practices

Results 1 - 25 of 3306Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 02, 2014
Research teams using next-generation sequencing (NGS) technologies face the daunting challenge of supporting compute-intensive analysis methods against petabytes of data while simultaneously keeping pace with rapidly evolving algorithmic best practices. NGS users can now solve these challenges by deploying the Accelrys Enterprise Platform (AEP) and the NGS Collection on optimized systems from IBM. Learn how you can benefit from the turnkey IBM Application Ready Solution for Accelrys with supporting benchmark data.
Tags : ibm, accelrys, turnkey ngs solution
     IBM
By: IBM     Published Date: Sep 02, 2014
With tougher regulations and continuing market volatility, financial firms are moving to active risk management with a focus on counterparty risk. Firms are revamping their risk and trading practices from top to bottom. They are adopting new risk models and frameworks that support a holistic view of risk. Banks recognize that technology is critical for this transformation, and are adding state-of-the-art enterprise risk management solutions, high performance data and grid management software, and fast hardware. Join IBM Algorithmics and IBM Platform Computing to gain insights on this trend and on technologies for enabling active "real-time" risk management.
Tags : 
     IBM
By: IBM     Published Date: May 20, 2015
Every day, the world creates 2.5 quintillion bytes of data and businesses are realizing tangible results from investments in big data analytics. IBM Spectrum Scale (GPFS) offers an enterprise class alternative to Hadoop Distributed File System (HDFS) for building big data platforms and provides a range of enterprise-class data management features. Spectrum Scale can be deployed independently or with IBM’s big data platform, consisting of IBM InfoSphere® BigInsights™ and IBM Platform™ Symphony. This document describes best practices for deploying Spectrum Scale in such environments to help ensure optimal performance and reliability.
Tags : 
     IBM
By: IBM     Published Date: Sep 16, 2015
Building applications for handling big data requires laser-like focus on solutions that allow you to deliver scalable, reliable and flexible infrastructure for fast-growing analytics environments. This paper provides 6 best practices for selecting the “right” infrastructure—one that is optimized for performance, flexibility and long-term value.
Tags : 
     IBM
By: IBM     Published Date: Nov 14, 2014
Every day, the world creates 2.5 quintillion bytes of data and businesses are realizing tangible results from investments in big data analytics. IBM Spectrum Scale (GPFS) offers an enterprise class alternative to Hadoop Distributed File System (HDFS) for building big data platforms and provides a range of enterprise-class data management features. Spectrum Scale can be deployed independently or with IBM’s big data platform, consisting of IBM InfoSphere® BigInsights™ and IBM Platform™ Symphony. This document describes best practices for deploying Spectrum Scale in such environments to help ensure optimal performance and reliability.
Tags : 
     IBM
By: Hitachi EMEA     Published Date: Nov 11, 2019
Read this white paper to consider three phases of successful cloud migration, what IT teams need to consider at each step, the business aspect of design decisions, best practices and how REAN Cloud Migration Services from Hitachi Vantara can help.
Tags : 
     Hitachi EMEA
By: ServiceNow     Published Date: Oct 23, 2019
AIOps can dramatically improve the IT organization’s ability to be an effective partner to the business. An IT operations platform with built?in AIOps capabilities like ServiceNow® can help IT operations proactively identify potential issues with the services and technology it delivers to the business and correct them before they become problems. Read this whitepaper to learn best practices for adopting AIOps.
Tags : servicenow, it operations, technology, aiops
     ServiceNow
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 13, 2019
"The practices of continuous integration, continuous delivery, and continuous deployment offer the promise of safer, faster, and more efficient software development. Critical to realizing this promise is the integration of application delivery and security services into the development and deployment workflows. F5 offers the platform, the integration, and the training to insert industry-leading application protection and optimization services into workflows so that software can be built, tested, and deployed with the services it needs to be secure, fast, and available. Download the solution guide to get all the details. "
Tags : 
     F5 Networks Singapore Pte Ltd
By: Nextgen     Published Date: Sep 25, 2019
Your practice can save time and money by delivering on patient expectations. You can better keep up with regulatory demands and reporting requirements—and avoid unsatisfied and unresponsive patients—when you employ best practices that address patient needs. In this eBook, you’ll learn strategies to avoid missed revenue and save staff effort by using smart efficiency improvements, such as checking insurance information up front. You’ll also learn how you can get back to caring for patients, not chasing payments—and the secret to achieving strong financial outcomes. Finally, you’ll discover how you can get paid quickly, easily, and fully—all while addressing your patient demands for an improved, more efficient experience.
Tags : 
     Nextgen
By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : black duck software, open source, platform, sap, multi-source, code, source, intellectual property
     Black Duck Software
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Aug 22, 2019
In today’s fast-moving, competitive environment, companies are migrating to Microsoft Azure to increase their agility and decrease their time to market. While the payoff for adopting Azure can be great, many are finding it difficult to reach the cloud and business success they originally hoped for. It’s common for organizations investing in Azure to encounter numerous roadblocks early in their cloud journey, including monthly bills exponentially higher than anticipated and underutilized resources. For organizations looking to reach cloud maturity—where cost and performance are optimized, security and compliance best practices are established, and one’s environment is governed by policy-driven automation—gaining control of their Azure infrastructure is crucial. The goal of this eBook is to help with just that. For those of considering Azure or who are currently in the migration phase of your Azure cloud journey, we offer insight and expert best practices to make the early stages of your
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
     CloudHealth by VMware
By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
The needs of your facilities and buildings can vary. IBM TRIRIGA can add value across all dimensions of a building. It can help optimize your space, improve energy usage and maintenance efforts, ensure the success of capital projects, and whip your lease accounting practices into shape. Learn the insights and benefits IBM TRIRIGA can provide you in better optimizing your organization’s space, maintenance efforts, energy usage, and more. Download this demo to learn more about each of these critical areas.
Tags : 
     Group M_IBM Q4'19
By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
Watch a demo to see how IBM Maximo can help boost uptime, operational performance, and transformation in your EAM practices.
Tags : 
     Group M_IBM Q4'19
By: Group M_IBM Q4'19     Published Date: Oct 01, 2019
Watch a demo to see how IBM Maximo can help maximize uptime, boost operational performance and accelerate transformation in your enterprise asset management practices.
Tags : 
     Group M_IBM Q4'19
By: Avetta     Published Date: Sep 17, 2019
A new NPR/Marist poll reveals that one in five jobs in the U.S. is held by a worker under contract. In fact, independent contractors could make up half of the entire workforce in the U.S. within the next decade. More and more organizations have begun to see contractors and suppliers as valuable business partners intrinsic to driving service and product innovation. For many companies, especially those operating in highly regulated industries, managing compliance in-house for all of these suppliers can be burdensome. But the cost of non-compliance — in the form of penalties, fines, productivity losses, settlement costs, and inefficiencies — is ruinous. This white paper will discuss: • The hidden costs of ignoring contractor management • Best practices towards holistic compliance and governance • The cost of different contractor management systems • How to get the highest ROI in your supply chain
Tags : 
     Avetta
By: Resolver     Published Date: Nov 01, 2019
Based on what Resolver has learned by working with hundreds of security leaders, they’ve found there isn’t a one size fits all model for creating workflows that effectively responds to every security incident. Even within an organization, not every incident will be able to go through the same process. That’s why they’ve developed an incident workflow template for your corporate security team. This a great framework to get you thinking about the various stages that could be involved in a single incident. Download this resource to uncover: - Best practices on how to keep incident submission simple to ensure adoption across the organization - Important factors to consider for the portal and triage step of incident submission - How to include notification and task assignment to your incident workflow - A sample list of key metrics used by industry-leading security professionals - Plus! Get a free printable incident workflow template that you can use with your team
Tags : 
     Resolver
By: Resolver     Published Date: Nov 01, 2019
Together with ASIS International, Resolver polled corporate security professionals in the ASIS community about the state of security management in 2019. Based on the results, Resolver examined current practices and trends in the systems and technologies involved with managing incidents and assessing threats. Watch this webinar for access to the survey results where Resolver identified the top incidents organizations face, where security teams are planning technology improvements or upgrades, and how they use incident management to assess future threats. You’ll walk away with the information you need to benchmark your team, as well as practical tactics to collect relevant data to help allocate and maximize your security budget for 2020.
Tags : 
     Resolver
By: Jamf     Published Date: Aug 06, 2019
As a new generation of employees hit the workforce, a user-centric technology trend has begun to take shape. The question is how does IT shift their practices to embrace the trend toward this modern technology experience? Download this e-book for answers and learn: • The origins of the user-centric trend • Apple's role in evolving IT practices • Ways to implement and benefit from this new IT model
Tags : 
     Jamf
By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
     CheckMarx
By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : bell micro, sap application, best practices, ibm xiv, storage system
     Bell Micro
By: Workday     Published Date: Oct 22, 2019
Read this eBook to learn how seven CFOs from midsize organizations are supercharging their financial reporting and leveraging real-time data. This eBook covers best practices and tips they have learned in their careers around data driven decisions and reporting.
Tags : 
     Workday
By: athenahealth     Published Date: Sep 26, 2019
Telehealth lets practices quickly provide consultations, assessments, and test results, while saving patients a trip to the office. Now, the Centers for Medicare and Medicaid Services (CMS) plan to significantly expand reimbursement rules for telemedicine. Find out which additional reimbursements have been proposed, and see what healthcare professionals say about the changes, in this in-depth article from athenaInsight.
Tags : 
     athenahealth
By: Amazon Web Services EMEA     Published Date: Nov 05, 2019
Today, deep learning is at the forefront of most machine learning implementations across a broad set of business verticals. Driven by the highly flexible nature of neural networks, the boundary of what is possible has been pushed to a point where neural networks outperform humans in a variety of tasks, such as classifying objects in images or mastering video games in a matter of hours. This guide outlines the end-to-end deep learning process implemented on Amazon Web Services (AWS). We discuss challenges in executing deep learning projects, highlight the latest and greatest technology and infrastructure offered by AWS, and provide architectural guidance and best practices along the way. This paper is intended for deep learning research scientists, deep learning engineers, data scientists, data engineers, technical product managers, and engineering leaders.
Tags : 
     Amazon Web Services EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com