proven data

Results 1 - 25 of 64Sort Results By: Published Date | Title | Company Name
Published By: VoltDB     Published Date: Feb 12, 2016
The need for fast data applications is growing rapidly, driven by the IoT, the surge in machine-to-machine (M2M) data, global mobile device proliferation, and the monetization of SaaS platforms. So how do you combine real-time, streaming analytics with real-time decisions in an architecture that’s reliable, scalable, and simple? In this report, Ryan Betts and John Hugg from VoltDB examine ways to develop apps for fast data, using pre-defined patterns. These patterns are general enough to suit both the do-it-yourself, hybrid batch/streaming approach, as well as the simpler, proven in-memory approach available with certain fast database offerings.
Tags : 
    
VoltDB
Published By: Innovative Systems     Published Date: Oct 26, 2017
Even after investing significant time and resources implementing a data quality solution, many enterprises find that their data does not effectively support their goals. This white paper shows how to get the most out of your data quality solution by tailoring it to support your business goals.
Tags : 
    
Innovative Systems
Published By: TD Bank Group     Published Date: Aug 10, 2018
This paper examines whether blockchain distributed ledger technology could improve the management of trusted information, specifically considering data quality. Improvement was determined by considering the impact of a distributed ledger as an authoritative source in TD Bank Group's Enterprise Data Quality Management Process versus the use of standard authoritative sources such as databases and files. Distributed ledger technology is not expected, or proven, to result in a change in the Data Quality Management process. Our analysis focused on execution advantages possible due to distributed ledger properties that make it an attractive resource for data quality management (DQM).
Tags : 
    
TD Bank Group
Published By: MarkLogic     Published Date: Jun 16, 2013
The primary issue discussed within this paper boils down to two disparate database reliability models: ACID vs BASE. The first (ACID) has been around for some 30+ years, is a proven industry standard for SQL-centric and other relational databases, and works remarkably well in the older, yet still extant, world of vertical scaling. The second (BASE) has only recently gained popularity over the past 10 years or so, especially with the rise of social networking, Big Data, NoSQL, and other leviathans in the new world of Data Management. BASE requirements rose out of a need for ever-expanding horizontally scaled distributed networks, with non-relational data stores, and the real-time availability constraints of web-based transaction processing. While there are now more crossovers and negotiations between the two models, they essentially represent two competing groups, with Brewer’s CAP Theorem acting as the referee in the middle forcing tough decisions on each team.
Tags : 
data, data management, unstructured data, nosql, database, acid, base, database transactioning
    
MarkLogic
Published By: HPE     Published Date: Feb 11, 2015
HP Backup & Recovery Modernization Service leverages proven methodologies and best practices to develop comprehensive data protection solutions for HP StoreOnce Backup.
Tags : 
    
HPE
Published By: SAP     Published Date: Nov 16, 2017
The SAP HANA platform has successfully become a proven mainstay data management solution, supporting the full range of analytic and transactional software from SAP, both in the data center and in the cloud.
Tags : 
    
SAP
Published By: Oracle     Published Date: Aug 01, 2018
The Zero Data Loss Recovery Appliance’s benefits are compelling for any enterprise with a need to protect critical Oracle databases. The differences between this database recovery appliance and other approaches to data protection are stark. The Recovery Appliance leverages a combination of existing proven technologies and new developments that eliminate data loss and improve recovery. The elimination of periods between backups when database changes are not captured is also a major benefit, and the movement to a process of frequent or constant incremental backups provided by this appliance changes the game.
Tags : 
    
Oracle
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 04, 2016
VCE VxRail Appliances enable organizations to create IT certainty by eliminating complexity and collapsing cost structures while leveraging their existing VMware investments. Based on VMware's market-leading Hyper-Converged Software, VxRail delivers a known and proven building block for the software defined data center. It provides IT organizations with a full range of options to create a flexible, optimized infrastructure that dramatically simplifies their IT operations while reducing costs.
Tags : 
storage, vmware, protection, hyper-convergence, ssd, hdd, data integration
    
Dell EMC
Published By: Red Hat     Published Date: Dec 09, 2013
Linux has proven to be a key element for successful datacenter modernization. Red Hat Enterprise Linux delivers cross-architecture standardization to a single operating system (OS) and provides a target platform for migrating mission critical workloads. For more information on Red Hat Enterprise Linux datacenter modernization watch the webinar here.
Tags : 
idc, red hat, informationweek, industry solutions, webinar, standardization, cloud computing, virtualization, os dynamics, technology reset, datacenters, market trends, it infrastructure, demarcation line, al gillen, data center
    
Red Hat
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks, cyber defense, vpn, dlp, privileged access, authentication systems
    
Venafi
Published By: IBM     Published Date: Sep 22, 2011
Companies need capabilities for identifying data assets and relationships, assessing data growth and implementing tiered storage strategies-capabilities that information governance can provide. It is important to classify enterprise data, understand data relationships and define service levels. Database archiving has proven effective in managing continued application data growth especially when it is combined with data discovery.
Tags : 
ibm, application data, technology, enterprise, database archive, analytical applications, database development, data quality, database security
    
IBM
Published By: IBM     Published Date: Sep 22, 2011
Learn how your organization can take advantage of recent breakthroughs to lower the cost of data management.
Tags : 
ibm, db2, data management, database, technology, storage, development, database development, data integration, data quality, database security, infrastructure
    
IBM
Published By: NTT Data APAC     Published Date: Jan 16, 2019
NTT Data services has over 600+ BI experts and over 250+ implementations in India, receiving high accolades from Gartner and AMR research. NTT Data Services offers Industry focused offerings and pre-configured models. Some of our offerings include: - Guided Analytics Strategy - Proven Framework & Methodology for ‘C’ level executives - Solution lab for Co-Innovation and Proof of Concepts - Advisory Services - BI Transformations, Big Data Strategy, Information Governance, Health Checks - Proprietary Tools & Accelerators – System Optimization, Architect to Archive, User Adoption - Flexible Delivery - Rapid Development Factory, Shared Services Find more details in this deck.
Tags : 
    
NTT Data APAC
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data, user authentication
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, financial services, cloud based, electronic security, it protection, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldn’t fully anticipate how quickly emerging technologies would transform their business operations — and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerry’s new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In today’s highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
MobileIron
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
data security, accounting, cloud security, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
finance, data security, cloud software, data encryption, security
    
Citrix ShareFile
Published By: Veritas     Published Date: Dec 08, 2016
The latest version - Veritas NetBackup Platform 8.0 - delivers unified data protection for organizations of all sizes, with proven enterprise-class scale, high performance, extensive workload integration, and self-service. No matter where data resides, NetBackup is trusted today in small to the largest and most complex heterogeneous environments.
Tags : 
cloud, cloud computing, data management
    
Veritas
Published By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : 
sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance, advanced persistent threats, apt, insider threat, security, data center
    
Vormetric, Inc.
Published By: IBM     Published Date: Jul 06, 2017
DB2 is a proven database for handling the most demanding transactional workloads. But the trend as of late is to enable relational databases to handle analytic queries more efficiently by adding an inmemory column store alongside to aggregate data and provide faster results. IBM's BLU Acceleration technology does exactly that. While BLU isn't brand new, the ability to spread the column store across a massively parallel processing (MPP) cluster of up to 1,000 nodes is a new addition to the technology. That, along with simpler monthly pricing options and integration with dashDB data warehousing in the cloud, makes DB2 for LUW, a very versatile database.
Tags : 
memory analytics, database, efficiency, acceleration technology, aggregate data
    
IBM
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept