data change

Results 251 - 275 of 458Sort Results By: Published Date | Title | Company Name
Published By: Pillar Data Systems     Published Date: Apr 20, 2010
The most critical component of an Exchange deployment is the storage subsystem where the data is held. Download this white paper to learn best practices in storage sizing and deployment.
Tags : 
pillar data systems, microsoft exchange best practices, storage size, exchange deployment, virtualization, storage configuration, data priority
    
Pillar Data Systems
Published By: Equinix     Published Date: Jul 07, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content, content management systems, customer experience/engagement
    
Equinix
Published By: Equinix     Published Date: Jul 11, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content, customer experience/engagement
    
Equinix
Published By: Tripwire     Published Date: Jun 30, 2009
Understand the compliance requirements of the European Union's Markets in Financial Instruments Directive (MiFiD), and how controlling IT change addresses many of those requirements.
Tags : 
tripwire, mifid, compliance, requirements, europe, markets, european union, financial, instruments, institution, administration, control, address, directive, security, data, control, information, organization, change
    
Tripwire
Published By: Idera     Published Date: Jun 21, 2011
SharePoint 2007 was big, and SharePoint 2010 shows every sign of being even bigger. However, there is one stumbling block on the way to SharePoint 2010 nirvana... upgrading. In this white paper, find out ten of the common difficulties you may encounter when upgrading content to SharePoint 2010 and some solutions.
Tags : 
idera, sharepoint, migration, upgrade, monitor, customization, metadata, populating, third party, exchange, nerd, security audit, back up and recovery, architect, public folders, hosting, cloud, protection, technology
    
Idera
Published By: Inovis     Published Date: Aug 06, 2007
The challenges presented by multiple Value-Added Networks (VANs) and managing diverse trading partners create barriers to the efficiencies promised by EDI. Multiple providers mean multiple points of failure with no one entity to hold accountable. Also, as trading communities grow, end-to-end supply chain visibility becomes an essential operational requirement.
Tags : 
van, vans, value added, value-added, value added, edi, electronic data interchange, scm, supply chain, migration, inovis, tco, total cost of ownership, business metrics, vendor selection, best practices
    
Inovis
Published By: IBM     Published Date: Mar 13, 2014
When it comes to design patterns, the battle between push and pull has been ongoing since the start. Both models have their place. But the authors of this IBM® Redbooks® Point-of-View article, including IBM WebSphere® VP Jerry Cuomo, argue that in many situations, pushing data to users as it changes can consume far fewer resources than a conventional pull pattern.
Tags : 
ibm, ibm redbooks, ibm websphere, marketing, mobile, mobile marketing, mobile design, mobile applications, push design model, push notifications, pull, pull data, customer experience/engagement, e-commerce
    
IBM
Published By: HP     Published Date: Nov 05, 2014
IT has never been more important to doing business, which means that IT infrastructure must be simpler, smarter, faster, more flexible, and more business-aligned than ever. New service delivery models are driving new Tier-1 storage requirements that reveal how the traditional focus on performance and availability are clearly not enough to support virtualization, ITaaS, and new cloud service delivery models. The world is moving rapidly towards a New Style of IT, and will leave behind any business that doesn’t adapt even more rapidly. Is your storage ready? Download this whitepaper now.
Tags : 
data center, change management, data management, storage space, storage criteria, storeserv, tier-1, market reportit requirements, asset utilization, data mobility, maintenance upgrades
    
HP
Published By: BMC Software     Published Date: Apr 27, 2015
This white paper discusses three key principles for creating a new approach to change management—one that allows the IT department to manage change more effectively.
Tags : 
it organizations, eliminate risk, contextual data, user experience, business risk, change management
    
BMC Software
Published By: Pure Storage     Published Date: Sep 27, 2019
For most enterprises, 60 to 73 percent of enterprise data goes unused for business-intelligence (BI) and analytics efforts, according to Forrester.1 Data that is out of sight or out of date creates a competitive blind spot for businesses today. With customer demands, economic changes, and new trends and technologies evolving at a dizzying pace, staying relevant — not to mention competitive — requires that businesses access all available BI to be ?exible and agile. Businesses must have quick access to data that is comprehensive, accurate, current, and consumable in real time. A traditional infrastructure, where the online analytical processing (OLAP) platform and the online transaction processing (OLTP) platform are separate, makes ?exibility and agility difficult to achieve. When a business has accurate, current data in hand, it can make real-time data-driven business decisions so that it can stay relevant and competitive, or even be a disruptor in its industry. One way that a busines
Tags : 
    
Pure Storage
Published By: Veritas     Published Date: Jan 03, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas
Published By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how to meet regulatory requirements for system change and user activity monitoring with NetIQ Change Guardian for Windows, without the need for performance-hindering native auditing.
Tags : 
pci, pci dss, data protection, compliance, netiq, net iq, change management, monitoring, access control, regulatory compliance, hipaa, fisma, audit, auditing, windows
    
NetIQ Corporation
Published By: Juniper Networks     Published Date: Oct 19, 2015
A new wave of application workloads and associated data traffic - related to virtualization, cloud, mobility, analytics, and social media — have placed unprecedented strain on the datacenter network and forced commensurate architectural and operational changes.
Tags : 
juniper, network, cloud, datacenter, virtualization, data, traffic, analytics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 18, 2015
Why do data centers need network automation? As application workloads are redefined, data centers must change. This IDC Whitepaper looks at how network automation and orchestration can aid this transition, building simpler and more agile networks.
Tags : 
juniper, cloud, data center
    
Juniper Networks
Published By: Neverfail Group     Published Date: Feb 10, 2012
By leveraging SRMXtender, you can now standardize on SRM and protect your entire server inventory, not just the subset deployed on ESX hosts. Try it NOW!
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance, high availability, sql server, exchange server, ms exchange, microsoft exchange, neverfail
    
Neverfail Group
Published By: IBM     Published Date: Aug 25, 2009
Reduce the long, after hours finger pointing through proactive performance monitoring all while facilitating collaboration and driving organizational efficiencies.
Tags : 
data management tools, ibm, dba, manage database, application changes, proactive performance monitoring, after hours finger pointing, organizational efficiencies, sla
    
IBM
Published By: Mimosa Systems     Published Date: Jan 14, 2009
This white paper will present an improved approach to legal discovery for Microsoft® Exchange systems provided by Mimosa Systems. Unlike existing methods for legal discovery of Exchange Server data, Mimosa’s approach delivers major advances in performance and granularity of information. To begin this paper, we will review the industry forces that are driving the need to manage email for legal discovery, followed by a discussion of the market-leading enterprise messaging application—Microsoft Exchange Server and the challenges it presents for legal discovery.
Tags : 
mimosa systems, microsoft exchange systems, legal discovery, email for legal discovery
    
Mimosa Systems
Published By: Nimble Storage     Published Date: Oct 28, 2013
Collaboration and email applications such as Microsoft SQL Server, Exchange, and SharePoint are critical for business productivity. But care needs to be taken in selecting the right infrastructure for hosting these applications. Download this technical overview and learn how VMware, Cisco, and Nimble Storage have developed a pre-validated reference architecture that delivers industry-leading performance, data protection, and management simplicity.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
Get this 36-page technical report and learn how to deploy 1,000 virtual desktops using VMware View 5.1 with VMware vSphere 5, Cisco UCS, and a single 3U Nimble Storage array. This validated solution provides efficient infrastructure, adaptive performance, rapid provisioning, linear scalability, and dramatically simplified management.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint
    
Nimble Storage
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Nextgen     Published Date: May 25, 2017
As the Northwest Ohio area’s only academic medical center, the University of Toledo Medical Center (UTMC) delivers high-level physician education, while managing a 233-bed hospital for patients as well as 34 specialty clinics. This broad, complex level of responsibility needs a comprehensive, robust interoperability system to connect its different EHR systems so residents, physicians, and technicians can access data whenever, wherever they are. With more than a half-dozen disparate systems, UTMC needs a reliable, robust system to tie everyone together so providers have critical access to patient data from the classroom to the operating theatre. Read this case study to learn how the Mirth® solution has delivered to all of these requirements and enabled University of Toledo.
Tags : 
    
Nextgen
Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus
    
Qualys
Published By: Calpont     Published Date: Mar 13, 2012
This paper looks at advances in database analytics and how they change the playing field for marketing executives willing to seize opportunities made available by new advances in hardware and software.
Tags : 
analytics, big data, online, marketing, database, database analytics, advance, hardware, software, data, information, emerging marketing, internet marketing, crm & customer care, marketing research, traditional marketing
    
Calpont
Published By: McAfee     Published Date: Mar 31, 2017
The OpenDXL initiative puts the power of integration and automation in the hands of security analysts by providing open source tools, expertise, and a supportive community.
Tags : 
opendxl, data exchange, open source, threat feed, threat intelligence, ioc, advanced threats, sandbox, honeypot, siem, stix
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.