best practices

Results 1 - 25 of 2565Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 02, 2014
Research teams using next-generation sequencing (NGS) technologies face the daunting challenge of supporting compute-intensive analysis methods against petabytes of data while simultaneously keeping pace with rapidly evolving algorithmic best practices. NGS users can now solve these challenges by deploying the Accelrys Enterprise Platform (AEP) and the NGS Collection on optimized systems from IBM. Learn how you can benefit from the turnkey IBM Application Ready Solution for Accelrys with supporting benchmark data.
Tags : ibm, accelrys, turnkey ngs solution
     IBM
By: IBM     Published Date: May 20, 2015
Every day, the world creates 2.5 quintillion bytes of data and businesses are realizing tangible results from investments in big data analytics. IBM Spectrum Scale (GPFS) offers an enterprise class alternative to Hadoop Distributed File System (HDFS) for building big data platforms and provides a range of enterprise-class data management features. Spectrum Scale can be deployed independently or with IBM’s big data platform, consisting of IBM InfoSphere® BigInsights™ and IBM Platform™ Symphony. This document describes best practices for deploying Spectrum Scale in such environments to help ensure optimal performance and reliability.
Tags : 
     IBM
By: IBM     Published Date: Sep 16, 2015
Building applications for handling big data requires laser-like focus on solutions that allow you to deliver scalable, reliable and flexible infrastructure for fast-growing analytics environments. This paper provides 6 best practices for selecting the “right” infrastructure—one that is optimized for performance, flexibility and long-term value.
Tags : 
     IBM
By: IBM     Published Date: Nov 14, 2014
Every day, the world creates 2.5 quintillion bytes of data and businesses are realizing tangible results from investments in big data analytics. IBM Spectrum Scale (GPFS) offers an enterprise class alternative to Hadoop Distributed File System (HDFS) for building big data platforms and provides a range of enterprise-class data management features. Spectrum Scale can be deployed independently or with IBM’s big data platform, consisting of IBM InfoSphere® BigInsights™ and IBM Platform™ Symphony. This document describes best practices for deploying Spectrum Scale in such environments to help ensure optimal performance and reliability.
Tags : 
     IBM
By: Akamai Technologies     Published Date: Nov 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
     Akamai Technologies
By: Workday Nordics     Published Date: Sep 19, 2018
If you want to move key applications to the cloud but don't know the best way to do it, this report is for you. Get insight and best practices from nearly 450 IT leaders across the globe who have successfully made a smooth migration. Download the report.
Tags : workday, workday technology, digital strategy, cloud solutions
     Workday Nordics
By: Google     Published Date: Oct 26, 2018
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
     Google
By: Workday UK     Published Date: Sep 18, 2018
If you want to move key applications to the cloud but don't know the best way to do it, this report is for you. Get insight and best practices from nearly 450 IT leaders across the globe who have successfully made a smooth migration. Download the report.
Tags : 
     Workday UK
By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
     Mimecast
By: ServiceNow     Published Date: Oct 22, 2018
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : service, business, infrastructure, remotely, servicenow
     ServiceNow
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Ransomware is the fastest growing malware threat today. Utilize these security best practices and risk mitigation strategies to improve your overall security posture. Discover how to: • Reduce risk of ransomware • Get immediate protection against attacks • Prevent malware from spreading laterally To find out how to keep your business protected, we recommend Ransomware Defense For Dummies.
Tags : 
     Cisco Umbrella EMEA
By: Paxata     Published Date: Nov 14, 2018
This eBook provides a step-by-step best practices guide for creating successful data lakes.
Tags : data lakes, governance, monetization
     Paxata
By: Lookout     Published Date: Dec 03, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
     Lookout
By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
     Lookout
By: Applause Israel     Published Date: Sep 25, 2018
Startups with digital products are not commonly known to pursue small dreams. Once the basic idea of the product is designed and the industry niche has been identified, leadership is already thinking hard about where and to how many markets the product should be rolled out. The mission is critical: the product must clearly create added value for the user in the local market while reflecting the needs of their local community. The challenge is making those changes in each market without losing sight of the basic idea of the product. The success story of German ecommerce startup Yalwa - The Local Internet Company details three best practices on how young startups can realize the dream of a localized, and thus globally-positioned, digital product.
Tags : 
     Applause Israel
By: Spredfast     Published Date: Nov 15, 2018
How Top Brands Automate Social Service Practices Today’s conversational commerce requires brands to provide immediate answers to their customers’ questions. Chatbots and artificial intelligence are fast becoming critical tools for customer service, bringing speed and scale that ensures a superior experience. But what are the best practices that marketers need to know to tackle the challenges of customer service automation? ?Learn from experts from General Motors, Booking.com and Spredfast about how to bring automation into your CX workflows and bolster your social service strategies. You’ll find out: How to think about automation for your business? How chatbots enhance your agent workflows?? ??How Booking.com and GM are using AI to drive inspiration and customer? service efficiencies??
Tags : 
     Spredfast
By: CheckMarx     Published Date: Nov 02, 2018
As DevOps continues to be widely adopted by fast-moving organizations, software security needs to keep pace to help accelerate software delivery and not slow it down. Is your software security program up to the challenge? By integrating security into the entire software development lifecycle, enterprises can manage their business risk and guarantee secure software delivery at the speed of DevOps. Check out these 10 Essential Best Practices for building and maintaining your modern-day software security program -- from your tools, to your processes, to your people. This eBook will cover the top 10 steps you can take today to help your organization move faster and more securely.
Tags : 
     CheckMarx
By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : black duck software, open source, platform, sap, multi-source, code, source, intellectual property
     Black Duck Software
By: Kindred Hospital Rehabilitation Services     Published Date: Dec 04, 2018
• In today’s rapidly evolving healthcare environment, providers are faced with more challenges than ever when running acute rehabilitation programs. From treating the right patient at the right time to costly reimbursement battles, there is no shortage of issues that can interfere with delivering the best level of care. Addressing these problems is especially urgent when it comes to treating highly acute patients. To succeed, providers must learn strategies for overcoming the two most daunting obstacles: patient access and reimbursement. This guide examines the best practices for meeting these challenges.
Tags : rehabilitation, technology, innovation, patient engagement, healthcare, patient motivation
     Kindred Hospital Rehabilitation Services
By: Workday     Published Date: Oct 11, 2018
Get insight from 12 successful CEOs of midsize companies as they reveal best practices on how to recruit the right employees and cultivate a happy, productive workforce. Also included is an interview with Workday Chief People Officer Ashley Goldsmith on how to ensure top talent finds their way to your organization, and what you can do to keep them there.
Tags : 
     Workday
By: Jamf     Published Date: Nov 05, 2018
Let’s take a look at the “who needs access to what and when” scenario that often leaves schools wondering what to do with the apps once a student graduates or drops a class, or how to get new students the resources they need the minute they turn on their device. If you’ve ever wanted a tutorial on best practices for app management, download this e-book for guidance on quickly going from app purchase to deployment.
Tags : 
     Jamf
By: Workday     Published Date: Sep 17, 2018
If you want to move key applications to the cloud but don't know the best way to do it, this report is for you. Get insight and best practices from nearly 450 IT leaders across the globe who have successfully made a smooth migration. Download the report.
Tags : 
     Workday
By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : bell micro, sap application, best practices, ibm xiv, storage system
     Bell Micro
By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
     Great Bay Software
By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
     Great Bay Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com