aps data

Results 51 - 75 of 134Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: HP     Published Date: Sep 02, 2015
Service virtualization enables development and test teams to simulate and model the dependencies of unavailable or limited services and data. Voke conducted a survey of 505 participants from technology and non-technology companies to explore their use of service virtualization and its results. Organizations using service virtualization experienced fewer defects, reduced software cycles, and increased customer satisfaction. The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
analytics software, application management, application performance, cloud applications, cloud virtualization, service virtualization
    
HP
Published By: HP     Published Date: Dec 03, 2015
The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
service virtualization, data, market snapshot, voke research, software development, knowledge management
    
HP
Published By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes how HP LeftHand SANs can help you deploy VMware Infrastructure 3 (VI3) software more effectively through volume snapshots, SmartClone volumes, volume migration, and high-availability features. With HP LeftHand SAN and VI3, organizations can reclaim valuable data center space and reduce their power and cooling requirements.
Tags : 
san, storage area networks, vmware, software, migration
    
HP Virtualization
Published By: HPE Intel     Published Date: Mar 09, 2016
State agency and higher education CIOs are under intense pressure to modernize their legacy IT systems. Whether that requires moving from one infrastructure to another, or moving to or from the cloud, the chief challenge remains: How to migrate data and applications without disrupting critical operations, ensure improved performance and avoid pricing and other traps that often accompany virtualizing in the cloud. Learn what’s made the difference in overcoming the impediments to workload migrations from IT leaders who’ve lived through big data and application moves. Topics include: Preparing workloads for cloud on-boarding – and off-boarding Tools for simplifying the consolidation and migration of apps and supporting services Forecasting workloads, and planning for associated testing, training, and other costs
Tags : 
    
HPE Intel
Published By: HPE Intel     Published Date: Mar 15, 2016
To free up staff resources to focus on strategic business initiatives, many IT leaders are considering engaging a partner to handle ongoing data center maintenance and optimization. But, too often, data center management services fall short of expectations. Standard care services may be limited in scope, and may not support the range of legacy hardware already in the data center. Conversely, complex managed or outsourced services may involve a costly, fully-customized engagement, in which costs are unpredictable, and control is wrested away from the enterprise. Finally—and perhaps most importantly—many data center management service providers seem to lack the innovative spark that will ensure continuous improvement to data center operations.
Tags : 
    
HPE Intel
Published By: HPE Service Virtualization     Published Date: Aug 18, 2016
Voke conducted a survey of 505 participants from technology and non-technology companies to explore their use of service virtualization and its results. Organizations using service virtualization experienced fewer defects, reduced software cycles, and increased customer satisfaction. The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
service virtualization, data, market snapshot, voke research, software development, knowledge management
    
HPE Service Virtualization
Published By: IBM     Published Date: Feb 10, 2014
Predictive maintenance taps into the sets of structured and unstructured data that organizations already have available.
Tags : 
ibm, business analytics, operational analytics, predictive maintenance, predictive analytics, data analysis, efficiency, roi, infrastructure mangamenet, knowledge management, business technology
    
IBM
Published By: IBM     Published Date: Mar 05, 2014
If you specialize in relational database management technology, you’ve probably heard a lot about “big data” and the open source Apache Hadoop project. Perhaps you’ve also heard about IBM’s new Big SQL technology, which enables IBM® InfoSphere® BigInsights™ users to query Hadoop data using industry-standard SQL. Curious? This paper introduces you to Big SQL, answering many of the common questions that relational database management system (DBMS) users have about this IBM technology.
Tags : 
ibm, big data, ibm big sql, sql, database management, database management technology, software, tables, queries, data platform, big sql architecture, programming language, relational database management system, rdbms
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
The greatest challenge of the big data revolution is making sense of all the information generated by today's vast digital economy. It's well enough for an organization to collect every slice of data it can reach, but how does it extract value from this massive volume of information?
Tags : 
ibm, analytics, data science, data, big data, aps data, aps, enterprise applications, data management, data center
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
Between the Internet of Things, customer experience and loyalty programs, social network monitoring, connected enterprise systems and other information sources, today's organizations have access to more data than they ever had before-and frankly, more than they may know what to do with. The challenge is to not just understand that data, but actualize it and use it to recognize real business value. This ebook will walk you through a sample scenario with Albert, a data scientist who wants to put text analytics to work by using the Word2vec algorithm and other data science tools.
Tags : 
ibm, analytics, aps, aps data, open data science, data science, word2vec, enterprise applications, business technology, data center
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes.
Tags : 
ibm, security, ponemon institute, technology, fraud, sap, cyber breaches, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
It's all well enough for an organization to collect every slice of data it can reach, but having more data doesn't mean you'll automatically get better insights. First, you have to figure out what you want from your data you have to find its value.
Tags : 
ibm, aps data, data science, open data science, analytics, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
In the domain of data science, solving problems and answering questions through data analysis is standard practice. Data scientists experiment continuously by constructing models to predict outcomes or discover underlying patterns, with the goal of gaining new insights. But data scientists can only go so far without support.
Tags : 
ibm, analytics, aps data, open data science, data science, data engineers, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
Data matters more than ever to business success. But value does not come from data alone. Rather, it comes from the insights enabled by data. No matter what your role is, or where you are in your data journey, you are looking for ways to drive innovation.
Tags : 
ibm, analytics, aps data, open data science, data science, apache spark, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
IBM Compose Enterprise delivers a fully managed cloud data platform on the public cloud of your choice - including IBM SoftLayer or Amazon Web Services (AWS) - so you can run MongoDB, Redis, Elasticsearch, PostgreSQL, RethinkDB, RabbitMQ and etcd in dedicated data clusters.
Tags : 
ibm, analytics, aps data, database, cloud db toolkit, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
This report is designed to help you make an informed decision about IBM Cloudant. It is based on 43 ratings and reviews of Cloudant on TrustRadius, the trusted user review site for business software.
Tags : 
ibm, analytics, aps data, database, cloud db toolkit, cloudant, enterprise applications
    
IBM
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes. The companies represented in this study say their SAP platform has been breached an average of two times in the past 24 months.
Tags : 
cyber breach, data security, information theft, security risk, risk management
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
Published By: IBM Watson Health     Published Date: Nov 10, 2017
To address the volume, velocity, and variety of data necessary for population health management, healthcare organizations need a big data solution that can integrate with other technologies to optimize care management, care coordination, risk identification and stratification and patient engagement. Read this whitepaper and discover how to build a data infrastructure using the right combination of data sources, a “data lake” framework with massively parallel computing that expedites the answering of queries and the generation of reports to support care teams, analytic tools that identify care gaps and rising risk, predictive modeling, and effective screening mechanisms that quickly find relevant data. In addition to learning about these crucial tools for making your organization’s data infrastructure robust, scalable, and flexible, get valuable information about big data developments such as natural language processing and geographical information systems. Such tools can provide insig
Tags : 
population health management, big data, data, data analytics, big data solution, data infrastructure, analytic tools, predictive modeling
    
IBM Watson Health
Published By: IBM Watson Health     Published Date: Jul 09, 2018
Gaps in care in health systems cause higher mortality rates and inflate costs. Download this case study for a closer look at how one health system used IBM CareDiscovery data to prove to their board that an outpatient palliative care service line was viable in both cost savings and quality of care improvement.
Tags : 
mortality rates, quality of care, palliative care, care continuum, clinical performance improvement, ibm, carediscovery, roi, value-based care, episode-of-care, mortality data, process-of-care model, hospital insights, health system insights
    
IBM Watson Health
Published By: Identity Engines     Published Date: Mar 24, 2008
For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.
Tags : 
radius, servers, idengines, id engines, identity engines
    
Identity Engines
Published By: Infinidat EMEA     Published Date: Jun 10, 2019
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings. It’s perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.* So, for businesses it’s a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
Tags : 
    
Infinidat EMEA
Published By: Infosys     Published Date: May 21, 2018
Customers buy products in return for money. But at the heart of our client's vision was another exchange, which was perhaps even more fundamental. Customers would give their time and attention - and in return they wanted an experience that meets their needs, what is often referred to as 'return on engagement' But how can you offer a suitable experience when you don't know enough about the customer? Our client had gathered data, but it was siloed - and there was a big disconnect between the physical and digital operations of the business. The two were not integrated, making it difficult to build a picture of the customers' widely varying needs. This was also a global business with different approaches for different markets, leading to further inefficiencies and silos. It was time to consolidate, standardize, and to really get to know the customer.
Tags : 
crm, product, exchange, customers, engagement
    
Infosys
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee