data assets

Results 51 - 75 of 125Sort Results By: Published Date | Title | Company Name
Published By: GE Power     Published Date: Oct 05, 2016
Gathering machine sensor data for analysis across a power plant is only the beginning. The Digital Twin takes analytics to the next level by creating a virtual analytic model of assets within the plant. With the GE Digital Twin power companies can understand how assets are performing in real time, and predict future performance.
Tags : 
digital power plant, digital power, digital power station, distributor solution, efficiency of power generation, industrial power
    
GE Power
Published By: IBM     Published Date: Sep 10, 2013
This white paper will discuss how big data analytics, coupled with the right facilities and asset management software, can provide next-generation opportunities to improve facilities and asset management processes and reutnrs. It will examine how different organizations successfully use big data generated by their facilities and assets to help increase revenue, power operational efficiency, ensure service availability and mitigate risk. Most importantly, this white paper will reveal how your organization can leverage big data analytics to achieve similar benefits and transform the management of your organization's facilities and assets-and ultimately, your business.
Tags : 
big data, smarter infrastructures, big data, ibm, power operational, leverage big data, analytics, harnessing the power of data
    
IBM
Published By: Zebra Technologies     Published Date: Jun 15, 2017
Zebra’s broad range of enterprise-level, healthcare-designed, end-to-end solutions provides a wealth of benefits throughout a healthcare facility, enabling clinicians, staff and administrators to sense, analyze and act in real time. Identity solutions can help improve accuracy and enhance patient safety, deliver greater operational efficiency and caregiver confidence, and improve the patient experience. Mobility solutions help improve staff communication and collaboration with enterprise effectiveness and workflow efficiency. Intelligence solutions offer greater visibility to data on patients, staff, assets and the facility overall for better decision making.
Tags : 
overview, brochure, zebra, enterprise, healthcare, solutions, mobility
    
Zebra Technologies
Published By: HP     Published Date: Jun 23, 2008
HP is increasingly demonstrating that its vision includes positioning itself as an innovator at the high end especially with respect to managing heterogeneous storage assets. HP appears to be a leading proponent of avoiding dreams of owning the entire data center storage infrastructure. Rather its aim appears to add customer value by recognizing and accommodating the diversity of installed storage assets at customer sites.
Tags : 
hp disaster proof, disaster proof, disaster-proof, storage, storageworks, continuous access, high availability
    
HP
Published By: HP     Published Date: Jul 08, 2009
This guide provides a comprehensive look at a complete data protection and recovery solution, with valuable information to help you choose the solution that best fits your business requirements and budget, and get the assurance you need - knowing your assets are protected. Learn more today!
Tags : 
storageworks, disk to disk, d2d, data protection, recovery, server, rack, storage, roi, hp services, rdx removable disk backup, disaster recovery, dat tape, tape, tape library, capacity, lto, linear tape open, one-button disaster recovery, obdr
    
HP
Published By: ProfitBricks     Published Date: Apr 01, 2013
The value of conventional on-premises servers is eroding. As with all decay, it starts slowly and declines steadily. Bits and pieces of the physical server market are peeling off as businesses turn away from conventional data center and IT closet deployments in favor of cloud-based infrastructure-as-a-service (IaaS). And there’s no shortage of IaaS; hosting and service-provider companies are flooding the market with low-cost access to hosted servers. The challenge for adopting businesses is leveraging hosted assets that guarantee data security and integrity with fine-grained levels of adjustable capacity, high performance and price predictability.
Tags : 
iaas, solution, cloud-based
    
ProfitBricks
Published By: IBM     Published Date: Apr 13, 2015
IDC Retail Insights defines omni-channel merchandise optimization as the set of technologies, data assets, skills, processes, and management intent required to develop and maintain sets of targeted and localized offers that best satisfy important business objectives. These goals include customer satisfaction, customer lifetime value, and category, channel, and corporate performance. By "offers," IDC Retail Insights means the broad set of attributes that characterize assortments, products, services, prices, utility, and convenience that match customers' buying criteria and shopping behaviors. Targeted and localized offers present a compelling "choice set" that satisfies and delights consumers. Download this white paper to read the questions posed by IBM to Greg Girard, program director of Omni-Channel Analytics Strategies at IDC Retail Insights, on behalf of IBM's customers.
Tags : 
omni-channel merchandise, ibm, targeted offers, localized offers, customer satisfaction, corporate performance, emerging marketing, internet marketing, crm & customer care, marketing research, sales
    
IBM
Published By: HP and Intel ®     Published Date: May 02, 2013
It is very clear that datacenter managers need, in addition to server virtualization, the virtualization, pooling, and management of all the other resources that interoperate with their VMs. They require virtualized network interconnects and storage. They also need the tools to manage and automate these converged IT assets as an integrated datacenter system. This more agile system is the key to enabling the shift to a cloud-based infrastructure IT delivery model. Solution providers like HP are now addressing the need for more optimized and agile IT solutions. They are delivering virtualized storage, virtual application network (VAN) infrastructure, and the orchestration software to manage and automate all these ingredients as a single system. Read this whitepaper to learn more.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure
    
HP and Intel ®
Published By: Panasonic     Published Date: Aug 04, 2016
Whether deploying, securing or managing mobility solutions in a professional environment, enterprise leaders must go to great lengths to ensure their investments are effective and easily assimilated into their existing workflows. In order to avoid encountering challenges with rugged mobile devices and other specialist mobile solutions, it is crucial for businesses with field workforces to leverage services and partners that can help them instill strategic best practices across the entire spectrum of mobilization, including security and data protection, installation and integration, training, maintenance and warranties, and proper disposal of old assets.
Tags : 
mobile devices, mobility, managing mobility, best practices, productivity
    
Panasonic
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management, content management system, information integration, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : 
insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security, network security, small business it, it networks, securing data
    
Quocirca
Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence, threat intelligence, siem
    
McAfee
Published By: IBM     Published Date: Feb 08, 2008
Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.
Tags : 
bank, banks, financial, financial institutions, fisma, compliance, data security, information management, information security, database security, customer data, ibm
    
IBM
Published By: JBoss Developer     Published Date: Oct 21, 2016
Digital transformation (DX) is the continuous process by which enterprises adapt to or drive disruptive change by leveraging digital competencies, such as harnessing sensor data or using location, customer profile, and a mobile app to make shopping recommendations. DX reshapes the organization's culture where required; leverages existing processes, systems, and assets; and creates net-new digital capabilities as needed. With DX, there is the need to embrace new business models and new architectures and technologies that will help an enterprise with customer-facing innovation as well as transition existing systems, processes, organization structure, and relationships to support the transformation.
Tags : 
api, market intelligence, advisory services, digital transformation, data
    
JBoss Developer
Published By: Dell EMC     Published Date: Aug 29, 2017
Choose your Isilon hardware based on your need, all-flash; accelerate demanding file workloads with extreme performance and scalability, Hybrid; Realize performance, capacity, and value for a wide range of enterprise file workloads and Archive; Lower the cost to store and protect aging data assets while providing near-primary accessibility.
Tags : 
    
Dell EMC
Published By: Hewlett Packard Enterprise     Published Date: Oct 11, 2017
In a world without definable, defensible perimeters, how do you protect critical data and assets in your small or midsize business? Well, you start by deploying infrastructure components that are designed with security baked in at every level, from the core to the cloud and everywhere in between.
Tags : 
    
Hewlett Packard Enterprise
Published By: Quocirca     Published Date: Dec 03, 2009
Taking steps towards meeting the legal challenge of carbon reduction within data centres in a sensible, cost effective and sustainable manner.
Tags : 
quocirca, carbon reduction management, data centre asset, energy saving incentive, roi, carbon footprint
    
Quocirca
Published By: Motorola Solutions     Published Date: Nov 29, 2018
When it comes to worker safety, mitigating downtime, and boosting productivity, nothing is faster than right NOW. Organizations across various industry segments — construction, food and beverage, chemical and industrial, and transportation equipment manufacturers — are juggling a mix of communication devices, slowing response times. Gaps in coverage, poor battery life and aging equipment reduce your ability to safely and efficiently meet production deadlines. The power of NOW puts instant communications at your workers’ fingertips — because when communication slows, production slows. Manufacturers today are under immense pressure to produce goods safely, efficiently and profitably. Meeting these goals requires reliable, clear voice and data communications. So the production line is always moving. So well-executed logistics exceed expectations. So materials and operations are tracked to maintain efficiency. So your most valuable assets — your people — are safe and connected. Unified tea
Tags : 
    
Motorola Solutions
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Eaton Corp.     Published Date: Jun 01, 2009
If IT and Facilities could work collaboratively, organizations can operate more efficiently and effectively while still meeting their business objectives.  That's why Eaton® is partnering with organizations that develop IT management systems to create an integrated approach to energy management.  This white paper describes how a joint monitoring and management solution links IT assets, the data center infrastructure and Facilities assets into a holistic perspective aligned with business processes.
Tags : 
white paper, facilities, collaborate, single pane, joint monitoring, management solution, it assets, data center. solutions
    
Eaton Corp.
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.