Whitepaper Library
 

group

Results 1 - 25 of 1116Sort Results By: Published Date | Title | Company Name
Published By: Server Technology     Published Date: Mar 09, 2015
There is no shortage of predictions regarding the future of data center power densities, but their track-record over the last decade has been poor. At the same time, there is also a general inconsistency in the way different groups define and discuss the topic of the high-density data center
Tags : 
infrastructure, design and facilities, power and cooling, green computing
    
Server Technology
Published By: Cisco EMEA     Published Date: Nov 19, 2018
Want to know how you can accelerate multicloud IT with hyperconverged infrastructure? Then download this video today and hear from a Cisco Consulting Systems Engineer as he gives an expert talk on Hyperconvergence and Multicloud and what strategies can be adopted by your company. We also hear a case study from Avit Group on how they have successfully adopted Cisco solutions to power their business. Download today to hear more!
Tags : 
    
Cisco EMEA
Published By: Workday France     Published Date: Sep 27, 2018
La procédure d'audit ne devrait pas être un frein à la planification stratégique et au développement de la rentabilité. Avec un système de gestion financière unique basé dans le Cloud, toutes vos capacités de conformité, de contrôle et d'audit sont regroupées en une seule solution. Vous pouvez ainsi rationnaliser les processus d'audit et assurer la sécurité. Concentrez-vous sur l'entreprise et laissez Workday s'occuper du reste.
Tags : 
    
Workday France
Published By: Trifacta     Published Date: Nov 02, 2018
In the latest report, Forrester evaluated 10 top data preparation solutions against 18 criteria, grouped into categories of Current Offering, Strategy and Market Presence. See how each data prep provider compares and who received the highest scores. Download your copy today to review: What are the key technical differentiators for data preparation solutions Which user personas do data preparation solutions focus on Why ownership of data preparation is transitioning from IT to business end users
Tags : 
    
Trifacta
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: Group M_IBM Q418     Published Date: Sep 24, 2018
A multi-cloud world is quickly becoming the new normal for many enterprises. But embarking on a cloud journey and managing cloud-based services across multiple providers can seem overwhelming. Even the term multi-cloud can be confusing. Multi-cloud is not the same as hybrid cloud. The technical definition of hybrid cloud is an environment that includes traditional data centers with physical servers, private cloud with virtualized servers as well as public cloud provisioned by service providers. Quite often, multi-cloud simply means that an organization uses multiple public clouds from many vendors to deliver its IT services. In other words, organizations can have a multi-cloud without having a hybrid cloud, or they can have a multi-cloud as part of a hybrid cloud.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 24, 2018
Take a look at the IT ecosystem of any company today and there’s a good chance you’ll find it includes offerings from several cloud services providers. That’s certainly the case at mid- to large-sized companies with at least 500 employees, according to a recent survey conducted by IDG Research. The survey of 100 senior IT professionals found that 59% are already multi-cloud adopters — that is, using computing and storage services from two or more cloud providers. Another 31% of respondents say they plan to become multi-cloud organizations in the coming 12-24 months, with only 10% still in the “consideration” phase.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Across enterprises of all kinds, data is multiplying rapidly in both quantity and variety. Across multi-cloud environments, new sources are exponentially increasing the growing stream of information, including the Internet of Things, social media, mobile devices, virtual reality implementations and optical tracking.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 15, 2018
The enterprise data warehouse (EDW) has been at the cornerstone of enterprise data strategies for over 20 years. EDW systems have traditionally been built on relatively costly hardware infrastructures. But ever-growing data volume and increasingly complex processing have raised the cost of EDW software and hardware licenses while impacting the performance needed for analytic insights. Organizations can now use EDW offloading and optimization techniques to reduce costs of storing, processing and analyzing large volumes of data. Getting data governance right is critical to your business success. That means ensuring your data is clean, of excellent quality, and of verifiable lineage. Such governance principles can be applied in Hadoop-like environments. Hadoop is designed to store, process and analyze large volumes of data at significantly lower cost than a data warehouse. But to get the return on investment, you must infuse data governance processes as part of offloading.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The General Data Protection Regulation (GDPR) framework seeks to create a harmonized data protection framework across the European Union, and aims to give back EU citizens control of their personal data by imposing stricter requirements for those hosting and processing this data, anywhere in the world. IBM is committed to putting data responsibility first and providing solutions that are secure to the core for all customers. As such, IBM Cloud has fully adopted the EU Data Protection Code of Conduct for Cloud Service providers – meaning we agree to meet the entirety of its stringent requirements.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
Trust can be viewed as a key factor amongst clients and service providers working together towards preparing for readiness with the EU General Data Protection Regulation (GDPR). These stringent regulations come into force in May 2018 to ensure that personal data is processed adhering to strict privacy and security requirements.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 24, 2018
This study looks at what's driving container adoption, highlights key challenges and explaining the benefits.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 24, 2018
After moving traditional workloads to public cloud, most customers realize they must replace many of them with cloud-native alternatives to reap the full benefits. Technology product management leaders must deliver cloud-native offerings now to capture business opportunities and avoid irrelevancy.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 24, 2018
Evaluating cloud providers and looking for a trusted technology partner? Focus on these five vital aspects of cloud security.
Tags : 
    
Group M_IBM Q418
Published By: BetterUp     Published Date: Dec 05, 2018
"Company cultures that value and celebrate diverse perspectives not only support, engage and advance underrepresented groups, but also benefit by making better decisions and achieving broader innovation. We believe inclusion is a hallmark of strong leadership and should be a core skill for all leaders. Download our paper to learn: - Why most diversity and inclusion programs fall short on their promises - How to develop skills for inclusive workplace with BetterUp coaching - How BetterUp unlocks the potential of emerging leaders with career coaching to build leadership behaviors at scale"
Tags : 
    
BetterUp
Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
    
Coyote Point Systems
Published By: Infosys     Published Date: Dec 03, 2018
Data is a truly inexhaustible resource for an organization. It creates endless possibilities to make data do more. As a technology partner of hundreds of organizations around the world, Infosys helps clients navigate the journey from their current state to the next. Facilitating clients’ transition into data-native enterprises is a crucial part. To understand how companies are using data analytics today and their expectations in a world of endless possibilities with data, we recently commissioned an independent survey of 1,062 senior executives from organizations with annual revenues exceeding US$ 1 billion, in the United States, Europe, Australia, and New Zealand. The respondents were from business and technology roles, who were decision makers, program managers and external consultants; represented 12 industries, grouped into seven industry clusters, such as, consumer goods, retail and logistics, energy and utilities, financial services and insurance, healthcare and life sciences, h
Tags : 
    
Infosys
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg
    
Mimecast
Published By: Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence (AI) is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today. Learn more about AI in this eBook.
Tags : 
artificial, intelligence, enterprise
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
volitionrx, cyber, security, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: JTE Group     Published Date: Mar 05, 2013
unlimited bulk email in delhi/ncr
Tags : 
    
JTE Group
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.