data solutions

Results 26 - 50 of 919Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Jun 05, 2017
"The Industrial Internet of Things (IIoT) is flooding today’s industrial sector with data. Information is streaming in from many sources — equipment on production lines, sensors at customer facilities, sales data, and much more. Harvesting insights means filtering out the noise to arrive at actionable intelligence. This report shows how to craft a strategy to gain a competitive edge. It explains how to evaluate IIoT solutions, including what to look for in end-to-end analytics solutions. Finally, it shows how SAS has combined its analytics expertise with Intel’s leadership in IIoT information architecture to create solutions that turn raw data into valuable insights. "
Tags : 
    
SAS
Published By: CommVault     Published Date: Jun 10, 2015
Modern data protection solutions must be able to access and restore from backups painlessly, with minimal IT help required.
Tags : 
backup, data, management, storage, data protection, software, network, analytical applications, business intelligence
    
CommVault
Published By: Nasuni     Published Date: Nov 19, 2014
Many companies consider using cloud storage to reduce costs and the IT burden of storing data in the enterprise. However, simply calculating the annual cost of a SAN or NAS server versus the per GB cost of cloud storage does not produce an accurate view of cost savings, because cloud storage alone is not equal to all the functionality found in today’s enterprise-class storage solutions. Cloud-integrated Storage (CiS) delivers the benefits of cloud storage with the features and functionality that enterprises require, while still reducing the cost of storage. Using examples of real companies, this white paper will illustrate five different ways enterprise organizations can save money by transitioning from traditional hardware to Nasuni Cloud-integrated Storage for storing file data.
Tags : 
cloud storage, data storage costs, it management, knowledge management, data management, data center
    
Nasuni
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: HP & Intel     Published Date: Oct 04, 2011
Read this Cloud Security Planning Guide to make sure your cloud computing initiatives avoid these dangerous - and costly - pitfalls.
Tags : 
virtualization, cloud computing, infrastructure
    
HP & Intel
Published By: SAS     Published Date: Mar 01, 2012
This white paper provides a top-level overview explaining what business analytics can do for your company - and the 8 key steps to accelerating product innovation, optimizing pricing and discovering drivers of financial performance.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: Teradata     Published Date: Jan 16, 2015
This Neil Raden paper describes the current need for data warehousing, why SAP® BW is an incomplete choice and how Teradata Analytics for SAP® Solutions is a superior option. Download now!
Tags : 
teradata, sap solutions, data warehouse, extracted data, data management
    
Teradata
Published By: Dell     Published Date: Oct 24, 2014
The migration off Windows Server 2003 is an opportunity for a datacenter “do-over” – a technology infrastructure transformation with implications for business innovation. It’s an opportunity to gain competitive advantage over industry peers, to meet application service levels faster and provide better overall capability, and to make yourself more valuable to your organization. Download this paper to better understand why these aspirations and goals should be at the heart of your migration project.
Tags : 
platform migration, virtualization, it infrastructure, application service levels, datacenter solutions
    
Dell
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks, web applications, pci dss 2.0, spear phishing, application control, drive-by download, malicious activity, network security solutions, business continuity
    
WatchGuard Technologies
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This white paper discusses how SMBs can effectively address their data protection challenges, implementing solutions that help store and protect their business-critical data as they cut costs and improve efficiency and reliability.
Tags : 
hp + intel, data protection stratefy, smbs, backup and recovery, disk, tape, d2d storage, data deduplication, business intelligence, information management
    
HP and Intel® Xeon® processors
Published By: HP     Published Date: Aug 21, 2014
This video (3:58 min) shows the typical journey that your data might take from its creation to its retirement. HP Experts discuss how various storage solutions are used to best handle, protect and retain that data regardless of how and where it is being used.
Tags : 
data, storage solutions, storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges, technologies, data management
    
HP
Published By: IBM     Published Date: Jun 21, 2017
There are many types of databases and data analysis tools to choose from when building your application. Should you use a relational database? How about a key-value store? Maybe a document database? Is a graph database the right ft? What about polyglot persistence and the need for advanced analytics? If you feel a bit overwhelmed, don’t worry. This guide lays out the various database options and analytic solutions available to meet your app’s unique needs. You’ll see how data can move across databases and development languages, so you can work in your favorite environment without the friction and productivity loss of the past.
Tags : 
data analysis, key value, document database, analytics
    
IBM
Published By: Claravine     Published Date: Jan 03, 2019
Marketers have long struggled with the simple task of knowing which marketing spend is truly effective, and how to optimize that spend. At the heart of the issue lies the challenge of ensuring the data quality and consistency exists to make decisions based on real intelligence. Why is this a problem? First, effective tracking is reliant on the consistent, complete application of campaign tracking codes and associated metadata, which has traditionally been a manual, ungoverned process. Adding to this complexity has been the dramatic expansion of digital marketing point solutions, and the disparate teams expected to execute across each of these channels and geographies. The result is what you would expect—highly inaccurate, incomplete, and inconsistent data that must be manually cleaned before reporting is possible. Fortunately a solution exists. Progressive marketing leaders are implementing Digital Experience Data Management (DXDM), ensuring the rich, consistent insights critical to ma
Tags : 
    
Claravine
Published By: Oracle     Published Date: Nov 27, 2013
You need an answer fast. You searched online and almost got the answer, but require a little more information without having to call someone. What do you do? Fortunately, in today's customer service world, there are options. Download this White Paper for more information.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, business technology
    
Oracle
Published By: Oracle     Published Date: Nov 27, 2013
You need an answer fast. You searched online and almost got the answer, but require a little more information without having to call someone. What do you do? Fortunately, in today's customer service world, there are options. Download this White Paper for more information.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, knowledge management
    
Oracle
Published By: SAS     Published Date: Feb 29, 2012
This paper provides an intro to managers and marketing professionals applying analytics to marketing to significantly improve outcomes. It explains not only why you need to make this shift, but also how you get started and what tools you'll need.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Known for its industry-leading analytics, data management and business intelligence solutions, SAS is focused on helping organizations use data and analytics to make better decisions, faster. The combination of self-service BI and analytics positions you for improved productivity and smarter business decisions. So you can become more competitive as you use all your data to take better actions. Instead of depending on hunch-based choices, you can make decisions that are truly rooted in discovery and analytics. And you can do it through an interface that anyone can use. At last, your business users can get close enough to the data to manipulate it and draw their own reliable, fact-based conclusions. And they can do it in seconds or minutes, not hours or days. Equally important, IT remains in control of data access and security by providing trusted data sets and defined processes that promote the valuable, user-generated content for reuse and consistency. But, they are no longer forced
Tags : 
    
SAS
Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses, information security, security threats, fireeye platform, protecting data, cyber targets, cybercriminals, prime target, midsize businesses, security, it management
    
FireEye
Published By: Polycom     Published Date: Mar 06, 2017
Collaboration face to face: the power of being there, without going there. Download this healthcare solutions brief from Polycom to learn more.
Tags : 
polycom, health care, telehealth, medical data, healthcare solutions, public sector
    
Polycom
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept