data research

Results 51 - 75 of 320Sort Results By: Published Date | Title | Company Name
Published By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : 
datacenter automation, data center automation, network management, ca wa, ca wa 2
    
CA WA 2
Published By: QlikTech     Published Date: Aug 27, 2013
The Tectonic Plates are shifting in the BI software market - The promise of business intelligence software is to enable decision makers at all level in an organization to leverage data for business advantage - to explore data, draw insights and meaningful conclusions, and make better decisions. This research paper shows how the QlikView Business Discovery Platform delivers true self-service BI that empowers business users by driving innovative decision-making.
Tags : 
business discovery, powerful, business intelligence, qliktech, idc, small vendors, enabling decision makers, better decisions
    
QlikTech
Published By: IBM     Published Date: Feb 05, 2015
This new research — based on data collected in May 2013 from 29 organizations using visual data discovery and 95 that were not — reinforces those findings. In addition, Aberdeen's research demonstrates that visual data discovery can help to usher in a different approach to analytics, an approach that is far more user driven.
Tags : 
advanced analytics, visual data discovery, managed reporting, data discovery tools
    
IBM
Published By: Basho     Published Date: Apr 07, 2015
bet365 is one of the world’s leading online gambling groups with over 14 million customers in two hundred countries. Recently, bet365 chose Riak, the NoSQL distributed database to ensure scalability and reliability for their site. Get a better understanding of how to choose the right database solution directly from Dan Macklin, Head of Research and Development at bet365. Join us for this On Demand webinar to learn about: • bet365's evaluation process • The business and technical challenges addressed • Triumphs achieved by migrating to Riak • Lessons learned and Dan Macklin's advice for anyyone evaluating their database requirements Download to watch this On-Demand webinar to learn why Riak chose bet365.
Tags : 
basho, riak, database infrastructure, bet365, unstructured data
    
Basho
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Bazaarvoice     Published Date: Oct 15, 2012
Our survey of 100 members of The CMO Club reveals most CMOs gather insights from first-person, always-on online consumer conversations, and share them across their organizations, to power more than just marketing.
Tags : 
bazaar voice, social marketing, social data, research, social data, marketing data, consumer awareness
    
Bazaarvoice
Published By: Cisco     Published Date: Dec 21, 2016
The Cisco 2016 Annual Security Report—which presents research, insights, and perspectives from Cisco Security Research—highlights the challenges that defenders face in detecting and blocking attackers who employ a rich and ever-changing arsenal of tools. The report also includes research from external experts, such as Level 3 Threat Research Labs, to help shed more light on current threat trends. We take a close look at data compiled by Cisco researchers to show changes over time, provide insights on what this data means, and explain how security professionals should respond to threats.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 14, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Tags : 
    
Cisco EMEA
Published By: Pentaho     Published Date: Mar 08, 2016
If you’re evaluating big data integration platforms, you know that with the increasing number of tools and technologies out there, it can be difficult to separate meaningful information from the hype, and identify the right technology to solve your unique big data problem. This analyst research provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals. Read the Buyer’s Guide to Big Data Integration by CITO Research to learn: • What tools are most useful for working with Big Data, Hadoop, and existing transactional databases • How to create an effective “data supply chain” • How to succeed with complex data on-boarding using automation for more reliable data ingestion • The best ways to connect, transport, and transform data for data exploration, analytics and compliance
Tags : 
data, buyer guide, integration, technology, platform, research
    
Pentaho
Published By: Citrix Systems     Published Date: Jul 28, 2015
At long last, datacenters have a more efficient high-availability deployment option for application delivery controllers. According to new research, that’s welcome news among IT leaders.
Tags : 
    
Citrix Systems
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Concentric     Published Date: Mar 27, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Tags : 
concentric, hosted exchanged, email, calendaring, collaboration, mobility, corporate data centers, service provider networks
    
Concentric
Published By: Oracle     Published Date: Sep 24, 2019
Don’t drown in your company’s data, use it to gain a competitive advantage. This research report explores how as a finance leader you need to become a data leader, disrupting your own thinking, then connecting your organisation’s data to outpace change. This is a toolkit for transformation in the age of hyperconnectivity.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 25, 2019
The digital age will transform your supply chain. With hyperconnected, intelligent data at the heart of your logistics you’ll drive your company’s success. Our latest research reveals how today’s supply chain leaders create innovation, consistency and value by employing connected data. It addresses key organisational challenges that you need to be aware of. These include how to disrupt the culture of not just your team, but your whole company, to transform it into a data leader. This is a guidebook for the future of responsive, hyperconnected supply chains. Discover how to become a supply chain leader now.
Tags : 
    
Oracle
Published By: IBM     Published Date: Nov 12, 2015
Hear from the University of Michigan Health System’s CMIO, Dr. Andrew Rosenberg, to learn how this institution is achieving their goal for internal/external operability in support of their enterprise analytics roadmap to support its clinical, research, education and administrative missions. Learn more about the specific challenge's that were solved, how they integrated systems of record with medical devices, and hear about their plans for future integration.
Tags : 
ibm, big data, enterprise analytics, emr, research interfaces
    
IBM
Published By: Storiant     Published Date: Apr 27, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : 
storage technologies, it storage vendors, storiant, storage infrastructures, automated storage
    
Storiant
Published By: HP     Published Date: Aug 03, 2009
The emergence of genomics and advanced gene sequencing techniques has made the collection and storage of data a centerpiece of biomedical research. As the data generated in biomedical research becomes richer and richer, having the infrastructure in place to deal with data growth efficiently is going to be a cornerstone of biomedical data management. This white paper examines a joint solution that features data reduction technologies combined with a network-attached storage system that offers storage optimization capacities along with an affordable, manageable, and scalable petabyte-ready storage platform.
Tags : 
data, storage, genomics
    
HP
Published By: HERE Technologies     Published Date: May 22, 2019
Operational readiness depends on rich location data. When managing logistics and tracking high-value assets, there is no room for error and our new data-driven world demands richer, smarter advanced mapping and navigation services. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors—including Google, TomTom and Mapbox—and it named HERE the “undisputed leader” in location based services. Counterpoint recognized HERE for its integrated analytical capability and commitment to open partnerships, allowing for custom operational requirements and a truly mobile location intelligence platform. See how HERE provides the industry leading tools and expertise to process that data—streamlining the logistics supply chain, boosting responsiveness, and guaranteeing mission success.
Tags : 
mapping, defence, location data.
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 27, 2018
Location has become paramount to building new apps, services, experiences and business models. If data is the new oil, then location is the crude oil. This is why most of the top location platform players have been developing technologies to power next-generation autonomous mobility systems. And the “richness” of location data and real-time intelligence are becoming strong monetization opportunities. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors, including Google, TomTom and Mapbox. Learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
HERE Technologies
Published By: Druva     Published Date: Jan 04, 2016
Endpoint backup has gone beyond simple backup/restore to a broader end-user data protection solution reducing various risks and increasing user productivity. This research helps I&O leaders evaluate enterprise endpoint backup solutions in two scenarios: cloud deployment and on-premises deployment.
Tags : 
enterprise, endpoints, backup, vendor comparison, cloud, on premise
    
Druva
Published By: Pega     Published Date: Mar 25, 2016
The digital service revolution is well underway. For communications service providers (CSPs), it means going beyond traditional voice and data and upgrading their entire digital communications infrastructure. Research shows enterprise-class organizations are allocating heavy dollars towards communications solutions and prefer a single provider for digital services. This is a massive opportunity for CSPs to expand their services, generate more revenue, grow profit and increase market share. However, the majority of enterprises reported not receiving a consistently excellent experience with their most recent service contract. As a result, many switch to new providers. CSPs are losing credibility and the loyalty of their customers because of legacy and traditional systems that constrain their ability to act quickly. Enterprises are looking for CSPs who understand their complex business and can offer a full portfolio of digital services with quality and creativity to meet their needs. Dow
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
The digital service revolution is well underway. For communications service providers (CSPs), it means going beyond traditional voice and data and upgrading their entire digital communications infrastructure. Research shows enterprise-class organizations are allocating heavy dollars towards communications solutions and prefer a single provider for digital services. This is a massive opportunity for CSPs to expand their services, generate more revenue, grow profit and increase market share. However, the majority of enterprises reported not receiving a consistently excellent experience with their most recent service contract. As a result, many switch to new providers. CSPs are losing credibility and the loyalty of their customers because of legacy and traditional systems that constrain their ability to act quickly. Enterprises are looking for CSPs who understand their complex business and can offer a full portfolio of digital services with quality and creativity to meet their needs.
Tags : 
    
Pega
Published By: Schneider Electric     Published Date: Mar 28, 2019
While enterprises continue to own and operate in-house datacenters, their use of colocation and other outsourcing services is growing fast. Demand for colocation and wholesale datacenters, with their readily available space and power, their professional operations teams and, increasingly, their rich connectivity and value-added offerings, has never been stronger. 451 Research forecasts that the operational square footage of the global colocation and wholesale sector will grow at a healthy 7% CAGR from 2017 to 2020.
Tags : 
data centers, outsourcing services, schneider electric, colocation data center, data center market
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
While enterprises continue to own and operate in-house datacenters, their use of colocation and other outsourcing services is growing fast. Demand for colocation and wholesale datacenters, with their readily available space and power, their professional operations teams and, increasingly, their rich connectivity and value-added offerings, has never been stronger. 451 Research forecasts that the operational square footage of the global colocation and wholesale sector will grow at a healthy 7% CAGR from 2017 to 2020.
Tags : 
data centers, outsourcing services, schneider electric, colocation data center, data center market
    
Schneider Electric
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.