business critical data

Results 151 - 175 of 199Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: Hewlett-Packard     Published Date: Aug 02, 2013
"Cloud computing, also known as 'IT as a Service', is predicated on delivering IT services on demand, an idea that has support from business leaders as a way to better align IT with business operations. Cloud computing has two key requirements: virtualized applications and seamless support and integration between the server, networking, storage and hypervisor components. In this paper, we explore these concepts and highlight the critical features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components-with a particular focus on the important role that storage plays in the evolution of the datacenter architecture."
Tags : 
datacenter, architectures, cloud, virtualization, business technology
    
Hewlett-Packard
Published By: IBM     Published Date: Apr 03, 2017
Businesses today certainly do not suffer from a lack of data. Every day, they capture and consume massive amounts of information that they use to make strategic and tactical decisions. Yet organizations often lack two critical capabilities when it comes to making the right decisions for the business: the ability to make accurate predictions about the future, and to then use those predicted insights in conjunction with organizational goals to identify the best possible actions they should take. The combination of predictive analytics and decision optimization provides organizations with the ability to turn insight into action. Predictive analytics offers insights into likely scenarios by analyzing trends, patterns and relationships in data. Decision optimization prescribes best-action recommendations given an organization’s business goals and business dynamics, taking into account any tradeoffs or consequences associated with those actions.
Tags : 
predictive analytics, analytics, data analytics, financial marketing, market analytics, data resources, data optimization
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I be most concerned with? The point is, not all data deserves equal protection. A more effective approach is to understand: • Which data is most critical (also known as “crown jewels”)? • Where does that data reside? • How is it exposed to security risks? • What potential impact would a security breach to this data have on your organization? • What are the appropriate steps to take based on the data’s criticality?
Tags : 
ibm, data, it security, data analytics
    
IBM
Published By: Vision Solutions     Published Date: Dec 31, 2007
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability
    
Vision Solutions
Published By: InMage     Published Date: Feb 18, 2009
Business-critical data and applications must be available around the clock or serious business disruption could result.
Tags : 
inmage, practical business protection, dr-scout, continuous data protection, cdp, encryption support, host-agents, control servers
    
InMage
Published By: IBM     Published Date: Apr 04, 2013
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm cognos, insight, guides, analysts, faster, better outcomes, better performance, business analysts
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, ibm business analytics, business analytics solutions, ibm cognos insight, analytics, data analysis, visualization, it management
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Many IT executive view cloud computing as an attractive platform for data backup. They know cloud can help protect business-critical data and provide near-ubiquitous information access. But while having a cloud-based solution is valuable, developing one in-house is tricky. That's why many organizations want to contract with a third-party cloud provider for cloud-based data backup. Read this buyer's guide to learn how to choose a provider to suit your business needs.
Tags : 
cloud based, data backup, cloud based data, buyers guide, third-party provider, business development, cloud computing, information access
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy
    
IBM
Published By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions
    
Oracle
Published By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service
    
IBM
Published By: Cisco     Published Date: Sep 16, 2015
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds.
Tags : 
applications, systems integration, cloud, development
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
The data center infrastructure is central to the overall IT architecture. It is where most business-critical applications are hosted and various types of services are provided to the business. Proper planning of the data center infrastructure design is critical, and performance, resiliency, and scalability need to be carefully considered. Another important aspect of the data center design is the flexibility to quickly deploy and support new services. Designing a flexible architecture that can support new applications in a short time frame can result in a significant competitive advantage. The basic data center network design is based on a proven layered approach that has been tested and improved over the past several years in some of the largest data center implementations in the world. The layered approach is the foundation of a data center design that seeks to improve scalability, performance, flexibility, resiliency, and maintenance.
Tags : 
    
Cisco
Published By: Symantec     Published Date: Oct 20, 2014
ApplicationHA leverages more than 12 years of development of well-known Symantec Cluster Server technology to provide an application monitoring package that runs inside a Hyper-V guest operating system, with full integration for Failover Clustering and the Heartbeat monitoring service.
Tags : 
symantec, business critical applications, virtualization, data center, hyper v
    
Symantec
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to a National Cyber Security Alliance estimate. Yet 68 percent of small business owners in a recent survey seemed oblivious to the threat. Why the disconnect? What should they be doing to protect their business-critical systems and data? How can small businesses wring maximum value from their cybersecurity investments? Where do AI-based endpoint protection, detection, and response platforms fit into the mix? Read this BlackBerry Cylance sponsored white paper, Small Organizations Still Need Big Security, to find out.
Tags : 
    
BlackBerry Cylance
Published By: SugarCRM     Published Date: Jan 27, 2014
What if you could give everyone that touches customers an indispensable tool that optimizes business process, removes data silos and makes customer interaction extraordinary? See how Redglaze Group uses Sugar to give individuals access to critical data, optimize processes and improve efficiencies.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
    
SugarCRM
Published By: Riverbed     Published Date: Jan 28, 2014
In this ESG analyst white paper, learn how Riverbed introduces an integrated approach to ensure performance of your network and applications by leveraging Cascade network performance management and Steelhead WAN optimization solutions.
Tags : 
riverbed, riverbed performance management, network performance, business-critical applications, application-level visibility, saas, data center consolidation, wan optimization technologies
    
Riverbed
Published By: Oracle     Published Date: Nov 01, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions
    
Oracle
Published By: HP     Published Date: May 14, 2014
In today’s business environment, customers rely on the most efficient, high performing, and reliable backup systems to protect critical business information. Customers need to protect increasing levels of data while keeping costs under control. HP StoreOnce Backup systems provide a disk-based data protection platform while addressing data growth by applying HP StoreOnce deduplication software for efficient, longer term data retention.This document describes the benefits of using HP StoreOnce Backup systems combined with HP StoreOnce Catalyst software and HP Data Protector to back up important enterprise data. This document also recommends backup and recovery implementations.
Tags : 
hewlett packard, storeonce, data protector, catalyst software, it management, enterprise applications
    
HP
Published By: HP     Published Date: May 14, 2014
Your data is everywhere. It’s in the cloud, in virtual environments, in remote offices, and on mobile devices. Plus, there’s more of it, and much of it is business-critical, meaning you need to back up larger volumes of data than ever before without adding costs or bandwidth. Even more importantly, you need the ability to restore data quickly in the event of a disaster, failure, outage. The cost of data protection is higher now more than ever.
Tags : 
hewlett packard, cloud, mobile, remote, data recovery, disaster, failure, data management
    
HP
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Absolute Software     Published Date: Dec 20, 2012
Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.
Tags : 
apple, devices, patch management, ios, support, end user, security
    
Absolute Software
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee