data change

Results 201 - 225 of 437Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most compani
Tags : 
    
Oracle
Published By: Oracle EPM     Published Date: Jul 28, 2015
Enterprise Data Governance is the future key to enabling both business and IT to manage change effectively as enterprises strive to adapt to the networked economy and become data-driven businesses.
Tags : 
enterprise, data, governance, agile
    
Oracle EPM
Published By: Mimecast     Published Date: Apr 18, 2017
"Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance."
Tags : 
forrester, gdpr, organizational processes, security, compliance
    
Mimecast
Published By: Hitachi Vantara     Published Date: Aug 02, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : 
data infrastructure, big data, internet of things
    
Hitachi Vantara
Published By: Success Factors     Published Date: Jul 02, 2013
SuccessFactors Employee Central provides a single employee global system of record that is deployed in the cloud and brings greater workforce visibility to small and medium-size businesses. HR can quickly integrate workforce data from the SuccessFactors BizX Suite of talent management solutions – including Performance and Goals, Compensation, Learning and more, as well as from third-party systems, such as payroll, benefits, and time and attendance. Employees can use the Employee Central self-service features to update their personal information, while managers can easily change employee information such as promotions, salary changes, terminations and more with customized approval workflows. The result: An integrated 360-degree view of the workforce that HR can access through standard and ad-hoc reports to make fast, informed decisions based on consistent, up-to-date data. To learn more, download the SuccessFactors Employee Central business brief for small to medium-size businesses
Tags : 
successfactors, employee, central core, hris, hr quick guide
    
Success Factors
Published By: Riverbed     Published Date: May 18, 2012
Data center consolidation and migration projects are fraught with risk. By using Network Behavior Analysis (NBA) systems to get a handle on dependency information, usage information, change impact information, and post-change problem identification, IT organizations can significantly reduce risk by automating and improving the planning process and minimizing disruption during implementation. Download this informative Riverbed white paper to learn more.
Tags : 
data center consolidation, migration, it infrastructure, network behavior analysis, nba analysis
    
Riverbed
Published By: CEB     Published Date: Oct 30, 2015
Companies that use the workforce survey in an integrated life-cycle approach will simplify complex projects, reduce HR’s workload, and guide the way to the actions that will have the most influence on business performance.
Tags : 
workforce survey program, business performance, survey investment, engagement initiatives, change
    
CEB
Published By: BlueData     Published Date: Aug 19, 2015
Over the past few years, “Big Data” has evolved from an interesting technology topic into a source of major competitive advantage, in which IDG conducted a survey and found out that 60% of enterprises are planning on spending an average of $8 million on Big Data initiatives. However, somewhere between intention/investment and executive/production, Big Data initiatives are falling into a gap. Download this white paper to find out how to change the equation on Big Data spending and learn what the successful companies are doing in order to achieve a success from your Big Data applications.
Tags : 
bigdata, hadoop, big data spending, big data projects, it commitments
    
BlueData
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Adobe     Published Date: Jun 16, 2017
Nissin Foods Holdings migrated to Adobe Creative Cloud for teams to achieve smooth data exchange with overseas design offices using the latest versions of the Adobe products. Download this case study to find out more.
Tags : 
collaboration, adobe, adobe creative cloud, cloud, case study
    
Adobe
Published By: Fitbit     Published Date: Jul 26, 2017
There's no doubt that step-based activity challenges can motivate people to move more. In fact, Fitbit data shows that users who participate in Fitbit's in-app Challenges take an average of 2,000 more steps per day than those who do not. But maybe you've run several successful step challenges at your company and you're ready for change. Check out these four non-step-based challenges that can help your employees get their health in check - in ways that go beyond steps.
Tags : 
employee health, employee motivation, fitness, sleep, wearable device, health benefits
    
Fitbit
Published By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
    
Kronos
Published By: CA Technologies EMEA     Published Date: Aug 16, 2018
Listen to experts from CA Technologies and Tumble Road discuss how they can empower you to unlock your data through an agile PPM solution. They will run through: - The changed need for data insight - Unleashing the power of BI - The value of the CA PPM & power BI combination
Tags : 
    
CA Technologies EMEA
Published By: Red Hat     Published Date: Jun 19, 2019
Technology has fundamentally changed the way we live. Access to data and information anytime, anywhere is no longer a luxury—it is a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver higher-quality applications more often, enabling companies to stay relevant and seize digital business opportunities. Cloud-native is an approach to building applications that takes advantage of cloud computing models and DevOps principles to make the delivery of new features and services faster and more flexible. With a cloud-native strategy, organizations can begin the culture, process, and technology changes needed to meet new demands and become an IT organization that can deliver business innovation faster. The following checklist will assess your needs and possible business impacts to help you choose a cloud-native platform that benefits the business, developers, and IT operations team.
Tags : 
    
Red Hat
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Digital transformation encompasses both technological and human components. While many initiatives focus on ensuring that a company’s multi-cloud infrastructure is agile enough to meet changing demands around cloud mobile, Internet of Things (IoT), and big data, it’s equally important to empower business workers with the modern digital tools they need to be successful today. Artificial intelligence and machine learning can play a vital role on both of these fronts. In fact, 78 percent of CIOs and senior IT leaders are already looking to AI to address complexity,1 and by 2019, 30 percent of IT service desks will utilize machine learning to free up support capacity.2 The magnitude of change has forced companies to take stock of the experience they offer employees. As digital natives3 enter and advance in the workforce, talent retention is now a top priority. These workers expect to have the best tools; 93 percent of millennials cited modern and up-to-date technology as one of the most
Tags : 
    
BMC ASEAN
Published By: DataCore     Published Date: Apr 23, 2019
The emphasis on fast flash technology concentrates much attention on hot, frequently accessed data. However, budget pressures preclude consuming such premium-priced capacity when the access frequency diminishes. Yet many organizations do just that, unable to migrate effectively to lower cost secondary storage on a regular basis. In this white paper, explore: • How the relative proportion of hot, warm, and cooler data changes over time • New machine learning (ML) techniques that sense the cooling temperature of data throughout its half-life • The role of artificial intelligence (AI) in migrating data to the most cost-effective tier.
Tags : 
storage tiering, auto tiering, all-flash array, ssd, software defined storage, hyperconverged, data migration, storage migration
    
DataCore
Published By: DataCore     Published Date: Jun 06, 2019
More than 54% of companies have experienced a downtime event that lasted more than 8 hours – one full work day – in the past 5 years. And the risk of major disruptions to business continuity practices looms ever larger – primarily due to the troubling dependencies on the location, topology and suppliers of data storage. Download this infographic and see how you can preserve proven Business Continuity practices despite inevitable changes to your data storage infrastructure.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability
    
DataCore
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.