esp

Results 1 - 25 of 2941Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Dec 13, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson, as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : big data problems, how to get the most from your big data
     NetApp
By: IBM     Published Date: Sep 16, 2015
6 criteria for evaluating a high-performance cloud services providers Engineering, scientific, analytics, big data and research workloads place extraordinary demands on technical and high-performance computing (HPC) infrastructure. Supporting these workloads can be especially challenging for organizations that have unpredictable spikes in resource demand, or need access to additional compute or storage resources for a project or to support a growing business. Software Defined Infrastructure (SDI) enables organizations to deliver HPC services in the most efficient way possible, optimizing resource utilization to accelerate time to results and reduce costs. SDI is the foundation for a fully integrated environment, optimizing compute, storage and networking infrastructure to quickly adapt to changing business requirements, and dynamically managing workloads and data, transforming a s
Tags : 
     IBM
By: Intel     Published Date: Aug 06, 2014
Powering Big Data Workloads with Intel® Enterprise Edition for Lustre* software The Intel® portfolio for high-performance computing provides the following technology solutions: • Compute - The Intel® Xeon processor E7 family provides a leap forward for every discipline that depends on HPC, with industry-leading performance and improved performance per watt. Add Intel® Xeon Phi coprocessors to your clusters and workstations to increase performance for highly parallel applications and code segments. Each coprocessor can add over a teraflops of performance and is compatible with software written for the Intel® Xeon processor E7 family. You don’t need to rewrite code or master new development tools. • Storage - High performance, highly scalable storage solutions with Intel® Lustre and Intel® Xeon Processor E7 based storage systems for centralized storage. Reliable and responsive local storage with Intel® Solid State Drives. • Networking - Intel® True Scale Fabric and Networking technologies – Built for HPC to deliver fast message rates and low latency. • Software and Tools: A broad range of software and tools to optimize and parallelize your software and clusters. Further, Intel Enterprise Edition for Lustre software is backed by Intel, the recognized technical support providers for Lustre, and includes 24/7 service level agreement (SLA) coverage.
Tags : 
     Intel
By: Dell and Intel®     Published Date: Sep 17, 2014
According to the 2014 IDG Enterprise Big Data research report, companies are intensifying their efforts to derive value through big data initiatives with nearly half (49%) of respondents already implementing big data projects or in the process of doing so in the future. Further, organizations are seeing exponential growth in the amount of data managed with an expected increas of 76% within the next 12-18 months. With growth there are opportunities as well as challenges. Among those facing the big data challenge are finance executives, as this extraordinary growth presents a unique opportunity to leverage data assets like never before. * Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : dell and intel, big data for finance
     Dell and Intel®
By: Kx Systems     Published Date: Jan 16, 2015
?Kdb+ is a column-based relational database with extensive in-memory capabilities, developed and marketed by Kx Systems. Like all such products, it is especially powerful when it comes to supporting queries and analytics. However, unlike other products in this domain, kdb+ is particularly good (both in terms of performance and functionality) at processing, manipulating and analysing data (especially numeric data) in real-time, alongside the analysis of historical data. Moreover, it has extensive capabilities for supporting timeseries data. For these reasons Kx Systems has historically targeted the financial industry for trading analytics and black box trading based on real-time and historic data, as well as realtime risk assessment; applications which are particularly demanding in their performance requirements. The company has had significant success in this market with over a hundred major financial institutions and hedge funds deploying its technology. In this paper, however, we wa
Tags : kx systems, kdb+, relational database
     Kx Systems
By: Cask     Published Date: Jun 28, 2016
A recent Gartner survey on Hadoop cited the two biggest challenges in working with Hadoop: “Skills gaps continue to be a major adoption inhibitor for 57% of respondents, while deciding how to get value from Hadoop was cited by 49% of respondents.” Cask is the company that makes building and deploying big data apps easy, allowing for 5 times faster time to value. To find out more, read about Cask Hydrator, a self-service, open source framework that lets data scientists easily develop and operate data pipelines using a graphical interface.
Tags : cask hydrator, hadoop, gartner survey, self-service data lakes
     Cask
By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Businesses of all sizes and industries have struggled to implement a hybrid IT environment that can meet their most critical needs, without disrupting business. The challenge is especially acute for midsized firms whose limited IT resources are facing pressure to adopt a never-ending torrent of technology innovations. In an effort to create a hybrid IT environment, many businesses end up with a multiple siloed infrastructure deployment options that consume increasing amounts of management time, effort and budget, while never quite meeting business needs.
Tags : 
     Hewlett Packard Enterprise
By: IBM APAC     Published Date: Jul 19, 2019
AI applications and especially deep learning systems are extremely demanding and require powerful parallel processing capabilities. IDC research shows that, in terms of core capacity, a large gap between actual and required CPU capability will develop in the next several years. IDC is seeing the worldwide market for accelerated servers grow to $25.6 billion in 2022, with a 31.6% CAGR. Indeed, this market is growing so fast that IDC is forecasting that by 2021,12% of worldwide server value will be from accelerated compute. Download this IDC report to find out why organizations like yours will need to make decisions about replacing existing general-purpose hardware or supplementing it with hardware dedicated to AI-specific processing tasks.
Tags : 
     IBM APAC
By: Stripe     Published Date: Aug 06, 2019
Payments is an increasingly strategic area of focus for enterprises, impacting market expansion, customer experience, business model evolution and, ultimately, revenue growth. As the role of payments in business strategy continues to expand, enterprises need secure, reliable and scalable infrastructure to underpin their transaction acceptance and processing capabilities. Stripe commissioned 451 Research to understand how large enterprise-scale merchants are thinking through their online payments infrastructure requirements. 451 Research surveyed 800 merchants across 8 countries, including a mix of business decision-makers from payments to finance to IT. KEY FINDINGS • 87% of mid- and large-sized businesses surveyed use the cloud as their dominant payments environment. • Nearly two-thirds of respondents using the public cloud for payments have seen improvements in security, innovation and uptime, while nearly three in five cited improved scalability. • Respondents using public-cloud-
Tags : payment security, platform as a service (paas), foreign currency transactions, fraud protection, payment solutions
     Stripe
By: KPMG     Published Date: Sep 04, 2019
Operational resilience is high on the regulatory agenda in the UK. A joint discussion paper in 2018 took a broader view of operational resilience to cover all risks to the provision of critical business services with a greater emphasis on recovery and response when incidents occur. Regulators now place the same importance on operational resilience as on financial resilience. This represents a fundamental shift that companies are at different stages of addressing. Based on discussions with clients and regulators here are ten conversations to help guide you through this new landscape.
Tags : 
     KPMG
By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
     Blackberry
By: Pure Storage     Published Date: Sep 13, 2019
Discover how to revolutionize processing performance, data intelligence, customer experiences, and GRC. The future of financial services will belong to those who can capture and capitalize on data. And it all begins with employing modern data strategies in four critical areas. Description You’ll learn how to: Leverage AI, machine learning and predictive analytics. Get scalable, high-speed access to vast amounts of data. Respond faster, become more competitive, and attract new customers.
Tags : 
     Pure Storage
By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organization’s overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Security’s mos
Tags : 
     Gigamon
By: SES     Published Date: Aug 01, 2019
Este artigo de blog, escrito por nosso VP de Desenvolvimento e Inovação Tecnológicos, apresenta insights de especialistas sobre a revolução da rede 5G. Descubra o impacto que a arquitetura da rede 5G terá na nossa sociedade "hiperconectada" do futuro. Conheça casos de uso como comunicações massivas por máquina, maior largura de banda móvel e comunicações com baixa latência.
Tags : 
     SES
By: ETQ     Published Date: Jul 10, 2019
According to Gartner, "supply chain leaders responsible for quality management are shifting to software solutions that standardize processes, optimize data and ensure compliance. This research provides guidance for structuring a process for QMS software selection." Download this Gartner Analyst Guide to learn: Key challenges in the QMS software selection processes What to expect from different QMS solutions across the market Analysis of the current state of quality management to help define software requirements Self assessment questions and commonly sought QMS system functionalities to use in your decision making process
Tags : 
     ETQ
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Impact: -Substantially reduced administrative time -Accelerated response and remediation process -Increased performance of cloud applications -Reduced time to investigate"
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a layered defence that will give you the ability to quickly respond to breaches. We will cover: - The evolving threat landscape and why prevention-only strategies eventually fail - How to build a strong first line of defence to reduce exposure to threats - Protect your last line of defence with retrospective security - A quick demo of how Cisco Umbrella and AMP for Endpoints work together to contain, detect and remediate threats in real time - An overview of how Incident Response Services can help you with the skills you need to manage a breach
Tags : 
     Cisco Umbrella EMEA
By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
     TIBCO Software
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
     CloudHealth by VMware
By: Tricentis     Published Date: Aug 19, 2019
The way that we develop and deliver software has changed dramatically in the past 5 years—but the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures, and team structures, most organizations still rely on quality metrics that were designed for a much different era. Every other aspect of application delivery has been scrutinized and optimized as we transform our processes for DevOps. Why not put quality metrics under the microscope as well? Are metrics like number of automated tests, test case coverage, and pass/fail rate important in the context of DevOps, where the goal is immediate insight into whether a given release candidate has an acceptable level of risk? What other metrics can help us ensure that the steady stream of updates don’t undermine the very user experience that we’re working so hard to enhance? To provide the DevOps community an objective perspective on what quality
Tags : 
     Tricentis
By: TIBCO Software     Published Date: Jul 22, 2019
The Insurance industry continues to undergo significant transformation, with new technologies, business models, and competitors entering the market at an increasing rate. To be successful in attracting and retaining the most valuable customers, insurance companies must innovate and increase the speed at which they respond to customer demands. Traditionally, the insurance software market was dominated by a handful of specialist vendors with products that were initially expensive, difficult to deploy, costly to maintain, and did not provide the speed needed for today’s market. Now there has been a shift away from these “black box” applications to platforms that allow insurers to make their algorithmic IP available to business users, allowing much faster response to business demands. The algorithmic platform approach also comes at a fraction of the cost of black box solutions, while delivering advanced analytical techniques like Machine Learning and Artificial Intelligence (AI).
Tags : 
     TIBCO Software
By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
City leaders around the world are working to improve the quality of life and increase the number of useful services for their citizens, businesses, and visitors. Smart city initiatives are gaining attention in several countries, as administrators, industry, and citizens are working together to enhance their communities, cities, regions, and nations. After more than ten years of smart city hype, innovative projects have emerged, but few have provided a disruptive impact on the city system itself. Because every city is different, few of the existing models apply universally. An effective response requires leaders to consider a series of prerequisites: • Consider the local culture and the people • Prioritize basic needs and requests • Work at overcoming silos and encourage collaboration across departments • Consider each “smart” initiative as an integral part of an overall city system A smart city reflects a number of aspirations: efficiency, resiliency, connectedness, innovatio
Tags : 
     Amazon Web Services EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com