ibe

Results 276 - 300 of 1102Sort Results By: Published Date | Title | Company Name
Published By: Microsoft     Published Date: Nov 23, 2016
Bei einer branchenübergreifenden Microsoft-Umfrage unter Vertriebsleitern im Mai 2016 lag die Kundenbindung als treibende Kraft für das Umsatzwachstum auf dem ersten Platz, gefolgt von taktischen Treibern wie Automatisierung und Produktivität.
Tags : 
customer service, sales, customer loyalty
    
Microsoft
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: Pure Storage     Published Date: Apr 10, 2019
This document describes the technical reasons for and benefits of an end-to-end training system and why the Pure Storage® FlashBlade™ product is an essential platform. It also shows performance benchmarks based on a system that combines the NVIDIA® DGX-1™, a multi-GPU server purpose-built for deep learning applications and Pure FlashBlade, a scale out, high performance, dynamic data hub for the entire AI data pipeline.
Tags : 
    
Pure Storage
Published By: Euler Hermes     Published Date: Jun 11, 2019
Like it or not, dealing with risk is part and parcel of what it takes to grow a business. Many serial entrepreneurs who notch up multiple success stories will describe themselves as risk-takers. One of the UK’s most famous examples, Sir Richard Branson, published a book called “ Screw It, Let’s Do It,” reflecting his willingness to take a chance even if the odds were stacked against him.
Tags : 
    
Euler Hermes
Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datensätze durch Verletzungen der Datenintegrität kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschätzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorfälle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, während Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: NetApp     Published Date: Feb 19, 2015
Flash Storage for Dummies, NetApp 2nd Special Edition, describes the many uses and benefits of flash storage technology in the enterprise. From flash-accelerated storage to all-flash arrays, flash technology improves performance and increases reliability in storage infrastructures. The book examines various elements of flash storage: how it evolved, and why you should consider it for your storage infrastructure. The book explores key differences in NetApp’s flash storage solutions: NetApp Flash Cache, Flash Pool, all-flash FAS, and the EF-Series. You’ll also learn five strategies for using Flash in your next storage project. In that classic For Dummies style, you’ll get some useful tips on how to best incorporate flash in your IT environment.
Tags : 
    
NetApp
Published By: Pure Storage     Published Date: Mar 17, 2017
I&O leaders can no longer rely on the assumption that it is safer to buy from established storage vendors when compared to new suppliers. This research describes what I&O leaders must do to benefit from structural changes in the storage industry.
Tags : 
    
Pure Storage
Published By: IBM     Published Date: Feb 22, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization.
Tags : 
ibm, data, big data, hybrid, refined data, data refinery
    
IBM
Published By: IBM     Published Date: Apr 18, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data optim, big data, hybrid data environments
    
IBM
Published By: IBM     Published Date: Apr 19, 2016
This white paper describes how IBM’s Pure Data System for Analytics delivers speed and simplicity to help organizations become more responsive and agile in today’s increasingly mobile and data-driven market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture
    
IBM
Published By: IBM     Published Date: Jul 05, 2016
This white paper describes how IBM’s Pure Data System for Analytics delivers speed and simplicity to help organizations become more responsive and agile in today’s increasingly mobile and data-driven market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data optim, big data, hybrid data environments
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
This video describes how data scientists, analysts and business users can save precious time by using a combination of SPSS and Spark to uncover and act on insights in big data.
Tags : 
ibm, data, analytics, predictive business, ibm spss, apache spark, coding, data science
    
IBM
Published By: IBM     Published Date: Aug 08, 2016
Open Source application developer platforms aren't "free." Download the Total Economic Impact Of Migration From Open Source Application Servers to IBM WAS Liberty, a Forrester Consulting Total Economic Impact Study commissioned by IBM to learn how WAS Liberty can deliver 122% ROI, reduced infrastructure costs by $350K and improved developer productivity by 12% over open source alternatives.
Tags : 
ibm, middleware, application infrastructure, open source application servers, ibm was liberty, cloud
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data governance, governance, big data, hybrid data environments
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
This white paper describes how IBM’s Pure Data System for Analytics delivers speed and simplicity to help organizations become more responsive and agile in today’s increasingly mobile and data-driven market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture
    
IBM
Published By: IBM     Published Date: Nov 17, 2016
Open Source application developer platforms aren't "free." Download the Total Economic Impact Of Migration From Open Source Application Servers to IBM WAS Liberty, a Forrester Consulting Total Economic Impact Study commissioned by IBM to learn how WAS Liberty can deliver 122% ROI, reduced infrastructure costs by $350K and improved developer productivity by 12% over open source alternatives.
Tags : 
ibm, middleware, application infrastructure, open source application servers, ibm was liberty, cloud
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: newScale     Published Date: Jan 30, 2008
Demand for IT services is outpacing the growth of IT budgets. The business constantly requests new services, requires higher service levels, and expects more consistent service delivery. With supply constrained, the only solution is to manage this demand more effectively. The new version of ITIL prescribes essential changes to help IT and the business tackle this difficult task.
Tags : 
service, service management, service catalog, newscale, itil, service catalog, service catalogue, itil service catalogue, it service catalogue
    
newScale
Published By: CA WA 2     Published Date: Oct 01, 2008
Virtualization and clustering can bring many benefits to your business—better IT asset utilization, improved business continuity and improved operational efficiency. At the same time, virtualization can create a new level of complexity for IT. This white paper describes some of the technical challenges inherent in managing these complex environments and recommends strategies for successful deployment that will maximize the value of virtualization technology in your organization.
Tags : 
virtual, virtual machine, virtual storage, virtual server, virtualization, ca wa, ca wa 2
    
CA WA 2
Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.