enterprises

Results 1 - 25 of 1169Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: -
Enterprise data is growing rapidly - reaching multiple petabytes of data or even billions of files for many organizations. To maximize the business value of this data, enterprises need a storage infrastructure to store, manage, and retrieve a massive amount of data. This ebook shows you how to address large content repository challenges with object storage. You'll learn how to effectively address long-term retention policies, find and retrieve content quickly from long-term repositories and using object storage efficiently.
Tags : object storage, storage infrastructure
     NetApp
By: IBM     Published Date: May 20, 2015
According to our global study of more than 800 cloud decision makers and users are becoming increasingly focused on the business value cloud provides. Cloud is integral to mobile, social and analytics initiatives – and the big data management challenge that often comes with them and it helps power the entire suite of game-changing technologies. Enterprises can aim higher when these deployments are riding on the cloud. Mobile, analytics and social implementations can be bigger, bolder and drive greater impact when backed by scalable infrastructure. In addition to scale, cloud can provide integration, gluing the individual technologies into more cohesive solutions. Learn how companies are gaining a competitive advanatge with cloud computing.
Tags : 
     IBM
By: Storiant     Published Date: Mar 16, 2015
Read this new IDC Report about how today's enterprise datacenters are dealing with new challenges that are far more demanding than ever before. Foremost is the exponential growth of data, most of it unstructured data. Big data and analytics implementations are also quickly becoming a strategic priority in many enterprises, demanding online access to more data, which is retained for longer periods of time. Legacy storage solutions with fixed design characteristics and a cost structure that doesn't scale are proving to be ill-suited for these new needs. This Technology Spotlight examines the issues that are driving organizations to replace older archive and backup-and-restore systems with business continuity and always-available solutions that can scale to handle extreme data growth while leveraging a cloudbased pricing model. The report also looks at the role of Storiant and its long-term storage services solution in the strategically important long-term storage market.
Tags : storiant, big data, analytics implementations, cloudbased pricing model, long-term storage services solution, long-term storage market
     Storiant
By: RedPoint     Published Date: Sep 22, 2014
Enterprises can gain serious traction by taking advantage of the scalability, processing power and lower costs that Hadoop 2.0/YARN offers. YARN closes the functionality gap by opening Hadoop to mature enterprise-class data management capabilities. With a lot of data quality functionality left outside of Hadoop 1, and a lot of data inside HDFS originating outside the enterprise, the quality of the data residing in the Hadoop cluster is sometimes as stinky as elephant dung. Some of the topics discussed in this paper include: • The key features, benefits and limitations of Hadoop 1.0 • The benefit of performing data standardization, identity resolution, and master data management inside of Hadoop. • The transformative power of Hadoop 2.0 and its impact on the speed and cost of accessing, cleansing and delivering high-quality enterprise data. Download this illuminating white paper about what YARN really means to the world of big data management.
Tags : 
     RedPoint
By: MEMSQL     Published Date: Apr 12, 2016
The pace of data is not slowing. Applications of today are built with infinite data sets in mind. As these real-time applications become the norm, and batch processing becomes a relic of the past, digital enterprises will implement memory-optimized, distributed data systems to simplify Lambda Architectures for real-time data processing and exploration.
Tags : 
     MEMSQL
By: MapR Technologies     Published Date: Sep 04, 2013
Enterprises are faced with new requirements for data. We now have big data that is different from the structured, cleansed corporate data repositories of the past. Before, we had to plan out structured queries. In the Hadoop world, we don’t have to sort data according to a predetermined schema when we collect it. We can store data as it arrives and decide what to do with it later. Today, there are different ways to analyze data collected in Hadoop—but which one is the best way forward?
Tags : 
     MapR Technologies
By: Intel     Published Date: Aug 06, 2014
Around the world and across all industries, high-performance computing is being used to solve today’s most important and demanding problems. More than ever, storage solutions that deliver high sustained throughput are vital for powering HPC and Big Data workloads. Intel® Enterprise Edition for Lustre* software unleashes the performance and scalability of the Lustre parallel file system for enterprises and organizations, both large and small. It allows users and workloads that need large scale, high- bandwidth storage to tap into the power and scalability of Lustre, but with the simplified installation, configuration, and monitoring features of Intel® Manager for Lustre* software, a management solution purpose-built for the Lustre file system.Intel ® Enterprise Edition for Lustre* software includes proven support from the Lustre experts at Intel, including worldwide 24x7 technical support. *Other names and brands may be claimed as the property of others.
Tags : 
     Intel
By: Dell and Intel®     Published Date: Aug 24, 2015
Many enterprises are embracing Hadoop because of the unique business benefits it provides. But, until now, this rapidly evolving big data technology hadn’t always met enterprise security needs. In order to protect big data today, organizations must have solutions that address four key areas: authentication, authorization, audit and lineage, and compliant data protection.
Tags : 
     Dell and Intel®
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The tipping point has arrived. Large enterprises are planning their next-generation datacenters around flash-based storage, and for good reason. Flash arrays provide read and write performance that is orders of magnitude faster than spinning media at a total cost of ownership that is on par with disk and will soon be lower. The benefits not only include improved application performance, but more consistent performance, lower latency, reduced storage footprint, streamlined storage administration, and lower operating costs. These advantages are too beneficial to your business to ignore. That’s why flash is becoming the standard for new storage investments.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Very little data is available on how effectively enterprises are managing private cloud deployments in the real world. Are they doing so efficiently, or are they facing challenges in areas such as performance, TCO and capacity? Hewlett Packard Enterprise commissioned 451 Research to explore these issues through a survey of IT decision-makers and data from the Cloud Price Index.
Tags : 
     Hewlett Packard Enterprise
By: Oracle     Published Date: Feb 28, 2018
There is no doubt that enterprise cloud is a new and improved IT strategy. Cloud services have proven to improve organizational agility and reduce the burden of IT infrastructure and cost. Moving to the cloud is no longer a question of “if” but “when” and “how.” Most enterprises we interviewed are moving to cloud in phases over time and matching workloads to their perceptions of a vendor’s cloud capabilities that will best support their objectives. Many will require the ability and flexibility to support multivendor cloud and multiple deployment choices (e.g., public cloud, private cloud, and hybrid cloud).
Tags : cloud, enterprise, scale, infrastructure
     Oracle
By: Juniper Networks     Published Date: May 04, 2018
PwC surveyed 235 IT leaders and interviewed another 35 from large, medium, and small enterprises to understand the buying decisions of IT leaders, across a wide variety of networking components (i.e., switches, SDN, and infrastructure monitoring solutions) within the data center. This report highlights the survey and interview insights to help Enterprise IT leaders understand the trends and implications of multi cloud environments.
Tags : 
     Juniper Networks
By: Google     Published Date: Apr 30, 2018
"In a recent global survey conducted on behalf of Google Cloud in association with MIT SMR Custom Studio, respondents were asked: over the last two years, how has your overall confidence in the security of cloud applications and infrastructure changed? The response was encouraging. 74% of respondents have become more confident in cloud security. The age of unthinking fears about cloud security is over. Not only is cloud adoption rising steadily across geographies, industries and job functions, but confidence in cloud security is rising as well — to the point where increased security is a major reason enterprises opt for cloud solutions. Download this report and find out more."
Tags : 
     Google
By: Sage Software (APAC)     Published Date: May 02, 2018
Forward-looking enterprises are deciding to replace their legacy systems with more modern enterprise management solutions that provide a better way to manage the entire business, at a lower cost and on a global scale. Sage Business Cloud Enterprise Management solution is changing how enterprises compete and grow, by delivering faster, simpler and flexible enterprise management, at a fraction of the cost and complexity of typical enterprise ERP systems. Break free from the constraints of traditional ERP solutions and discover how Sage Business Cloud Enterprise Management can accelerate your business.
Tags : 
     Sage Software (APAC)
By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
     Carbonite
By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organization’s security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
     Carbon Black
By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
     MobileIron
By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : mobile, threat, detection, machine, ransomware, confidential, networks
     MobileIron
By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : global, threat, report, mobile, malware, software, antivirus
     MobileIron
By: Genesys     Published Date: Feb 21, 2018
Artificial intelligence (AI) can’t replicate the human touch, but it can ease your agents’ burden by handling many simple, repetitive requests. A new Forrester Consulting paper offers a look at the strengths and weaknesses of both AI and humans independently, yet how blending them together can give your customers the seamless end-to-end experience they expect. See how enterprises around the world use AI to improve customer service and uncover new revenue streams, the challenges they overcame, and why a blended solution with live agents makes sense. Download the paper to learn three key recommendations on using AI to improve agent productivity, agent satisfaction, and customer satisfaction.
Tags : forrester, artificial intelligence, consulting, customer experience
     Genesys
By: Genesys     Published Date: Feb 21, 2018
In the ongoing evolution of the customer experience, organizations continue to rely on phone and email while introducing new customer engagement channels. With the channel mix rapidly changing, it has become more important than ever to accurately identify and proactively deploy the next-best channels for engaging customers today and tomorrow. Gartner Research has profiled 15 ways that organizations will engage customers over the next 20 years. This includes augmented reality, virtual reality and mixed reality immersive solutions which will be adopted by 20% of large enterprises by 2020. By learning which engagement channels will best meet your customers’ needs in the future and prioritizing those aligned with your business model, you can improve customer engagement and
Tags : gartner, customer engagement, customer experience, gartner research
     Genesys
By: Akamai Technologies     Published Date: May 07, 2018
Learn about Akamai Cloud Security Solutions Akamai’s web application firewall and DDoS solutions include easy-to-deploy, low-maintenance solutions for enterprises.
Tags : identity, theft, revenue, technical, support, data, confidential
     Akamai Technologies
By: Google Chrome Enterprise     Published Date: May 04, 2018
As enterprises contine to adopt web-based apps, users spend more time their web browser than ever before. With Chrome Browser, IT can set a variety of policies to help users be more productive across the web. From enabling security policies that protect users, to making to making it easy to access needed boomarks and extensions, IT can offer users a better browsing experience to support users as they get their job done.
Tags : 
     Google Chrome Enterprise
By: Workday     Published Date: Feb 27, 2018
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business. System complexity is increasing, though. Enterprises deploy more applications to more endpoints than ever before. Hackers have evolved from isolated sociopaths into highly organised groups relying on leading-edge technology. Finally, IT budgets are growing, albeit slowly: International Data Corp. (IDC) expects budgets to increase 3.4% in 2017. So many CIOs are struggling to find the resources needed to ward off attacks.
Tags : business, enterprises, cloud, organisations, cybercrime
     Workday
By: Workday     Published Date: Feb 27, 2018
HCM suites and their individual applications also provide reporting and data as needed by local and international regulations, and often include analytics and dashboard capabilities. Transactional employee and manager self-service have become embedded roles within these solutions, and the ability to support mobile access has also become a fundamental part of these offerings. With increasing frequency, we see the inclusion of tools and applications embedded within HCM technologies to infuse traditional processes with collaboration, and capitalize on approaches that leverage social channels in the workplace to enhance overall user engagement and productivity.
Tags : cloud, hcm, suites, midmarket, enterprises, analytics, employee
     Workday
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com