data direct

Results 26 - 50 of 205Sort Results By: Published Date | Title | Company Name
Published By: Carbonite     Published Date: Jul 18, 2018
© 2018 Carbonite, Inc. All rights reserved. Case study Diamond Foods’ Diamond of California® nuts are household staples for shoppers across the U.S. But constantly filling grocery store shelves with snacks requires intricate supply chain management that relies on critical business data, including complex spreadsheets and enterprise resource planning files, to keep production and deliveries on schedule. “If our critical servers go down or we lose important data on employee laptops, it has a direct impact on our bottom line,” says Kentrell Davis, Senior Client Support Services Analyst at Diamond Foods.
Tags : 
    
Carbonite
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Published By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : 
centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption, database security, information management
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: Cisco     Published Date: Apr 10, 2015
Walk past your data center, and you might hear a soft, plaintive call: “Feed me, feed me…” It is not your engineers demanding more pizza. It is your servers and applications. And the call is growing louder New Cisco® 40-Gbps bidirectional (BiDi) optical technology lets you bring 40-Gbps speeds to the access layer using the same 10-Gbps cable plant you are using today. It is a huge cost savings, whether you are upgrading your current data center or building a new one. And it means you can start taking advantage of 40-Gbps performance for your business right now without needing special budget approval and without having to wait a year to get the capacity you need.
Tags : 
cisco, transceiver modules, wireless, cost effective, high performance switch, optical technology
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 05, 2018
The competitive advantages and value of BDA are now widely acknowledged and have led to the shifting of focus at many firms from “if and when” to “where and how.” With BDA applications requiring more from IT infrastructures and lines of business demanding higher-quality insights in less time, choosing the right infrastructure platform for Big Data applications represents a core component of maximizing value. This IDC study considered the experiences of firms using Cisco UCS as an infrastructure platform for their BDA applications. The study found that Cisco UCS contributed to the strong value the firms are achieving with their business operations through scalability, performance, time to market, and cost effectiveness. As a result, these firms directly attributed business benefits to the manner in which Cisco UCS is deployed in the infrastructure.
Tags : 
big data, analytics, cisco, value, business, enterprise
    
Cisco EMEA
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may also be the reality. The problem is that every single business that pays to recover their files is directly funding the development of the next generation of ransomware. As a result, ransomware is evolving at an alarming rate with new and more sophisticated variants. This makes defending your organization's data against ransomware more critical than ever. But where do you start? Lots of questions come to mind. We've got the answers.
Tags : 
    
Cisco Umbrella EMEA
Published By: ClearStory     Published Date: Oct 07, 2014
Why be bogged down by different analysis solutions for different data types and sources, when a single solution can give you direct access and blending, of all your data, wherever it is? Get the paper and find out more.
Tags : 
data harmonization, analysis solutions, data types, collaboration, data management, data center
    
ClearStory
Published By: Cornerstone OnDemand     Published Date: May 15, 2015
Leveraging econometric analysis of a dataset of approximately 63,000 hired employees spanning approximately 250,000 observations, this report looks not only at the measurable costs of toxic behavior such as sexual harassment, theft and fraud, but also other, equally damaging and harder-to-measure costs. The report examines these indirect costs closely, looking particularly at the toll toxic employees take on co-workers, and concludes that these costs create an even larger financial burden on businesses than the direct impact of an employee’s misbehavior
Tags : 
hidden costs, sexual harassment, toxic employees, employee behavior
    
Cornerstone OnDemand
Published By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : 
storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity, database security, data protection, backup, creekpath
    
Creekpath
Published By: Dassault Systèmes     Published Date: May 09, 2018
More connected, informed and demanding customers have the financial services sector looking closely at their processes and products. Collaborative digital platforms can transform your value network and approach. • Improve data insights: Transform legacy systems, manual processes and data silos for consumer-centric collaboration. • Compete with agile FinTech startups: Use disruptive technologies to meet clients’ changing needs. • Empower me to make my own decisions: Give self-directed customers exceptional experiences, like rapid enrolment and self-assessment tools. • Turn regulatory compliance to competitive advantage: Use digitization to improve compliance, reduce risk and enhance governance. • Improve customer experience through digitization: Reduce regulatory issues, gain insights, increase efficiency and customer-centric innovation. I invite you to download your targeted industry analysis and uncover the expectations to take into account at every stage to be disruptive in the age o
Tags : 
    
Dassault Systèmes
Published By: Data Stax     Published Date: Oct 14, 2016
Financial services companies engage with customers across multiple channels and across a range of financial products. This wealth of customer information is often stored in isolated data silos. Building a 360° view of the customer can directly impact customer experience and help banks grow customer retention, upsell products and provide compelling interactions. This paper examines the challenges these institutions face when creating a 360° view of every customer interaction, what database requirements the lines of business should look into, and use cases to benefit from by leveraging DataStax Enterprise, the database platform purpose built to power cloud applications.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Data Stax
Published By: DataDirect Technologies     Published Date: Mar 17, 2009
Since the SQL Access Group created the Call Level Interface, ODBC has become the most ubiquitous method for connecting to relational database sources. ODBC was developed to allow programmers to access relational data in a uniform manner, regardless of the database backend. ODBC translates those generic commands into the specific esoteric commands of the database backend, so the quality of the driver directly determines the performance of the database connectivity layer. Learn more today!
Tags : 
data direct, open database, sql, call level interface, odbc, drivers, rdbms, 64-bit applications, single architecture, power consumption, rack space, scalability, oracle rac, database availability, service level agreements, slas, software development
    
DataDirect Technologies
Published By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : 
.net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model, com, windows operating system, com-based code, cpu utilization, optimize database connectivity, software development
    
DataDirect Technologies
Published By: DATAVERSITY     Published Date: Dec 23, 2013
Everyone in an organization relies on Metadata to do their jobs. Whenever an email is sent, a report is run, inventory is ordered, compliance procedures are verified, a new IT system is integrated, applications are executed, or essentially any other business function, process, or decision is undertaken, Metadata is facilitating in the background. If that Metadata is corrupt, missing, redundant, or unpredictable then they cannot do their jobs well, they cannot trust the data they are using, and the organization ultimately suffers at all levels. Data Stewards are the people who are use, define, cleanse, archive, analyze, and share the data that is mapped directly to the Metadata of their myriad database and application systems. If your organization does not have Data Stewards (or an inefficient Stewardship Program), you need them. This paper is sponsored by: ASG.
Tags : 
    
DATAVERSITY
Published By: DATAVERSITY     Published Date: Jul 24, 2014
Will the “programmable era” of computers be replaced by Cognitive Computing systems which can learn from interactions and reason through dynamic experience just like humans? With rapidly increasing volumes of Big Data, there is a compelling need for smarter machines to organize data faster, make better sense of it, discover insights, then learn, adapt, and improve over time without direct programming. This paper is sponsored by: Cognitive Scale.
Tags : 
data, data management, cognitive computing, machine learning, artificial intelligence, research paper
    
DATAVERSITY
Published By: Dell     Published Date: Jul 30, 2012
Although you may be aware of the many new features Windows Server 2008 R2 offers, you may not know which ones are the most valuable for the data center.
Tags : 
hyper-v, server core, bitlocker, microsoft, data encryption, data center, data management, active directory, single sign-on, ad fs, sso, powershell, it environment, it management, wds, dell, windows deployment services, remote desktop services, rds, vdi
    
Dell
Published By: Dell     Published Date: May 07, 2015
Your migration is also an opportunity for a “data center do-over” that could include virtualization optimization, cloud adoption, Active Directory cleanup, and server and storage updates. After all, the preparation and process for implementing these advances in IT capability are exactly the same as for an OS migration.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Oct 13, 2016
Flexibility is important, since many future initiatives—big data, machine learning, emerging technologies, and new business directions—will be built on this cloud structure. No matter what shape your cloud infrastructure takes, Dell EMC converged and hyper-converged platforms and innovations like Dell EMC VscaleTM Architecture, powered by Intel® Xeon® processors, deliver the pathways to scale-up and scale-out, today and tomorrow.
Tags : 
emc, capex, opex, roi, hyper-converged platforms
    
Dell EMC
Published By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Prevent unexpected downtime with reliable failover protection. We interrupted access both local storage arrays - the Dell EMC database host seamlessly redirected all I/O to remote VMAX 250F with Intel® Xeon® Processor via SRDF/Metro with no interruption of service or downtime. The 3PAR solution crashed until the standby paths became active and we restarted the VM.
Tags : 
    
Dell PC Lifecycle
Published By: Dell Storage     Published Date: Apr 21, 2011
The Dell Compellent vSphere Plug-In currently under development will enable data center administrators to manage many aspects of Dell Compellent Fluid Data storage directly through the VMware vSphere client. This demo video shows how to leverage the integration to provision and map storage volumes for VMFS datastores, create storage profiles for automated tiering and continuous snapshots, and recover datastores to virtually any point in time - all through a single interface. (4 min)
Tags : 
dell compellent, server, storage, vmware vsphere, integration, compellent vsphere plug-in, fluid data storage, infrastructure
    
Dell Storage
Published By: Drillinginfo     Published Date: Nov 26, 2015
OFS companies in the Bakken Play need fast, accurate rig intelligence from one comprehensive source to stay competitive. With Drillinginfo (DI) you’ll gain a competitive edge in the Bakken Play by using the best data and the broadest intelligence available. In this PDF you’ll learn how DI provides everything you need, from permitting and leasing information to rig locations, pricing trends, and more. While tracking prospects can be a lucrative opportunity, rigs move on a daily basis, so you need timely, accurate information. In this PDF you’ll see how Drillinginfo can drive your success by gathering the very latest rig intelligence from a comprehensive, easy-to-use SAS solution. Learn how to prepare for the next well event with DI Rigs Mobile App. With this invaluable tool you can enjoy the luxury of having your own office on the road. Easy access to rig and well event coordinates and driving directions via GPS units located on over 1,800 rigs make the DI Rigs Mobile App a must.
Tags : 
ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
    
Drillinginfo
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept