lan

Results 1 - 25 of 5454Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Dec 13, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson, as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : big data problems, how to get the most from your big data
     NetApp
By: IBM     Published Date: Sep 02, 2014
Advanced analytics strategies yield the greatest benefits in terms of improving patient and business outcomes when applied across the entire healthcare ecosystem. But the challenge of collaborating across organizational boundaries in order to share information and insights is daunting to many stakeholders. In this worldwide survey of 555 healthcare providers, payers and life sciences organizations, you will learn the importance of implementing collaborative analytics strategies that: Manage, integrate and interpret data generated at all stages of the healthcare value chain Achieve the right balance of skills in order to translate data into actionable insights Focus on executive sponsorship and enterprise-wide adoption with metrics to measure and track success Position yourself to harness data, create and share insights, make informed decisions, and improve the performance of the entire healthcare ecosystem in which you operate.
Tags : ibm, analytics acrosss ecosystem
     IBM
By: IBM     Published Date: Sep 02, 2014
Whether in high-performance computing, Big Data or analytics, information technology has become an essential tool in today’s hyper-competitive business landscape. Organizations are increasingly being challenged to do more with less and this is fundamentally impacting the way that IT infrastructure is deployed and managed. In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.
Tags : ibm, ibm platform computing, save money
     IBM
By: IBM     Published Date: May 20, 2015
Whether in high-performance computing, Big Data or analytics, information technology has become an essential tool in today’s hyper-competitive business landscape. Organizations are increasingly being challenged to do more with less and this is fundamentally impacting the way that IT infrastructure is deployed and managed. In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.
Tags : 
     IBM
By: Data Direct Networks     Published Date: Apr 08, 2014
DataDirect Networks (DDN), the largest privately-held provider of high-performance storage, has a large and growing presence in HPC markets. HPC users identify DDN as their storage provider more than any other storage-focused company, with twice the mentions of EMC, and more the twice the mentions of NetApp, Hitachi Data Systems, or Panasas.(5) DDN’s strength in HPC is anchored by its Storage Fusion Architecture (SFA), winner of the HPCwire Editor’s Choice Award for “Best HPC Storage Product or Technology” in each of the past three years. The DDN SFA12KX combines SATA, SAS, and solid-state disks (SSDs) for an environment that can be tailored to a balance of throughput and capacity
Tags : 
     Data Direct Networks
By: MapR Technologies     Published Date: Sep 04, 2013
Enterprises are faced with new requirements for data. We now have big data that is different from the structured, cleansed corporate data repositories of the past. Before, we had to plan out structured queries. In the Hadoop world, we don’t have to sort data according to a predetermined schema when we collect it. We can store data as it arrives and decide what to do with it later. Today, there are different ways to analyze data collected in Hadoop—but which one is the best way forward?
Tags : 
     MapR Technologies
By: Dell APAC     Published Date: May 29, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
     Dell APAC
By: Akamai Technologies     Published Date: Jul 25, 2019
In der heutigen Datenschutzlandschaft steht für Verbrauchermarken viel auf dem Spiel. Ausgeklügelte Cyberangriffe und aufsehenerregende Datenschutzverletzungen können Kundendaten gefährden und das Vertrauen in Ihre Marken schädigen. Um heute erfolgreich zu sein, müssen Ihre Marken eine Strategie für Datensicherheit und Datenschutz implementieren, bei der das Vertrauen der Kunden priorisiert wird. Sind Sie dieser Herausforderung gewachsen? Nutzen Sie die „Datensicherheits- und Datenschutzreifebewertung“ von Forrester Research, um die Kompetenzen Ihrer Marke zu beurteilen und verbesserungswürdige Bereiche zu ermitteln. Dabei erfahren Sie Folgendes: Die vier wichtigsten Kompetenzen für B2C-Marken im Bereich Datensicherheit und Datenschutz ? Ob Sie die empfohlenen Best Practices von Forrester Research erfüllen ? Tipps, wie Sie Ihre Datensicherheitskultur und Ihre Datenschutzkultur zu einem Wettbewerbsvorteil machen können
Tags : 
     Akamai Technologies
By: Verint APAC     Published Date: Aug 01, 2019
For enterprise businesses, the conversations you are having with your customers and employees can help transform your future. At Verint Next IT, we deliver intelligent self-service solutions to help companies elevate the customer experience while driving operational efficiency. We understand that the challenge for many companies exploring AI and automation initiatives lies in knowing the right place to start and also how to grow. That’s why we offer AI Blueprint™. With AI Blueprint and our proven Alme® platform, we ensure that every enterprise succeeds with AI now and in the future. Download the eBook to learn: • What AI Blueprint is, what it does and why it matters • The benefits of Conversational AI and how it is transforming businesses everywhere • Five ways AI Blueprint and our Alme platform help companies thrive with intelligent virtual assistant (IVA) and chatbot solutions
Tags : 
     Verint APAC
By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
     MediaPass
By: 3D Systems     Published Date: May 15, 2019
Die Technologie des selektiven Lasersinterns (SLS) ist das Herzstück eines wachsenden Trends in der Massenfertigung benutzerdefinierter Produkte sowie der Fertigung funktionaler Prototypen. Die richtigen additiven Technologien, Werkstoffe und Oberflächen führen zu einem Wandel in der Fertigung. Die direkte digitale thermoplastische Fertigung bietet außergewöhnliche Qualität und gibt den Weg frei für neuartige Design-Parameter, die mit Spritzguss nicht möglich wären. Die thermoplastische additive Fertigung umgeht auch die lange Vorlaufzeit und Anfangsinvestitionen in Spritzgusswerkzeuge. Wenn Sie Ihre fertigen Teile anhand dreier Dimensionen beurteilen sollten - Qualität, Markteinführungszeit und Kosten pro Kubikzentimeter - bietet industrielles SLS in vielen Situationen die besseren Gesamtwerte.
Tags : 
     3D Systems
By: Conduent     Published Date: Jul 23, 2019
In this eBook, we’ve distilled the key information into a “decision guide” to help you head in the right direction with your technology planning. The guide walks you through the five main options for your technology and overviews the benefits and challenges related to each — so you can weigh the pros and cons and make the best technology choices for your organization. Complete the form at right to get your copy today.
Tags : 
     Conduent
By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
     Entrust Datacard
By: BeyondTrust     Published Date: Jul 29, 2019
Greater visibility and improved integration are vital to tackling the modern threat landscape
Tags : 
     BeyondTrust
By: Schneider Electric     Published Date: Jul 01, 2019
: Are you among the two thirds of industrial companies who are currently, or planning to, implement industrial transformation? A new report by LNS Research finds that there is quite a wide gap in how the companies perceived as industrial transformation leaders develop their transformation project strategies compared with companies perceived as followers. Don’t get left behind. Discover the recommendations from LNS Research on how to ensure the success of your digital transformation initiatives.
Tags : digital, industry 4.0, automation, plant
     Schneider Electric
By: Schneider Electric     Published Date: Jul 01, 2019
As water is increasingly being recognized as a high-value commodity, aging assets present a major threat to organizations that treat and deliver it. Improving asset performance is one of the most effective strategies water and wastewater plants and networks can implement to reduce costs and protect quality.
Tags : water, plant, pump
     Schneider Electric
By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Amazon Web Services EMEA     Published Date: Aug 02, 2019
Artifi cial intelligence is becoming a key component of business transformation. Virtually any business leader seeking to unlock value and develop new capabilities using technology is at some stage of the AI journey. For example, those at the leading edge have incorporated machine learning insights into business processes and are building functionality such as natural language processing and preventative maintenance diagnostics into their products. Others are experimenting with pilot projects or developing plans to get started.
Tags : data, technologies, learning, applications, technology, machine, cloud
     Amazon Web Services EMEA
By: Amazon Web Services EMEA     Published Date: Aug 02, 2019
Companies worldwide are undergoing digital transformations. By modernizing their applications, they can deliver better service to customers, and keep pace in a competitive landscape. In many cases, AWS has helped companies modernize by implementing containers—and initiating cultural shifts— to streamline development. In this eBook, we discuss best practices in containerization and how you can get started today with containers on AWS.
Tags : containers, developers, application, aws
     Amazon Web Services EMEA
By: SES     Published Date: Aug 01, 2019
A divisão digital impede o aproveitamento de todo o potencial das regiões carentes do planeta. Neste artigo, o autor mostra como uma rede 5G pode reduzir drasticamente a divisão digital e melhorar as condições econômicas em todo o mundo. Veja como a tecnologia de satélite pode aumentar a conectividade em regiões carentes e beneficiar a telemedicina, o emprego remoto e as oportunidades em educação.
Tags : 
     SES
By: NTT Ltd.     Published Date: Aug 05, 2019
IT organizations are aggressively defining digital workspace strategies to deliver the agility and user-centric experience their businesses demand. The technology behind a digital workspace is impressive, but it’s important not to lose sight that this approach is a dramatic transformation. Like any major transformation, it requires careful consideration and a well-planned strategy. This whitepaper highlights the key considerations for moving to a digital workspace.
Tags : 
     NTT Ltd.
By: Riskified     Published Date: Aug 06, 2019
As the global eCommerce market grows and fraudster methodology evolves, new fraud management approaches and tools are being introduced at a fast pace. Trying to stay on top of developments in the eCommerce fraud prevention landscape can be overwhelming and time consuming. Riskified is proud to present the eCommerce Fraud Solution Buyer’s Kit, a comprehensive series of resources designed to guide executives, decision makers, and procurement professionals through the process of assessing current fraud management performance and understanding which available approaches and solutions can best meet their needs.
Tags : 
     Riskified
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com