data information

Results 1 - 25 of 823Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Dec 13, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson, as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : big data problems, how to get the most from your big data
     NetApp
By: NetApp     Published Date: Dec 19, 2013
SAP HANA enables real-time access to mission-critical, business data and thus, revolutionizes the way existing information can be utilized to address ever changing business requirements. This whitepaper describes both the business and technical benefits of implementing the Cisco UCS with NetApp Storage for SAP HANA solution.
Tags : 
     NetApp
By: IBM     Published Date: Sep 02, 2014
Whether in high-performance computing, Big Data or analytics, information technology has become an essential tool in today’s hyper-competitive business landscape. Organizations are increasingly being challenged to do more with less and this is fundamentally impacting the way that IT infrastructure is deployed and managed. In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.
Tags : ibm, ibm platform computing, save money
     IBM
By: IBM     Published Date: May 20, 2015
Whether in high-performance computing, Big Data or analytics, information technology has become an essential tool in today’s hyper-competitive business landscape. Organizations are increasingly being challenged to do more with less and this is fundamentally impacting the way that IT infrastructure is deployed and managed. In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.
Tags : 
     IBM
By: IBM     Published Date: Feb 13, 2015
In the age of "big data," it's essential for any organization to know how to analyze and manage their ever increasing stores of information. Packed with everything you need to know about Hadoop analytics, this handy guide provides you with a solid understanding of the critical big data concepts and trends, and suggests ways for you to revolutionize your business operations through the implementation of cost-effective, high performance Hadoop technology.
Tags : 
     IBM
By: Dell and Intel®     Published Date: Aug 24, 2015
In today’s digitally driven world, the success of a business is increasingly tied to its ability to extract value from data. Exploiting the untapped value of your data is now the pathway to success. By putting data-driven decision making at the heart of the business, your organization can harness a wealth of information to gain an unparalleled competitive advantage. In a future-ready enterprise, you must make a fundamental shift from a focus on technology to a strategic business focus. Data-driven insights can guide everything from the formulation of top-level corporate strategies to connected devices that monitor and enable immediate critical decisions, to the creation of personalized customer interactions. Data is the foundation for enabling business transformation and innovation.
Tags : 
     Dell and Intel®
By: Dell and Intel®     Published Date: Aug 24, 2015
This business-oriented white paper summarizes the wide-ranging benefits of the Hadoop platform, highlights common data processing use cases and explores examples of specific use cases in vertical industries. The information presented here draws on the collective experiences of three leaders in the use of Hadoop technologies—Dell and its partners Cloudera® and Intel®.
Tags : 
     Dell and Intel®
By: BitStew     Published Date: May 26, 2016
The heaviest lift for an industrial enterprise is data integration, the Achilles’ heel of the Industrial Internet of Things (IIoT). Companies are now recognizing the enormous challenge involved in supporting Big Data strategies that can handle the data that is generated by information systems, operational systems and the extensive networks of old and new sensors. To compound these issues, business leaders are expecting data to be captured, analyzed and used in a near real-time to optimize business processes, drive efficiency and improve profitability. However, integrating this vast amount of dissimilar data into a unified data strategy can be overwhelming for even the largest organizations. Download this white paper, by Bit Stew’s Mike Varney, to learn why a big data solution will not get the job done. Learn how to leverage machine intelligence with a purpose-built IIoT platform to solve the data integration problem.
Tags : 
     BitStew
By: TIBCO Software APAC     Published Date: May 31, 2018
Integration is the lifeblood of today’s digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements.
Tags : 
     TIBCO Software APAC
By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : data analytics, data storytelling, business intelligence
     IBM
By: IBM     Published Date: Jul 09, 2018
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions. In search of instant analytical insights, businesses often prioritize data access and analysis over governance and quality. However, without ensuring the data is trustworthy, complete and consistent, leaders cannot be confident their decisions are rooted in facts and reality
Tags : 
     IBM
By: Workday UK     Published Date: Mar 08, 2018
It’s no small feat for CIOs to balance efforts to support agility, contain IT costs, and keep data safe and secure. Moving to the cloud delivers on those first two priorities, but what about security? Can the cloud really keep your information safe? In the CIO.com report “Demystifying Cloud Security,” you’ll learn why the cloud is your best bet for data security and discover additional benefits your business could experience by moving to the cloud. Read the report to learn more.
Tags : 
     Workday UK
By: Workday UK     Published Date: Mar 15, 2018
For both finance and HR, this separation is often driven by organizational obstacles, disparate systems and data sources, regulatory uncertainty, and a lack of complete visibility into the business. As Joseph Fanutti, CFO of Bill Gosling Outsourcing, says of his own organization’s challenges, “Finance operated its own silo, HR its own, operations its own. There was a lack of consistency in terms of how we viewed the business.” He recalls, “Numbers were always challenged, no one could agree on metrics, and people couldn’t agree on what actions to take going forward.” If this situation sounds familiar, that’s because it’s commonplace across organizations the world over. Strategic uncertainty and incomplete data are symptoms of a larger problem: a lack of unification among finance, HR, and operations teams. Managers need to make financial and people decisions in tandem, yet traditional systems store this information independently. This separation creates multiple versions of the same u
Tags : 
     Workday UK
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
     Ounce Labs, an IBM Company
By: Attivio     Published Date: Aug 20, 2010
With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.
Tags : attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob
     Attivio
By: Attivio     Published Date: Aug 20, 2010
Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.
Tags : attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob
     Attivio
By: ASG Software Solutions     Published Date: Jun 09, 2009
Improved business productivity often requires more efficient IT and more efficient IT cannot be achieved without a better understanding of the way business services are run and delivered. Configuration Management Databases (CMDBs) have emerged as a central component for Information Technology Infrastructure Library (ITIL) and business service management (BSM).
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
     ASG Software Solutions
By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
     CrowdStrike
By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     Cylance
By: Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : artificial, intelligence, enterprise
     Cylance
By: Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : data, gdpr, global, nationally, cybercriminals
     Cylance
By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : zoominfo, sales, marketing, pipeline, conversion rates
     ZoomInfo
By: Zynapse     Published Date: Jun 16, 2010
Data Governance has emerged as the point of convergence for people, technology and process in order to manage the crucial data (information) of an enterprise. This is a vital link in the overall ongoing data management process for it maintains the quality of data and makes it available to a wide range of decision making hierarchy across an organization
Tags : zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
     Zynapse
By: Zynapse     Published Date: Sep 10, 2010
A whitepaper by Ventana Research discusses the need to combine business and technology in a unified approach for MDM implementations in diverse areas.
Tags : zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
     Zynapse
By: Zynapse     Published Date: Sep 10, 2010
A whitepaper by Ventana Research describing the role and importance of partnerships between business and IT in MDM strategy
Tags : zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
     Zynapse
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com