report

Results 1 - 25 of 4550Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Dec 13, 2013
Learn why NetApp Open Solution for Hadoop is better than clusters built on commodity storage. This ESG lab report details the reasons why NetApp's use of direct attached storage for Hadoop improves performance, scalability and availability compared to typical internal hard drive Hadoop deployments.
Tags : netapp open solution for hadoop, direct attached storage
     NetApp
By: NetApp     Published Date: Dec 18, 2013
IT managers have indicated their two most significant challenges associated with managing unstructured data at multiple locations were keeping pace with data growth and improving data protection . Learn how the NetApp Distributed Content Repository provides advanced data protection and system recovery capabilities that can enable multiple data centers and remote offices to maintain access to data through hardware and software faults. Key benefits are: - continuous access to file data while maintaining data redundancy with no administrator intervention needed. - easily integrated and deployed into a distributed environment, providing transparent, centrally managed content storage - provision of secure multi-tenancy using security partitions. - provision effectively infinite, on-demand capacity while providing fast access to files and objects in the cloud. - secure, robust data protection techniques that enable data to persist beyond the life of the storage it resides on
Tags : 
     NetApp
By: IBM     Published Date: Sep 16, 2015
The impact of the 2008 financial crisis affects not only Sell Side firms - the focus of discussions - but Buy Side and Insurance firms. Dodd Frank Act targets all systemically important firms. This study conducted in partnership with Waters Technology, an Incisive Media publication, focuses these firms. The report finds that they are facing intense pressure on multiple fronts including stricter liquidity and solvency risk regulations, and changing market conditions. Like Sell Side firms, they require more innovative business models and analytics to meet these challenges and to deliver growth and performance.
Tags : 
     IBM
By: Storiant     Published Date: Mar 16, 2015
Read this new IDC Report about how today's enterprise datacenters are dealing with new challenges that are far more demanding than ever before. Foremost is the exponential growth of data, most of it unstructured data. Big data and analytics implementations are also quickly becoming a strategic priority in many enterprises, demanding online access to more data, which is retained for longer periods of time. Legacy storage solutions with fixed design characteristics and a cost structure that doesn't scale are proving to be ill-suited for these new needs. This Technology Spotlight examines the issues that are driving organizations to replace older archive and backup-and-restore systems with business continuity and always-available solutions that can scale to handle extreme data growth while leveraging a cloudbased pricing model. The report also looks at the role of Storiant and its long-term storage services solution in the strategically important long-term storage market.
Tags : storiant, big data, analytics implementations, cloudbased pricing model, long-term storage services solution, long-term storage market
     Storiant
By: Storiant     Published Date: May 11, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : gartner report, cool vendors in storage, storiant, storage vendors, data center managers, storage challenges
     Storiant
By: Dell and Intel®     Published Date: Sep 17, 2014
According to the 2014 IDG Enterprise Big Data research report, companies are intensifying their efforts to derive value through big data initiatives with nearly half (49%) of respondents already implementing big data projects or in the process of doing so in the future. Further, organizations are seeing exponential growth in the amount of data managed with an expected increas of 76% within the next 12-18 months. With growth there are opportunities as well as challenges. Among those facing the big data challenge are finance executives, as this extraordinary growth presents a unique opportunity to leverage data assets like never before. * Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : dell and intel, big data for finance
     Dell and Intel®
By: snowflake     Published Date: Jun 09, 2016
Why Read This Report In the era of big data, enterprise data warehouse (EDW) technology continues to evolve as vendors focus on innovation and advanced features around in-memory, compression, security, and tighter integration with Hadoop, NoSQL, and cloud. Forrester identified the 10 most significant EDW software and services providers — Actian, Amazon Web Services (AWS), Hewlett Packard Enterprise (HPE), IBM, Microsoft, Oracle, Pivotal Software, SAP, Snowflake Computing, and Teradata — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architect professionals select the right solution to support their data warehouse platform.
Tags : 
     snowflake
By: IBM APAC     Published Date: Jul 19, 2019
AI applications and especially deep learning systems are extremely demanding and require powerful parallel processing capabilities. IDC research shows that, in terms of core capacity, a large gap between actual and required CPU capability will develop in the next several years. IDC is seeing the worldwide market for accelerated servers grow to $25.6 billion in 2022, with a 31.6% CAGR. Indeed, this market is growing so fast that IDC is forecasting that by 2021,12% of worldwide server value will be from accelerated compute. Download this IDC report to find out why organizations like yours will need to make decisions about replacing existing general-purpose hardware or supplementing it with hardware dedicated to AI-specific processing tasks.
Tags : 
     IBM APAC
By: Stripe     Published Date: Aug 06, 2019
Platform businesses are reshaping our economy and disrupting entire markets by seamlessly connecting buyers and sellers. However, processing payments and the exchange of value on a platform or marketplace can be challenging. Stripe commissioned Forrester Consulting to evaluate the challenges that platforms and their sellers face, and the solutions they seek. Through a global online survey of 2,030 platform sellers and four in-depth interviews, Forrester found that platforms struggle to provide their sellers with much-needed payment capabilities, reporting, and customer support services with in-house resources alone. Meanwhile, sellers demand that platforms provide these services and will prefer platforms that are service-rich over platforms that are service-poor. KEY FINDINGS • The complexities of managing a platform force executives to divert resources, which stalls growth. • Going global is easier said than done. • Sellers will flock to platforms that simplify the process of sellin
Tags : global payments inc, payment solutions, payment processing, platform as a service (paas), platforms
     Stripe
By: Stripe     Published Date: Aug 06, 2019
Digital commerce is enabling businesses to rethink what they sell, how they sell, and where they sell. Fickle consumer and business buyers have come to expect an intuitive and instantaneous checkout process with multiple payment options. However, aging financial infrastructure and complex interdependencies between numerous parties make it difficult and expensive to accept payments online seamlessly and across markets and currencies. Stripe meets these challenges with an API-based payments platform that abstracts away the complexities around payment gateways, acquiring banks, and credit card networks. To understand the impact of Stripe’s products on processing online payments, IDC interviewed Stripe customers and surveyed hundreds of organizations around the world about how they currently process and manage online payments. KEY FINDINGS • Many organizations are using Stripe as a foundational platform for their online businesses, with many of those also using Stripe Connect to run thei
Tags : payment security, payment processing, payment solutions, business analytics, platform as a service (paas)
     Stripe
By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
     Entrust Datacard
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
     F5 Networks Singapore Pte Ltd
By: BeyondTrust     Published Date: Jul 29, 2019
An Analysis of Microsoft Security Updates in 2018
Tags : 
     BeyondTrust
By: BeyondTrust     Published Date: Jul 29, 2019
Greater visibility and improved integration are vital to tackling the modern threat landscape
Tags : 
     BeyondTrust
By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
     Blackberry
By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
     Experian
By: Schneider Electric     Published Date: Jul 01, 2019
The first-ever Global Digital Transformation Benefits Report is here. The report analyzes 230 customer stories and 330 data points to provide concrete evidence on digitization's disruptive potential. It examines how digital transformation has driven CapEx and OpEx savings, sustainability initiatives, equipment uptime, and other key business goals. It also includes stories from 34 of our customers, including how: • Tata Power, an Indian power company, cut power restoration times from hours to seconds. • New Belgium Brewing, a US beer company, cut downtime by 50%. • Vitens, a Dutch water utility, shrank deployment times by 65%.
Tags : digital, iiot, water, food and beverage
     Schneider Electric
By: Schneider Electric     Published Date: Jul 01, 2019
: Are you among the two thirds of industrial companies who are currently, or planning to, implement industrial transformation? A new report by LNS Research finds that there is quite a wide gap in how the companies perceived as industrial transformation leaders develop their transformation project strategies compared with companies perceived as followers. Don’t get left behind. Discover the recommendations from LNS Research on how to ensure the success of your digital transformation initiatives.
Tags : digital, industry 4.0, automation, plant
     Schneider Electric
By: Schneider Electric     Published Date: Jul 01, 2019
Data-driven asset performance management can help food & beverage manufacturers leverage tools such as equipment efficiency solutions, augmented reality and secure asset connection to transition from a reactive to a prescriptive approach. This will not only help reduce CapEx and OpEx, but also empower the workforce, whilst meeting manufacturing KPIs. This report from Frost & Sullivan shows how manufacturers can achieve 20-30% cost savings by changing their asset maintenance approach.
Tags : asset performance, food and beverage, manufacturing
     Schneider Electric
By: Google     Published Date: Aug 05, 2019
This Forrester Wave report provides an analysis of 12 most significant Database-as-a-service (DBaaS) providers. These vendors were evaluated against 27 criteria, grouped into three categories: Current Offering, Strategy, and Market Presence. Read the report and find out how each provider measures up in their market as Leaders, Strong Performers and Contenders.
Tags : agile, database solutions, forrester, database security, data management
     Google
By: Google     Published Date: Aug 05, 2019
"Agile BI requires more than just agile dashboards. True agility means prototyping data models quickly so business users can continuously iterate on them. Application development and delivery professionals working on BI initiatives should consider adding DWA platforms to their BI toolbox. This Forrester report discusses how seven data warehouse automation vendors bring Agile options to all phases of BI/analytics application development. Read more to find out how these platforms help facilitate shorter development cycles."
Tags : data warehouse automation, forrester, agile solutions, business intelligence, analytics
     Google
By: Google     Published Date: Aug 05, 2019
As organizations continue to produce vast quantities of data, they increasingly need platforms that allow them to analyze, store, and extract meaningful insights from that data. Gartner helps data and analytics leaders evaluate 19 vendors in an increasingly split market. Download the Gartner Magic Quadrant report and find out more.
Tags : data management, database solutions, databases, enterprise database, managed database
     Google
By: Gigamon     Published Date: Jun 21, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
     Gigamon
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com