report

Results 1 - 25 of 4438Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Dec 13, 2013
Learn why NetApp Open Solution for Hadoop is better than clusters built on commodity storage. This ESG lab report details the reasons why NetApp's use of direct attached storage for Hadoop improves performance, scalability and availability compared to typical internal hard drive Hadoop deployments.
Tags : netapp open solution for hadoop, direct attached storage
     NetApp
By: NetApp     Published Date: Dec 18, 2013
IT managers have indicated their two most significant challenges associated with managing unstructured data at multiple locations were keeping pace with data growth and improving data protection . Learn how the NetApp Distributed Content Repository provides advanced data protection and system recovery capabilities that can enable multiple data centers and remote offices to maintain access to data through hardware and software faults. Key benefits are: - continuous access to file data while maintaining data redundancy with no administrator intervention needed. - easily integrated and deployed into a distributed environment, providing transparent, centrally managed content storage - provision of secure multi-tenancy using security partitions. - provision effectively infinite, on-demand capacity while providing fast access to files and objects in the cloud. - secure, robust data protection techniques that enable data to persist beyond the life of the storage it resides on
Tags : 
     NetApp
By: IBM     Published Date: Sep 16, 2015
The impact of the 2008 financial crisis affects not only Sell Side firms - the focus of discussions - but Buy Side and Insurance firms. Dodd Frank Act targets all systemically important firms. This study conducted in partnership with Waters Technology, an Incisive Media publication, focuses these firms. The report finds that they are facing intense pressure on multiple fronts including stricter liquidity and solvency risk regulations, and changing market conditions. Like Sell Side firms, they require more innovative business models and analytics to meet these challenges and to deliver growth and performance.
Tags : 
     IBM
By: Storiant     Published Date: Mar 16, 2015
Read this new IDC Report about how today's enterprise datacenters are dealing with new challenges that are far more demanding than ever before. Foremost is the exponential growth of data, most of it unstructured data. Big data and analytics implementations are also quickly becoming a strategic priority in many enterprises, demanding online access to more data, which is retained for longer periods of time. Legacy storage solutions with fixed design characteristics and a cost structure that doesn't scale are proving to be ill-suited for these new needs. This Technology Spotlight examines the issues that are driving organizations to replace older archive and backup-and-restore systems with business continuity and always-available solutions that can scale to handle extreme data growth while leveraging a cloudbased pricing model. The report also looks at the role of Storiant and its long-term storage services solution in the strategically important long-term storage market.
Tags : storiant, big data, analytics implementations, cloudbased pricing model, long-term storage services solution, long-term storage market
     Storiant
By: Storiant     Published Date: May 11, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : gartner report, cool vendors in storage, storiant, storage vendors, data center managers, storage challenges
     Storiant
By: Dell and Intel®     Published Date: Sep 17, 2014
According to the 2014 IDG Enterprise Big Data research report, companies are intensifying their efforts to derive value through big data initiatives with nearly half (49%) of respondents already implementing big data projects or in the process of doing so in the future. Further, organizations are seeing exponential growth in the amount of data managed with an expected increas of 76% within the next 12-18 months. With growth there are opportunities as well as challenges. Among those facing the big data challenge are finance executives, as this extraordinary growth presents a unique opportunity to leverage data assets like never before. * Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : dell and intel, big data for finance
     Dell and Intel®
By: snowflake     Published Date: Jun 09, 2016
Why Read This Report In the era of big data, enterprise data warehouse (EDW) technology continues to evolve as vendors focus on innovation and advanced features around in-memory, compression, security, and tighter integration with Hadoop, NoSQL, and cloud. Forrester identified the 10 most significant EDW software and services providers — Actian, Amazon Web Services (AWS), Hewlett Packard Enterprise (HPE), IBM, Microsoft, Oracle, Pivotal Software, SAP, Snowflake Computing, and Teradata — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architect professionals select the right solution to support their data warehouse platform.
Tags : 
     snowflake
By: Dell EMC     Published Date: May 08, 2019
IDC reports companies that modernize IT infrastructure for emerging technologies such as AI thrive and see results such as launching IT services faster and closing more deals. Access this comprehensive whitepaper from Dell and Intel® to learn more.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: May 09, 2019
In nearly all midmarket businesses, staff costs are the single biggest expense – meaning that productivity gains have a substantial and lasting impact on the bottom line. This Proaction Series report, commissioned by Dell, discusses technologies that deliver the fastest, clearest productivity benefits to midmarket businesses and will address: - What midmarket firms are looking to accomplish - Why they would invest in IT solutions to achieve success in this area - Required IT solutions to support process evolution Download this report for more information.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: May 09, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report for more information.
Tags : 
     Dell EMC
By: Akamai Technologies     Published Date: Jul 02, 2019
The stakes are high for consumer brands in today’s data privacy landscape. Sophisticated cyberattacks and front-page data privacy breaches threaten to compromise customer data and damage brand trust. To succeed today, brands must implement a data security and privacy strategy that prioritizes customer trust. Are you up to the challenge? Use Forrester Research’s “Data Security and Privacy Maturity Assessment” to gauge your brand’s competencies and identify areas for improvement. You will learn: ? The four key data security and privacy competencies B2C brands must master ? How you measure up against Forrester Research’s recommended best practices ? Tips to make your data security and privacy culture a competitive differentiator
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
     Akamai Technologies
By: Schneider Electric     Published Date: Jul 01, 2019
The first-ever Global Digital Transformation Benefits Report is here. The report analyzes 230 customer stories and 330 data points to provide concrete evidence on digitization's disruptive potential. It examines how digital transformation has driven CapEx and OpEx savings, sustainability initiatives, equipment uptime, and other key business goals. It also includes stories from 34 of our customers, including how: • Tata Power, an Indian power company, cut power restoration times from hours to seconds. • New Belgium Brewing, a US beer company, cut downtime by 50%. • Vitens, a Dutch water utility, shrank deployment times by 65%.
Tags : digital, iiot, water, food and beverage
     Schneider Electric
By: Schneider Electric     Published Date: Jul 01, 2019
: Are you among the two thirds of industrial companies who are currently, or planning to, implement industrial transformation? A new report by LNS Research finds that there is quite a wide gap in how the companies perceived as industrial transformation leaders develop their transformation project strategies compared with companies perceived as followers. Don’t get left behind. Discover the recommendations from LNS Research on how to ensure the success of your digital transformation initiatives.
Tags : digital, industry 4.0, automation, plant
     Schneider Electric
By: NetApp APAC     Published Date: Jul 04, 2019
"This report discusses NetApp’s AFF and FAS product lines, ONTAP 9 advanced functionality, NetApp SAN history and NetApp AFF A700s SAN IO performance. Our performance review uses recent benchmark results, ranks the A700s against a list of enterprise flash storage systems and shows where the NetApp AFF A700s falls on Silverton Consulting’s All-Flash Storage ChampionsChart™."
Tags : 
     NetApp APAC
By: HERE Technologies     Published Date: May 22, 2019
Operational readiness depends on rich location data. When managing logistics and tracking high-value assets, there is no room for error and our new data-driven world demands richer, smarter advanced mapping and navigation services. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors—including Google, TomTom and Mapbox—and it named HERE the “undisputed leader” in location based services. Counterpoint recognized HERE for its integrated analytical capability and commitment to open partnerships, allowing for custom operational requirements and a truly mobile location intelligence platform. See how HERE provides the industry leading tools and expertise to process that data—streamlining the logistics supply chain, boosting responsiveness, and guaranteeing mission success.
Tags : mapping, defence, location data.
     HERE Technologies
By: HERE Technologies     Published Date: May 22, 2019
For 100% operational readiness in a data-driven culture, you need an optimized location platform. Ovum’s Location Platform Index: Mapping and Navigation can help you identify what you should expect from a platform, and discover the platform that best meets your operational requirements. Founded in 1985, Ovum has one of the most experienced analyst teams in the industry and is a respected source of guidance for technology and intelligence leaders. Ovum's report assesses and ranks the major vendors in the location platform market with a focus on the mapping and navigation space. Download this free report to learn more about Why HERE topped Google to take 1st place in the ranking The relative strengths and weaknesses for each vendor- including data, enablers, and features The strategies vendors use to stay responsive towards changes in technology and trends To understand the location platform market, what constitutes a healthy location platform, and which provider offers the correct portfolio—and necessary flexibility—to achieve mission success, download your copy of this report by completing this form.
Tags : mapping, defence, location data.
     HERE Technologies
By: HERE Technologies     Published Date: Jul 15, 2019
As a supply chain technology leader in this era of rapid digitization, you are constantly inundated with trends. How do you ignore the hype and employ the best tech innovations for your supply chain? In the latest Gartner Inc. report entitled The 2019 Top Supply Chain Technology Trends You Can’t Ignore you will discover the latest solutions in the supply chain landscape and how to differentiate and prioritize your unique needs in such a dynamic marketplace. Discover how to optimize your unique supply chain through: An in-depth analysis of the trends you can’t ignore Specific use-case examples The impacts of new and innovative technologies and Next step recommendations
Tags : here technologies, supply chain, mapping
     HERE Technologies
By: Mimecast     Published Date: Jul 15, 2019
This report reflects the review and technical assessment of the Mimecast Compliance Protect feature with respect to the regulatory requirements set forth in the following regulations and rules:
Tags : 
     Mimecast
By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
In Forrester’s evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
In our 27-criterion evaluation of global internetof-things (IoT) services for connected business operations providers, we identified the 14 most significant ones — Accenture, Atos, Capgemini, Cognizant, Deloitte, Dimension Data, EY, HCL Technologies, IBM, Infosys, KPMG, PwC, Tata Consultancy Services (TCS), and Wipro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice.
Tags : 
     Group M_IBM Q3'19
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
     Infinidat EMEA
By: Citrix ShareFile     Published Date: Jul 02, 2019
Improving your employees’ experience demands a focus on their daily journey—and the technology you choose has a huge impact. In this February 2019 report from Forrester, you’ll learn how to ask the right questions about your employees’ experience and embrace a technology ecosystem that helps them succeed. The key takeaways from this report include: • Why the EX technology ecosystem is much more than human capital management systems • How flexible systems of work help employees succeed in their daily journeys • Ways that systems of support can nurture, monitor, and recognize employee growth
Tags : 
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 02, 2019
In this January 2019 report from Forrester, you’ll learn how leading technology companies must engage their customers consistently while learning from their changing needs. To make this happen, IT leaders must offer technical platforms that enable agility and end-to-end integration. This report will show you: • Why tech leaders must embrace technology that engages and adapts with customers • The importance of building tech platforms that deliver speed and flexibility • How to automate and scale Zero Trust security throughout your environments
Tags : 
     Citrix ShareFile
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com