eca

Results 1 - 25 of 1807Sort Results By: Published Date | Title | Company Name
Published By: Aligned Data Centers     Published Date: Oct 12, 2015
The traditional data center model is like the old cable TV and music models, which forced you to buy and pay for all 189 channels and all ten songs, even if you only wanted a few. The evolved data center model, in contrast, is like the new TV and music models – you only buy the show or the song you want. Where the traditional colocation model locks you into long-term contracts for power you may not use, the evolved payfor-use model eliminates the need to forecast IT demand and provides control over capacity. As a result, you reduce waste and align your data center to the needs of your business. Aligned Data Centers is the first to bring this evolved data center model to the marketplace. The pages that follow explain how.
Tags : 
aligned datacenter, evolved datacenter, pay for use model
    
Aligned Data Centers
Published By: FORTRUST     Published Date: Aug 14, 2015
Companies rely on their data center to provide the foundation for much of their business. Because of that, a thorough evaluation of the key geographical factors related to risk mitigation and data center site selection is critical. This white paper examines several of the major criteria to use in geographic data center site selection, and provides an overview of the FORTRUST facility as it relates to those criteria.
Tags : 
    
FORTRUST
Published By: CommScope     Published Date: Apr 15, 2016
The data center has assumed a new, more prominent role as a strategic asset within the organization. Increasing capacity demands and the pressure to support the “always-on” digital business are forcing data centers to adapt, evolve, and respond at an increasingly accelerated rate. Cloud, mobility, IoT, big data – these and other interrelated trends are putting enormous pressure on the modern data center. To keep pace, today’s physical infrastructure has become vastly more complex, interconnected, and performance-driven than a decade ago.-
Tags : 
    
CommScope
Published By: CommScope     Published Date: Apr 15, 2016
Multimode fiber (MMF) cabling is the workhorse media of local area network (LAN) backbones and data centers because it offers the lowest cost means of transporting high data rates for distances aligned with the needs of these environments. MMF has evolved from being optimized for multi-megabit per second transmission using light emitting diode (LED) light sources to being specialized to support multi-gigabit transmission using 850 nm vertical cavity surface emitting laser (VCSEL) sources. Channel capacity has been multiplied through the use of parallel transmission over multiple strands of fiber. These advances have increased multimode supported data rates by an astounding factor of 40,000 — from 10 Mb/s in the late 1980s to 100 Gb/s in 2010, with 400 Gb/s in development in 2015. Today, these extraordinary rates are created from collections of 25 Gb/s lanes carried on either four or sixteen strands of fiber in each direction
Tags : 
    
CommScope
Published By: CyrusOne     Published Date: Jul 02, 2016
Even through challenging economic times, the need for physical data center capacity continues to grow. For some businesses, the driver is expansion into new markets or geographies. For others, it's the need to deal with growing amounts of data generated by applications with high-capacity demands, evolving end-user abilities, or regulatory bodies that demand ever-increasing quantities of meticulous documentation. The "build-or-buy" decision between construction and colocation should be weighed carefully, as the choice will affect your company and your bottom line quite literally for decades. This executive report will review six key factors that affect that choice, some of which extend beyond a basic TCO analysis.
Tags : 
    
CyrusOne
Published By: Intel     Published Date: Dec 31, 2015
A recent survey of 200 data center managers across the US and UK reveals that a large proportion of centers take a manual approach to planning and forecasting. Despite its limitations, MS Excel emerges as a popular tool and nearly one in ten resort to walking around a data center with a tape measure. Only just over half are able to benefit from using Data Center Infrastructure Management (DCIM) tools. The manual approach is not limited to smaller data centers by any means; the proportion was found to remain the same even amongst the larger data centers (with above 1,500 servers). When asked why manual methods were employed, 46% said it was because they felt that the alternatives would be too expensive. A further 35% feared they lacked the resources to implement a more automated approach. Whilst both these factors may seem reasonable enough at first sight, both might actually represent false economies in the longer run.
Tags : 
    
Intel
Published By: VMware     Published Date: Sep 12, 2019
Companies today understand there are significant business benefits to modernizing and automating their IT processes. By doing so, they can improve operational efficiencies, boost productivity and agility, reduce costs and — with the resultant savings — invest in new initiatives and innovations to become even more competitive. But how do you go about transforming IT infrastructure and operations, and how do you measure progress? After all, efforts to harness IT transformation as an engine to drive business transformation have been underway for years and will continue into the foreseeable future. Fortunately, a ready source of detailed IT transformation insights exists. For nearly a decade, Dell EMC and VMware have helped CIOs define and prioritize the steps needed to transform their IT organizations as part of a series of IT Transformation Workshops with their customers
Tags : 
    
VMware
Published By: KPMG     Published Date: Oct 15, 2019
The asset and fund management industry has grown signifcantly in the last decade, with surveys indicating about 65 percent growth since 2007, to over USD 80 trillion in assets under management worldwide. As its importance to the world financial system – linking those with money to invest with enterprises and activities that require funding – is increasingly recognized, so both the industry and the regulators that police the sector become more prominent. The industry and regulators are coming under pressure from a range of “external” voices – demanding investors and consumer groups, clamoring political and economic needs, changing priorities and hopes of civil society, an increasingly noisy press, the explosion in social media and the rapid growth of new technologies. This sea of voices is directly influencing the regulatory agenda and increasing expectations on the industry. A fundamental rethink of firms’ mindset and investment offerings is required.
Tags : 
    
KPMG
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: HERE Technologies     Published Date: Sep 26, 2019
Misplacing sizable, expensive tooling equipment inside large industrial complexes, factories and warehouses is a problem that doesn't get the attention it deserves. When essential inventory gets lost, whole production lines can grind to a halt. Indoor tracking is the optimal way to keep tabs on all mobile equipment around the factory floor. As one of the world's leading location platforms, HERE shares insights and solutions for implementing indoor tracking in a way that can streamline and optimize production processes. Read the eBook to discover how to: • locate inventory and assets quickly to lower downtime and improve job satisfaction • save money spent on replacing lost tools and wasted employee time • use insights into asset utilization for forecasting or maintenance schedules.
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 26, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: • Find out why de-identification does not always mean anonymity • Understand how privacy by design can be used for standards and product or service creation • Discover how gathering just data you need will minimize the privacy impact of collection • Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jul 22, 2019
In September, leading insurance professionals joined TIBCO for an exclusive and interactive roundtable dinner. During the course of the discussion, it became clear that while AI will significantly alter the customer journey, a lot still needs to be done in terms of both defining AI's capabilities as well as acknowledging where it best fits in an insurance business, how it will impact the workforce and reinvent the customer journey.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jun 14, 2019
Reinventing the Yellow Pages Directory: How YellowAPI Became an Engine for Digital Transformation
Tags : 
    
TIBCO Software
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast
Published By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
Over the past decade there has been a major transformation in the manufacturing industry. Data has enabled a paradigm shift, with real-time IoT sensor data and machine learning algorithms delivering new insights for process and product optimization. Smart Manufacturing, also known as Industry 4.0, has laid the groundwork for the next industrial revolution. Using a smart factory system, all relevant data is aggregated, analyzed, and acted upon. We call this Manufacturing Intelligence, which gives decision-makers a competitive edge to: Digitize the business Optimize costs Accelerate innovation Survive digital disruption Watch this webinar to understand use cases and their underlying technology that helped our customers become smart manufacturers.
Tags : 
    
TIBCO Software
Published By: PwC     Published Date: Sep 18, 2019
The traditional payer business model is fast becoming obsolete. Blues organizations that cling to the status quo or business as usual risk jeopardizing their reputations and business, because people are more than patients. Increasingly, employers are driving the growing demand for more solutions to engage customers. In response, healthcare incumbents and new entrants are building solutions to address rising costs and meet consumers’ demands for personalization, price transparency, access, and seamless, simple experiences. Proactive engagement can help your members lead healthier lives while improving outcomes for payers and other players. With 5% of Americans consuming 50% of healthcare costs, identifying and engaging high-risk, high-cost customer segments is essential to sustainability.
Tags : 
    
PwC
Published By: Intel     Published Date: Sep 30, 2019
Mountains of data promise valuable insights and innovation for businesses that rethink and redesign their system architectures. But companies that don’t re-architect might find themselves scrambling just to keep from being buried in the avalanche of data. The problem is not just in storing raw data, though. For businesses to stay competitive, they need to quickly and cost-effectively access and process all that data for business insights, research, artificial intelligence (AI), and other uses. Both memory and storage are required to enable this level of processing, and companies struggle to balance high costs against limited capacities and performance constraints. The challenge is even more daunting because different types of memory and storage are required for different workloads. Furthermore, multiple technologies might be used together to achieve the optimal tradeoff in cost versus performance. Intel is addressing these challenges with new memory and storage technologies that emp
Tags : 
    
Intel
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Banking engagement is about to come full circle. Over the past few decades, banks have pushed customers to digital and self-service channels, with significant consequences. As customers take their transactions from the branches to the digital channels, banking has become less and less personal. Will this trend continue? To predict the future let’s first review how we got here.
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Even after decades of industry and technology advancements, there still is no universal, integrated storage solution that can reduce risk, enable profitability, eliminate complexity and seamlessly integrate into the way businesses operate and manage data at scale? To reach these goals, there are capabilities that are required to achieve the optimum results at the lowest cost. These capabilities include availability, reliability, performance, density, manageability and application ecosystem integration? This paper outlines a better way to think about storing data at scale—solving these problems not only today, but well into the future?
Tags : 
    
Infinidat EMEA
Published By: Avetta     Published Date: Sep 17, 2019
A new NPR/Marist poll reveals that one in five jobs in the U.S. is held by a worker under contract. In fact, independent contractors could make up half of the entire workforce in the U.S. within the next decade. More and more organizations have begun to see contractors and suppliers as valuable business partners intrinsic to driving service and product innovation. For many companies, especially those operating in highly regulated industries, managing compliance in-house for all of these suppliers can be burdensome. But the cost of non-compliance — in the form of penalties, fines, productivity losses, settlement costs, and inefficiencies — is ruinous. This white paper will discuss: • The hidden costs of ignoring contractor management • Best practices towards holistic compliance and governance • The cost of different contractor management systems • How to get the highest ROI in your supply chain
Tags : 
    
Avetta
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com