reach

Results 1 - 25 of 1330Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: -
Enterprise data is growing rapidly - reaching multiple petabytes of data or even billions of files for many organizations. To maximize the business value of this data, enterprises need a storage infrastructure to store, manage, and retrieve a massive amount of data. This ebook shows you how to address large content repository challenges with object storage. You'll learn how to effectively address long-term retention policies, find and retrieve content quickly from long-term repositories and using object storage efficiently.
Tags : object storage, storage infrastructure
     NetApp
By: Solix     Published Date: Aug 03, 2015
Every CIO want to know if their infrastructure will handle it when data growth reaches 40 zettabytes by 2020. When data sets become to large, application performance slows and infrastructure struggles to keep up. Data growth drives increases cost and complexity everywhere, including power consumption, data center space, performance and availability. To find out more download the Gartner study now.
Tags : 
     Solix
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Discover how HPE is responding to the massive growth in enterprise data with intelligent storage. Data helps enterprises find new ways to reach and serve customers to grow profitability, but only when it is available at the right place and the right time. The growing complexity of managing and securing data prevents businesses from gaining its full value. Hewlett Packard Enterprise delivers the world’s most intelligent storage for the hybrid cloud world by providing storage that is driven by artificial intelligence, built for the cloud, and delivered as a service.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"IT needs to reach beyond the traditional data center and the public cloud to form and manage a hybrid connected system stretching from the edge to the cloud, wherever the cloud may be. We believe this is leading to a new period of disruption and development that will require organizations to rethink and modernize their infrastructure more comprehensively than they have in the past. Hybrid cloud and hybrid cloud management will be the key pillars of this next wave of digital transformation – which is on its way much sooner than many have so far predicted. They have an important role to play as part of a deliberate and proactive cloud strategy, and are essential if the full benefits of moving over to a cloud model are to be fully realized."
Tags : 
     Hewlett Packard Enterprise
By: HERE Technologies     Published Date: Mar 11, 2019
Increasingly sophisticated location technology makes it possible for data scientists to gain a deeper understanding of their target audiences – and how to reach them. Accurate and precise intelligence can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: HERE Technologies     Published Date: Mar 11, 2019
Audience segmentation is key to any marketing strategy. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japan’s largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someone’s life depends on it. Without IT that wouldn’t be possible. But Mutoh’s IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovo’s hyperconverged infrastructure that helped the company achieve: • The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives • A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japan’s largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someone’s life depends on it. Without IT that wouldn’t be possible. But Mutoh’s IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovo’s hyperconverged infrastructure that helped the company achieve: • The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives • A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japan’s largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someone’s life depends on it. Without IT that wouldn’t be possible. But Mutoh’s IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovo’s hyperconverged infrastructure that helped the company achieve: • The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives • A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japan’s largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someone’s life depends on it. Without IT that wouldn’t be possible. But Mutoh’s IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovo’s hyperconverged infrastructure that helped the company achieve: • The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives • A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : smart mobility, technology solutions, integrated management
     Fujitsu America, Inc.
By: Infosys     Published Date: Mar 15, 2019
Today, most incumbent organizations (those established before the onset of the digital revolution), in every industry are grappling with the risks of disruption with one hand even as they reach for its opportunities with the other. After years of looking the other way, and then reluctant admission, incumbent organizations have come to accept and even embrace disruption in their business. Most are responding by committing to the idea of digital transformation. But that is where the similarity ends.
Tags : 
     Infosys
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
     F5 Networks Singapore Pte Ltd
By: Marketo     Published Date: Feb 11, 2019
Advertising has evolved. No longer is it restricted to print publications, static billboards, radio, and television. Modern technologies have opened the door to a whole new era of advertising–digital advertising. Digital advertising allows marketers and advertisers to reach and appeal to their core audiences in new ways and with more precision. The challenge of meeting the modern buyer's expectation of a continuous, cross-channel, and personal experience is met with new ad technology and innovations that continue to advance at break-neck speeds. New ad technology platforms, types of ads, methods of tracking, dynamic ad content, and advances such as the Internet of Things now provide endless opportunities for marketers and advertisers to engage their customers personally and across channels. In this comprehensive, 110+ page guide, we cover topics from the evolution of digital advertising, to how to structure your digital marketing team, to testing and optimization. Loaded with checkli
Tags : 
     Marketo
By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
     Canon Solutions America
By: Canon Solutions America     Published Date: Feb 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
     Canon Solutions America
By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
     Canon Solutions America
By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
     Canon Solutions America
By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
     Canon Solutions America
By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
     Canon Solutions America
By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
     CrowdStrike
By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking, twitter, youtube, rich media
     StrongMail
By: SuccessFactors     Published Date: Aug 29, 2012
With the many ways that exist to reach job applicants, why is finding great candidates so difficult? This complimentary SuccessFactors white paper discusses six ways to connect with high-quality candidates. Download the white paper today.
Tags : successfactors, sap, best practices, recruiting manager, talent powerhouse, candidate search, applicant search, high-quality candidates, recruiting process, top talent, talent acquisition
     SuccessFactors
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com