data

Results 10601 - 10624 of 10624Sort Results By: Published Date | Title | Company Name
Published By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Komprimierungsalgorithmen sorgen dafür, dass weniger Bit benötigt werden, um einen bestimmten Datensatz zu repräsentieren. Je höher das Komprimierungsverhältnis, desto mehr Speicherplatz wird durch dieses spezielle Datenreduzierungsverfahren eingespart. Während unseres OLTP-Tests erreichte das Unity-Array bei den Datenbank-Volumes ein Komprimierungsverhältnis von 3,2:1, während das 3PAR-Array im Schnitt nur ein Verhältnis von 1,3:1 erreichte. In unserem Data Mart-Ladetest erzielte das 3PAR bei den Datenbank-Volumes ein Verhältnis von 1,4:1, das Unity-Array nur 1,3:1.
Tags : 
    
Dell PC Lifecycle
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
Choosing a modern enterprise browser that offers the right security capabilities keeps businesses’ data protected, while enabling employees to take advantage of the open web is a big decision for IT. Many IT administrators resort to experimentation in their decision-making. Take the guesswork out of your browser strategy with this guide. Find out what key security features you should be evaluating when selecting a modern enterprise browser.
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As companies embrace cloud services and encourage employee mobility, digital interactions with company resources have become more distributed and virtualized, blurring the traditional concept of the endpoint. Forrester Research surveyed 1000+ IT professionals to better understand how endpoint security challenges are changing for enterprises. To protect company and customer data, it is increasingly necessary for enterprises to revisit how they approach endpoint security. Read the research brief to uncover key trends in enterprise security, and how IT can protect their enterprise through a more secure and managed web browser.
Tags : 
    
Google Chrome Enterprise
Published By: Cloudian     Published Date: Feb 15, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Cloudian     Published Date: Feb 21, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Workday Nordics     Published Date: Apr 09, 2018
The clock is ticking: A year from today, the EU’s General Data Protection Regulation (GDPR) will take effect. With that in mind, now is a good time to talk about how Workday offers tools that help customers meet their GDPR obligations. But first, here’s a brief refresher: The GDPR is an EU regulation meant to harmonize the patchwork of data protection laws in Europe. The GDPR repeals and replaces not just the current EU data protection directive, but also the Byzantine system of privacy legislation that each EU member state enacted under that directive.
Tags : 
    
Workday Nordics
Published By: Redstor UK     Published Date: Mar 12, 2018
Redstor Pro's Data Management Platform features an integrated archiving solution which delivers simple to manage, highly scalable long term archiving that ensures data remains extremely easy to access whilst freeing up expensive primary storage. Users of the service avoid the need to archive data to unreliable tape or add more expensive tier one storage due to data growth.
Tags : 
    
Redstor UK
Published By: Redstor UK     Published Date: May 02, 2018
Many organisations are facing challenges relating to the unstructured data they hold. By its very nature, unstructured data is in a form that is difficult to manage, and it is growing rapidly in size. This can make it difficult to understand who owns that data, whether it is being used or even whether it is of any value. Industry forecasts indicate the volume of data generated by corporates is expected to double over the next three years and, with General Data Protection Regulation taking effect in May 2018, organisations need a more efficient way to manage and control this data. This White Paper provides an overview of the important technical considerations senior business and IT management teams need to review before choosing an archiving provider.
Tags : 
    
Redstor UK
Published By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
Leave unwieldy infrastructure behind and get cloud-ready with Oracle Exadata. If you’re finding that on-premises IT infrastructure complexity is holding you back, it’s time to streamline and simplify. Find out more about our family of purpose-built Oracle systems that can help you consolidate infrastructure and get the performance your business needs. You’ll be ready to make the most of cloud benefits, when the time’s right for you.
Tags : 
    
This program is brought to you by Oracle and Intel
Published By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
Getting the most from your data, driving innovation, processing orders faster, and reducing operating costs are all essential. And Oracle Exadata is the database platform to deliver these improvements. Read five top reasons for running your business on Oracle Exadata, and find out why other organisations say it was such a good choice for them.
Tags : 
    
This program is brought to you by Oracle and Intel
Published By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
IDC has put the business value of the Oracle Exadata to the test by interviewing eight customers. They reported better business outcomes and efficiencies as a result of improved database performance, scalability, and reliability. The resulting whitepaper also reveals business value highlights, such as 429 percent five-year ROI, US$222,000 additional revenue per 100 users, and 94 percent less unplanned downtime.
Tags : 
    
This program is brought to you by Oracle and Intel
Published By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
When application and database numbers increase, how does an organisation avoid overstretching its staff, multiplying costs, and complications? Many companies are using Oracle Exadata—a platform that’s powerful, optimised, and cloud-ready when you are. And they’re seeing, on average, a five-year ROI of 429 percent, 94 percent less unplanned downtime, and 103 percent improvement in transaction rates. See our infographic for more significant findings.
Tags : 
    
This program is brought to you by Oracle and Intel
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Bluecore     Published Date: May 14, 2018
After decades in the limelight, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages. To better understand how retailers are using email, including the extent to which they have embraced individualized messaging opportunities and the effectiveness of those messages, Bluecore turned to the data. Our 2018 Retail Email Benchmark report provides a baseline understanding of these a
Tags : 
    
Bluecore
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software APAC
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
With GDPR looming large on the horizon in May 2018 and beyond, there are a number of myths and misunderstandings circulating around the upcoming changes to compliance and data protection. In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system, and delve into topics, like: • GDPR strategies for cloud ECM • Cultural changes for upcoming compliance regulations • Projected fines associated with GDPR • And more
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
There’s more to your content than you might think. Beyond the differences of enterprise vs. web vs. cloud content management, new changes in intelligent machine-to-machine apps are reinventing the content management market. In this expert e-guide, we explore a flexible, API-led approach to cloud-based content management and collaboration. Learn about a platform designed to enable you to: • Power content with machine learning and metadata • Drive intelligent capabilities like smart search • Modernize content-based processes • And more
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
These days, everyone's talking about digital transformation. But exactly how does your company get there? Capture is a great place to start — in fact, it's one of the most critical steps to take as you move your business into the digital age. Whether it’s simply using OCR to make content more easily discoverable, adding and enhancing metadata to drive specific processes, or classifying content from the onset for better information governance, capture adds a ton of value to your existing content assets. This ebook details our key takeaways from AIIM's Industry Watch Report, Improving Business Operations in 2017: Capturing Vital Content. We share how cloud-based capture tools are replacing the longstanding legacy of paper-based processes to streamline and speed up the way you do business. Download the ebook to learn: • How the latest capture innovations can support your digital strategy • 5 business processes that benefit most from advanced capture technologies • The key benefits of c
Tags : 
    
Box
Published By: Butler Technologies     Published Date: Jul 03, 2018
MPO connectors increase your data capacity with a highly efficient use of space. But users have faced challenges such as extra complexities and time required for testing and troubleshooting multi-fiber networks. VIAVI helps overcome these challenges with the industry's most complete portfolio of test solutions for MPO connectivity.
Tags : 
    
Butler Technologies
Published By: KPMG     Published Date: Jul 10, 2018
Modern regulation demands connected thinking, leading-practice processes, optimal data management and insightful reporting – all of which makes the finance function the ideal catalyst for change. Read this report to find out: • how to structure a transformation plan and strategy • how to create the optimal team for transformation • what leading companies are doing to drive transformation through regulatory change.
Tags : 
    
KPMG
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Start   Previous    411 412 413 414 415 416 417 418 419 420 421 422 423 424 425     Next   End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com