data strategy

Results 226 - 250 of 449Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 19, 2016
This infographic explains how to build your big data strategy on a solid foundation.
Tags : 
ibm, analytics, big data, strategy, software development, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi, security
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
How can your organization realize the financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy? The answer is governance. Download to read more.
Tags : 
ibm, big data, trusted data, data management, data solutions, data center
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data optim, big data, hybrid data environments, data management, data center
    
IBM
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection, cifn, snap management, snapprotect, security, business technology
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app, networking, security, it management, knowledge management, enterprise applications, storage, data management
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management, security, enterprise applications
    
Flexera
Published By: Veritas     Published Date: May 12, 2016
Read this solution brief to explore: 1. Five key questions to ensure your data protection infrastructure is able to deliver data anytime and anywhere 2. Four guiding principles required for your data protection strategy to enable your digital business 3. Key tools to enable your digital enterprise
Tags : 
    
Veritas
Published By: Pentaho     Published Date: Apr 28, 2016
As data warehouses (DWs) and requirements for them continue to evolve, having a strategy to catch up and continuously modernize DWs is vital. DWs continue to be relevant, since as they support operationalized analytics, and enable business value from machine data and other new forms of big data. This TDWI Best Practices report covers how to modernize a DW environment, to keep it competitive and aligned with business goals, in the new age of big data analytics. This report covers: • The many options – both old and new – for modernizing a data warehouse • New technologies, products, and practices to real-world use cases • How to extend the lifespan, range of uses, and value of existing data warehouses
Tags : 
pentaho, data warehouse, modernization, big data, bug data analytics, best practices, networking, it management, wireless, platforms, data management, business technology
    
Pentaho
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Published By: IBM     Published Date: Apr 22, 2016
Developing a data integration and lifecycle management strategy for a hybrid environment This e-book focuses on building and executing a data integration and lifecycle management strategy.
Tags : 
ibm, think data, integration, lifecycle strategy, ibm analytics, knowledge management, enterprise applications, data management, business technology
    
IBM
Published By: Dun & Bradstreet     Published Date: Apr 21, 2016
When the right approach is applied, analytics can drive more effective marketing strategies. While marketers understand the role analytics plays within the organization, most are not leveraging analytics to really drive enterprise performance. We surveyed 100+ business leaders to understand the state of analytics maturity across today’s leading organizations, uncovering common challenges teams are facing in their quest to use data and analytics to deliver a competitive advantage. What We Uncovered: - 73% of analytic professionals claim to work for an analytically-driven company - Only 42% of companies have a strategy for using analytics across the enterprise - Just 38% of companies share results of their analytic insights outside their department - 81% of organizations rely on 3rd parties for at least some portion of their analysis Download the report to learn how marketers, like yourself, view themselves in light of using analytics to drive their business.
Tags : 
hoover's, marketing strategies, analytics, data
    
Dun & Bradstreet
Published By: IBM     Published Date: Apr 18, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data optim, big data, hybrid data environments, data management
    
IBM
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api, enterprise applications, business technology
    
IBM
Published By: CDW - APC     Published Date: Apr 07, 2016
Raising IT inlet temperatures is a common recommendation given to data center operators as a strategy to improve data center efficiency. While it is true that raising the temperature does result in more economizer hours, it does not always have a positive impact on the data center overall. In this paper, we provide a cost (capex & energy) analysis of a data center to demonstrate the importance of evaluating the data center holistically, inclusive of the IT equipment energy. The impact of raising temperatures on server failures is also discussed.
Tags : 
data center, data application, network performance, efficiency, cost analysis, data management, business technology
    
CDW - APC
Published By: Veritas     Published Date: Apr 06, 2016
Download this whitepaper for five critical pitfalls to avoid when building a successful data protection strategy for your organization.
Tags : 
    
Veritas
Published By: CDW     Published Date: Apr 04, 2016
Raising IT inlet temperatures is a common recommendation given to data center operators as a strategy to improve data center efficiency. While it is true that raising the temperature does result in more economizer hours, it does not always have a positive impact on the data center overall. In this paper, we provide a cost (capex & energy) analysis of a data center to demonstrate the importance of evaluating the data center holistically, inclusive of the IT equipment energy. The impact of raising temperatures on server failures is also discussed.
Tags : 
data center, data application, network performance, efficiency, cost analysis, data management
    
CDW
Published By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : 
avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery, application delivery controller, adc, software-defined networks, sdn, networking, it management
    
Avi Networks
Published By: Dell EMC     Published Date: Mar 18, 2016
This white paper provides an introduction to the EMC Isilon scale-out data lake as the key enabler to store, manage, and protect unstructured data for traditional and emerging workloads. Business decision makers and architects can leverage the information provided here to make key strategy and implementation decisions for their storage infrastructure.
Tags : 
emc, emc isilon, data lake, storage, network, unstructured data, business technology
    
Dell EMC
Published By: Dun & Bradstreet     Published Date: Mar 08, 2016
Did you know that the average health of marketers’ data is only “questionable?” Dun & Bradstreet analyzed 695M customer contact records and surveyed more than 500 B2B marketers to provide the truth about the state of B2B marketing data. Download the fourth annual report to discover how you can turn improved data quality into a competitive advantage. • The trends and pitfalls every data-driven marketer needs to know • The true state of B2B marketing data quality • Benchmarks for assessing your own data quality • Dun & Bradstreet’s research of B2B marketers’ data-fueled priorities for 2016 Do you have the data strategy you need to deliver on your marketing goals? Download the B2B Marketing Data Report to find out!
Tags : 
    
Dun & Bradstreet
Published By: HPE Intel     Published Date: Feb 17, 2016
Strategies for State, Local, and Education IT Management View this webinar to learn about how the explosive growth of data calls for new approaches from IT management. You'll hear from a panel of state, local, and education IT decision makers how increasing scale and complexity of data collection and storage are challenging their departments to adapt. Participants: Mark Meyers is the CTO and DIS Director of the state of Arkansas Dr. Paul Kim is the CTO and Assistant Dean of the Graduate School Education at Stanford University Leo Leung is the VP of Corporate Marketing at Scality Bob Schaar is the Segment Solutions Leader for SLED and SMB at Hewlett Parckard Enterprise Wyatt Kash is the VP of Content Strategy at Fedscoop
Tags : 
    
HPE Intel
Published By: Dun & Bradstreet     Published Date: Feb 03, 2016
According to eMarketer, digital marketers have a “love affair with data,” and are planning to increase spending and usage in data-driven marketing strategies. Data helps marketers make more informed decisions about their most receptive audiences, so it should come as no surprise that 75% of B2B marketers currently leverage data to inform their digital advertising strategy, according to a new study.
Tags : 
    
Dun & Bradstreet
Published By: Eaton     Published Date: Jan 26, 2016
This white paper explains why many data centers are ill-equipped to support today’s most important new technologies; discusses why packaged power and cooling solutions can be a flawed way to upgrade existing facilities; and describes the core components of a data center upgrade strategy capable of enhancing efficiency and power density more completely and cost-effectively.
Tags : 
eaton, modern data centers, data center solutions, virtualization, big data, converged infrastructures, it management, knowledge management, enterprise applications
    
Eaton
Published By: Eaton     Published Date: Jan 26, 2016
When designing a power protection scheme for their data center, IT and facilities managers must ask themselves whether a distributed or centralized backup strategy makes more sense. Unfortunately, there is no easy answer to that question. Companies must weigh each architecture’s advantages and disadvantages against their financial constraints, availability needs and management capabilities before deciding which one to employ. This white paper will simplify the decision-making process and lessen the potential weaknesses of whichever strategy you ultimately select.
Tags : 
eaton, distributed backup strategy, centralized backup strategy, facility managers, data center solutions, it management, knowledge management, enterprise applications
    
Eaton
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee