data to prove to their board that an outpatient palliative care service line was viable in both cost savings and quality of care improvement.
Tags : 
mortality rates, quality of care, palliative care, care continuum, clinical performance improvement, ibm, carediscovery, roi, value-based care, episode-of-care, mortality data, process-of-care model, hospital insights, health system insights
    
IBM Watson Health
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: Location3     Published Date: Feb 07, 2019
Your Local Business Listings are part of the foundation of your online presence. Ensuring that all of your brick-and-mortar business locations are accurately represented on directories like Google My Business, Facebook Places, Bing Places, Apple Maps and more requires a hands-on, managed approach to local data optimization.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, multi-location businesses, local business listings, listing management, store visits
    
Location3
Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogic’s customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable, enterprise applications, data management
    
MarkLogic
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee