business application

Results 1 - 25 of 1397Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 02, 2014
In today’s stringent financial services regulatory environment with exponential growth of data and dynamic business requirements, Risk Analytics has become integral to businesses. IBM Algorithmics provides very sophisticated analyses for a wide range of economic scenarios that better quantify risk for multiple departments within a firm, or across the enterprise. With Algorithmics, firms have a better handle on their financial exposure and credit risks before they finalize real-time transactions. But this requires the performance and agility of a scalable infrastructure; driving up IT risk and complexity. The IBM Application Ready Solution for Algorithmics provides an agile, reliable and high-performance infrastructure to deliver trusted risk insights for sustained growth and profitability. This integrated offering with a validated reference architecture delivers the right risk insights at the right time while lowering the total cost of ownership.
Tags : ibm, it risk, financial risk analytics
     IBM
By: Impetus     Published Date: Mar 15, 2016
Streaming analytics platforms provide businesses a method for extracting strategic value from data-in-motion in a manner similar to how traditional analytics tools operate on data-at rest. Instead of historical analysis, the goal with streaming analytics is to enable near real-time decision making by letting companies inspect, correlate and analyze data even as it flows into applications and databases from numerous different sources. Streaming analytics allows companies to do event processing against massive volumes of data streaming into the enterprise at high velocity.
Tags : impetus, guide to stream analytics, real time streaming analytics, streaming analytics, real time analytics, big data analytics
     Impetus
By: RedPoint     Published Date: Sep 22, 2014
The emergence of YARN for the Hadoop 2.0 platform has opened the door to new tools and applications that promise to allow more companies to reap the benefits of big data in ways never before possible with outcomes possibly never imagined. By separating the problem of cluster resource management from the data processing function, YARN offers a world beyond MapReduce: less encumbered by complex programming protocols, faster, and at a lower cost. Some of the topics discussed in this paper include: • Why is YARN important for realizing the power of Hadoop for data integration, quality and management? • Benchmark results of MapReduce vs. Pig vs. visual “data flow” design tools • The 3 key features of YARN that solve the complex problems that prohibit businesses from gaining maximum benefit from Hadoop. Download this paper to learn why the power of Hadoop 2.0 lies in enabling applications to run inside Hadoop, without the constraints of MapReduce.
Tags : 
     RedPoint
By: Adaptive Computing     Published Date: Feb 27, 2014
Big data applications represent a fast-growing category of high-value applications that are increasingly employed by business and technical computing users. However, they have exposed an inconvenient dichotomy in the way resources are utilized in data centers. Conventional enterprise and web-based applications can be executed efficiently in virtualized server environments, where resource management and scheduling is generally confined to a single server. By contrast, data-intensive analytics and technical simulations demand large aggregated resources, necessitating intelligent scheduling and resource management that spans a computer cluster, cloud, or entire data center. Although these tools exist in isolation, they are not available in a general-purpose framework that allows them to inter operate easily and automatically within existing IT infrastructure.
Tags : 
     Adaptive Computing
By: Intapp     Published Date: May 10, 2019
The Cornerstone of Financial Control Time equals money. Time plus data equals control. All professionals, whether in management, consulting, engineering, or accounting, must be confident that their value is reflected in their bottom line. One of the primary factors driving that compensation is the amount of time spent on a particular subject or client. But too often front line earners at those firms don’t provide the clean, data-rich timesheets needed to accurately gauge the effort required by each project.
Tags : business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
     Intapp
By: Rackspace     Published Date: May 09, 2019
Insights into avoiding migration regret amongst CxO’s: The decision to move business workloads and applications to the cloud impacts all parts of the business and isn’t a decision isolated to the IT team. Our latest research study on the different motives, concerns and experiences of executive peers and business stakeholders when securing buy-in for a strategic IT move found 97% of C-level executives in ANZ suffered from migration regret during their first cloud migration. Packed with telling hindsight, over 200 c-suite executives shared their expectations and experiences during the cloud migration journey. They reveal what they would have done differently - namely enhanced communication and a clear plan of action - and offer practical advice to help others get buy-in internally and secure funding to support a move to the cloud.
Tags : 
     Rackspace
By: IBM APAC     Published Date: May 14, 2019
Digital transformation (DX) continues to headline business initiatives as companies look to remain competitive in the rapidly changing IT landscape. Organizations are increasingly investing in and implementing next-generation applications and architectures such as software-defined IT and hybrid IT to drive higher levels of efficiency and agility. These modern technologies and architectures, however, also require organizations to evolve their underlying infrastructure to support new capabilities and demands. Recent strength in the server market, which continues to operate in a marketwide refresh cycle, illustrates the growing demand for new infrastructure. 1Q18 marked the server market's fifth consecutive quarter of both shipment and revenue growth and represented a fourth consecutive quarter of year-on-year ASP growth, as customers continue to replace aging server infrastructure with more powerful and efficient systems that leverage the latest platform developments from processor supp
Tags : 
     IBM APAC
By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
     Group M_IBM Q2'19
By: Genesys     Published Date: Feb 12, 2019
Everyone says they’re “in the cloud,” but most technology leaders would agree that not all clouds are created equal. When evaluating a cloud contact centre solution for your business, it’s important to understand the difference between a true Cloud 2.0 application and traditional software, including which features to look for and why those features are important. Download this eBook and learn: How a true Cloud 2.0 model is built to provide levels of reliability, scalability, flexibility and security that that far exceed those of previous generations The benefits of utilising a platform built on microservices architecture How to take your business to the next level with a built to scale cloud contact centre platform
Tags : 
     Genesys
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Motorola Solutions     Published Date: Apr 26, 2019
In today’s competitive marketplace, an unexpected outage can easily lead to missed deadlines, frustrated customers, reduced orders, and debilitating long-term damage to your business. In the constant battle to minimize downtime and eliminate waste, a unified Team Communications platform can be an invaluable weapon. Motorola Solutions is here to help. Our Team Communications solution takes push-to-talk (PTT) beyond the boundaries of radio, allowing your employees to communicate instantly, from anywhere, and from any device, all while leveraging intelligence from a wide range of applications. Help your business succeed, keep your employees safe from harm, and ensure production lines remain in constant motion by connecting your entire facility with voice and data.
Tags : 
     Motorola Solutions
By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
     Coyote Point Systems
By: Rackspace     Published Date: May 15, 2019
More and more enterprises like yours are moving critical business applications to AWS as part of a digital transformation strategy, but many don't know where to start. Getting out of your data center and onto AWS can provide significant business benefits, including improved agility, enhanced scalability and cost savings. But are you realizing the full benefit of a move to the AWS cloud?
Tags : 
     Rackspace
By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc, service oriented communications
     NEC
By: Pure Storage     Published Date: Apr 15, 2019
This year, businesses will increasingly turn to AI to power their business transformation. Machine learning and deep learning workloads are quickly becoming a mission-critical workload in the enterprise data center. As an IT leader, are you ready for the impending wave of AI applications that will demand new approaches to computing, storage and networking? Do you have the right strategy for scaling AI workload in your data center? We’ll introduce you to the IT visionaries who have made it happen. In this webinar we’ll explore how one IT leader accelerated his company’s success with an AI infrastructure strategy, sharing their best practices and insights. By watching this webinar, you'll learn: - Why it’s now critical for enterprise IT to have an AI infrastructure strategy that supports the business - Explore one IT leader’s experience developing and implementing a best-of-breed platform for scaling AI workload in the data center - Gain insights that can drive your AI infrastructur
Tags : 
     Pure Storage
By: Attivio     Published Date: Aug 20, 2010
Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.
Tags : attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob
     Attivio
By: ASG Software Solutions     Published Date: Nov 09, 2009
Composite applications can provide multiple benefits, such as business agility, better utilization of business software assets through code reuse, development efficiencies, and cost optimization. Once companies are skilled at deploying them, many find that they roll out new applications and integrations faster, while maximizing the value of "tried and true" software components.
Tags : asg, cmdb, bsm, itil, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : application modernization, forrester consulting, apo, asg, application portfolio optimization
     ASG Software Solutions
By: SAP     Published Date: Feb 03, 2017
The SAP HANA platform provides a powerful unified foundation for storing, processing, and analyzing structured and unstructured data. It funs on a single, in-memory database, eliminating data redundancy and speeding up the time for information research and analysis.
Tags : 
     SAP
By: Spectrum Enterprise     Published Date: Feb 07, 2018
How Fiber Powers Growth – An Expert Q&A Guide provided by Spectrum Enterprise. Businesses today need bandwidth capacity to handle complex applications and ever-increasing data. See how technology experts rely on fiber to increase productivity and provide stronger growth opportunities.
Tags : 
     Spectrum Enterprise
By: HPE & Intel®     Published Date: Oct 10, 2016
Download this whitepaper now to find out more about the best practices for setting the right disaster recovery strategy for your organisation.
Tags : 
     HPE & Intel®
By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : infrastructure, devops, agile, hpe, it transformation, enterprise
     HPE APAC
By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
     Red Hat
By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
     Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com