data change

Results 26 - 50 of 450Sort Results By: Published Date | Title | Company Name
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: Arcserve     Published Date: Dec 04, 2013
Learn how a single solution will simplify data protection for your IT team, while also adding the versatility for future changes within your organization.
Tags : 
ca technologies, data protection, single solution
    
Arcserve
Published By: Artemis Health     Published Date: Aug 08, 2019
Consultants and advisors are on the front lines of benefits data analytics. They’re the folks who dig through thousands of rows in a spreadsheet to surface problems and find solutions. In this whitepaper, we’ll dive deep on the advantages consultants offer to employers: • Access to data analytics, trend analysis, and program measurement • The expertise to identify, track, and take action on chronic conditions in a member population • The industry insight into public policy and regulation changes
Tags : 
    
Artemis Health
Published By: athenahealth     Published Date: Jul 23, 2013
PayerView, an annual healthcare payer rankings report by athenahealth, uses objective, data-driven methodologies to analyze the payer-provider relationship. The 2013 healthcare payer rankings report, which covers industry trends in 2012, does not show dramatic industry changes over the year, but highlights areas where there could be trouble as industry changes emerge.
Tags : 
payerview, healthcare, data-driven, payer-provider, athenahealth
    
athenahealth
Published By: Attunity     Published Date: Jan 14, 2019
This whitepaper explores how to automate your data lake pipeline to address common challenges including how to prevent data lakes from devolving into useless data swamps and how to deliver analytics-ready data via automation. Read Increase Data Lake ROI with Streaming Data Pipelines to learn about: • Common data lake origins and challenges including integrating diverse data from multiple data source platforms, including lakes on premises and in the cloud. • Delivering real-time integration, with change data capture (CDC) technology that integrates live transactions with the data lake. • Rethinking the data lake with multi-stage methodology, continuous data ingestion and merging processes that assemble a historical data store. • Leveraging a scalable and autonomous streaming data pipeline to deliver analytics-ready data sets for better business insights. Read this Attunity whitepaper now to get ahead on your data lake strategy in 2019.
Tags : 
data lake, data pipeline, change data capture, data swamp, hybrid data integration, data ingestion, streaming data, real-time data, big data, hadoop, agile analytics, cloud data lake, cloud data warehouse, data lake ingestion, data ingestion
    
Attunity
Published By: Attunity     Published Date: Feb 12, 2019
This technical whitepaper by Radiant Advisors covers key findings from their work with a network of Fortune 1000 companies and clients from various industries. It assesses the major trends and tips to gain access to and optimize data streaming for more valuable insights. Read this report to learn from real-world successes in modern data integration, and better understand how to maximize the use of streaming data. You will also learn about the value of populating a cloud data lake with streaming operational data, leveraging database replication, automation and other key modern data integration techniques. Download this whitepaper today for about the latest approaches on modern data integration and streaming data technologies.
Tags : 
streaming data, cloud data lakes, cloud data lake, data lake, cloud, data lakes, streaming data, change data capture, cloud computing, modern data integration, data integration, data analytics, cloud-based data lake, enterprise data, self-service data
    
Attunity
Published By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : 
data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics, database transactions, streaming environments, real-time data replication, data configuration
    
Attunity
Published By: Attunity     Published Date: Feb 12, 2019
How can enterprises overcome the issues that come with traditional data warehousing? Despite the business value that data warehouses can deliver, too often they fall short of expectations. They take too long to deliver, cost too much to build and maintain, and cannot keep pace with changing business requirements. If this all rings a bell, check out Attunity’s knowledge brief on data warehouse automation with Attunity Compose. The solution automates the design, build, and deployment of data warehouses, data marts and data hubs, enabling more agile and responsive operation. The automation reduces time-consuming manual coding, and error-prone repetitive tasks. Read the knowledge brief to learn more about your options.
Tags : 
dwa, data warehouse automation, etl development, extract transform load tools, etl tools, data warehouse, data marts, data hubs data warehouse lifecycle, data integration, change management, data migration, consolidating data, cloud data warehousing, data warehouse design, attunity compose
    
Attunity
Published By: Avanade DACH     Published Date: May 08, 2018
In this six-step guide, we aim to help you solve your data challenges to prepare for advanced analytics, cognitive computing, machine learning and the resulting benefits of AI. We’ll show you how to get your data house in order, scale beyond the proof of concept stage, and develop an agile approach to data management. By continually repeating the steps in this guide, you’ll sharpen your data and shape it into a truly transformational business asset. You’ll be able to overcome some of the most common business problems, and work toward making positive changes: • Improve customer satisfaction • Reduce equipment outages • Increase marketing campaign ROI • Minimize fraud loss • Improve employee retention • Increase accuracy for financial forecasts
Tags : 
    
Avanade  DACH
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: BigCommerce     Published Date: Oct 16, 2018
Businesses who have lived through the evolution of the digital age are well aware that we’ve experienced a generational shift in technology. The rise of software as a service (SaaS), cloud, mobile, big data, the Internet of Things (IoT), social media, and other technologies have disrupted industries and changed customers’ expectations. In our always-on, buy anything anywhere world, customers want their shopping experiences to be personalized, dynamic, and convenient. As a result, many businesses are trying to reinvent themselves. Success in a fast-paced economy depends on continually adapting and innovating. Companies have to move quickly to keep up; there’s no time for disjointed technologies and old systems that don’t serve the customer-obsessed mentality needed to thrive in the digital age.
Tags : 
    
BigCommerce
Published By: BillingPlatform     Published Date: Jul 30, 2019
Discover How Cloud-based Billing Delivers Transformation Enterprise leaders and companies of all sizes are leveraging digital transformation through disruptive technologies like the Internet of Things, AI, business intelligence and big data. This eBook demonstrates 5 strategies for leading the charge for change within your business. Discover how to quickly leverage digital transformation in your technology stack and monetize it quickly with cloud-based billing. Download this eBook to explore how the right solution can help you: • Launch product innovations quickly • Monetize IoT and increase revenue • Automate billing to improve customer retention • Leverage the cloud to reduce costs Adapting today can mean the difference between success and obsolescence. With the right billing solution your business can thrive in these challenging times. Discover how today!
Tags : 
    
BillingPlatform
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: BlueData     Published Date: Aug 19, 2015
Over the past few years, “Big Data” has evolved from an interesting technology topic into a source of major competitive advantage, in which IDG conducted a survey and found out that 60% of enterprises are planning on spending an average of $8 million on Big Data initiatives. However, somewhere between intention/investment and executive/production, Big Data initiatives are falling into a gap. Download this white paper to find out how to change the equation on Big Data spending and learn what the successful companies are doing in order to achieve a success from your Big Data applications.
Tags : 
bigdata, hadoop, big data spending, big data projects, it commitments
    
BlueData
Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment, email marketing services/software
    
BlueHornet
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Digital transformation encompasses both technological and human components. While many initiatives focus on ensuring that a company’s multi-cloud infrastructure is agile enough to meet changing demands around cloud mobile, Internet of Things (IoT), and big data, it’s equally important to empower business workers with the modern digital tools they need to be successful today. Artificial intelligence and machine learning can play a vital role on both of these fronts. In fact, 78 percent of CIOs and senior IT leaders are already looking to AI to address complexity,1 and by 2019, 30 percent of IT service desks will utilize machine learning to free up support capacity.2 The magnitude of change has forced companies to take stock of the experience they offer employees. As digital natives3 enter and advance in the workforce, talent retention is now a top priority. These workers expect to have the best tools; 93 percent of millennials cited modern and up-to-date technology as one of the most
Tags : 
    
BMC ASEAN
Published By: BMC Software     Published Date: Apr 27, 2015
This white paper discusses three key principles for creating a new approach to change management—one that allows the IT department to manage change more effectively.
Tags : 
it organizations, eliminate risk, contextual data, user experience, business risk, change management
    
BMC Software
Published By: Bocada     Published Date: Aug 21, 2009
This white paper shares the best practices for company data security used by some of today's most progressive IT leaders to help align their group's efforts with company goals and to make their data protection activities more successful.
Tags : 
data protection, best practices, business goals, business management, it management, change management, bocata, bocada
    
Bocada
Published By: Box     Published Date: Jun 22, 2018
With GDPR looming large on the horizon in May 2018 and beyond, there are a number of myths and misunderstandings circulating around the upcoming changes to compliance and data protection. In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system, and delve into topics, like: • GDPR strategies for cloud ECM • Cultural changes for upcoming compliance regulations • Projected fines associated with GDPR • And more
Tags : 
    
Box
Published By: Brocade     Published Date: May 02, 2016
Power your path to a software-defined data center. Brocade and VMware are delivering automation, agility, and efficiency advantages that will change the way you do business. Read this paper and learn how to make SDDC a reality today.
Tags : 
    
Brocade
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.