real time data

Results 251 - 275 of 355Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection, secure business
    
F5 Networks
Published By: VMware SD-WAN by VeloCloud     Published Date: Dec 19, 2014
Delivering combination of real time voice, video, and data is bandwidth intensive and requires complex network configuration to ensure the delivery of these time sensitive applications. Download this paper to learn the recent WAN technology trends to enable companies to roll out and support UC without the cost and complexity of traditional WAN.
Tags : 
velocloud, cloud-delivered, wan, real time video, bandwith
    
VMware SD-WAN by VeloCloud
Published By: Code42     Published Date: Jan 13, 2016
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : 
code42, best practices, platform-specific data, endpoint backup, data migration, real-time data backup, data solutions
    
Code42
Published By: Schneider Electric     Published Date: Aug 15, 2017
Schneider Electric is integrating datacenter infrastructure management (DCIM) software, big-data analytics and cloud services into the management of customers’ datacenters. Its recently launched StruxureOn cloud offering signals a new wave in datacenter operations, using a combination of machine learning, anomaly detection and event-stream playback to give operators real-time insights and alarming via their smartphones. More capabilities and features are planned, including predictive analysis and, eventually, automated action. Schneider’s long-term strategy is to build a partner ecosystem around StruxureOn, and provide digital services that span its traditional datacenter business.
Tags : 
incident tracking, historical trending, troubleshooting, operational analysis, prediction model, schneider equipment, maintenance, firmware updates
    
Schneider Electric
Published By: SAP     Published Date: Apr 07, 2011
In today's competitive global business environment virtually all firms work diligently to analyze alternatives and to create a business strategy that enables competitive advantage. Once the strategy has been defined however, nine out of ten organizations fail to implement it effectively. Don't let this happen to you.
Tags : 
bi strategy, real-time analytics, performance boost, business insight, business data insight, decentralization
    
SAP
Published By: SAS     Published Date: Apr 04, 2018
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Today’s consumers expect immediate, personalized interactions. To meet these expectations, companies must differentiate their brands through timely, targeted and tailored customer experiences based on real-time data analytics. This report, sponsored by SAS, Intel and Accenture and conducted by Harvard Business Review Analytic Services, looks at how businesses are using advanced customer data analytics, along with real-time analytics and real-time marketing, to enhance their customers’ experiences. Learn why organizations that place a high value on real-time capabilities still struggle to achieve them, what companies can do to ensure success as they adopt and implement real-time analytics solutions, and what benefits successful companies are already seeing.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Data integration (DI) may be an old technology, but it is far from extinct. Today, rather than being done on a batch basis with internal data, DI has evolved to a point where it needs to be implicit in everyday business operations. Big data – of many types, and from vast sources like the Internet of Things – joins with the rapid growth of emerging technologies to extend beyond the reach of traditional data management software. To stay relevant, data integration needs to work with both indigenous and exogenous sources while operating at different latencies, from real time to streaming. This paper examines how data integration has gotten to this point, how it’s continuing to evolve and how SAS can help organizations keep their approach to DI current.
Tags : 
    
SAS
Published By: Double-Take Software     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
Double-Take Software
Published By: Double-Take Software     Published Date: Apr 16, 2009
Double-Take Move provides migration functionality that dramatically reduces the impact and risk of migrations in the data center and across any geographic distance. Double-Take Move has a patented and award-winning replication engine that provides real-time, byte-level data replication and ensures transaction consistency without affecting users and production applications. Read this whitepaper to learn about the concerns that affect data, application and whole system migration.
Tags : 
double-take, workload portability, x2x, storage, server migration, p2v, virtualized, virtualization
    
Double-Take Software
Published By: Vision Solutions     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
Vision Solutions
Published By: DoubleTake     Published Date: Jul 14, 2010
The Department of Homeland Security puts businesses in two categories: those who have already experienced the pain of losing valuable electronic data, and those who will at some point in the future. Well-prepared businesses know that deploying the right resources, processes and technology to protect vital HR information is important, but having adequate resources and technology in place to protect the same invaluable data in branch offices is just as important, though often overlooked. This paper will teach you how real-time data replication software can automatically backup branch office data to a central server for a simpler, more reliable and cost-effective way to protect your branch.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
DoubleTake
Published By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : 
backup infrastructure, legacy systems, overload infrastructure, cloud
    
Arcserve
Published By: SAS     Published Date: Sep 08, 2010
This paper describes five business analytics styles used today and the building blocks required in implementing these styles. It is important to consider which of these styles is valid for your organization now and into the future.
Tags : 
sas, reporting, data warehouses, business activity monitoring, data integration
    
SAS
Published By: SAS     Published Date: Mar 14, 2014
This paper will discuss the barriers to data-driven decision making for midsized businesses, and how experts and non-experts alike can use SAS Visual Analytics to unlock the value of data – including big data – to increase revenue, cut operational costs and better manage their business.
Tags : 
sas, bottom line, midsized businesses, leveraging data, data management, internal and external, decision making, big data
    
SAS
Published By: IBM     Published Date: Oct 24, 2013
This analyst research paper contains findings from Aberdeen Group on the financial reporting pressures, challenges faced by organizations particularly with regulatory mandates
Tags : 
ibm, aberdeen group, financial reporting pressures, financial challenges, analyst insight, disclosure management, organizational transparency, organizational collaboration
    
IBM
Published By: Intacct     Published Date: Feb 18, 2014
Learn the 4 essential features to bring your accounting system out of the Stone Age.
Tags : 
intacct, accounting, quickbooks, modern accounting system, data, real time data
    
Intacct
Published By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : 
visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence
    
Datawatch
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Group M_IBM Q2'19     Published Date: Jun 10, 2019
In the era of individual-centered economy, customers are demanding faster, more personalized services. To deliver these services, successful organizations realize the benefits of accurate and trusted master data. And in today's always on society, companies can no longer afford to allow downtime for maintenance and scheduled upgrades for these services and the supporting applications. With low latency capabilities in IBM InfoSphere Master Data Management designed to easily connect to applications in a zero-downtime environment, the highest demands for user interactions can now be realized. As a result, businesses can therefore take the next step in their digital transformation initiatives to truly drive personalized differentiated customer experiences to separate themselves in today's crowded marketplace. View this webinar to discover how IBM MDM puts these capabilities within easy reach. The webinar will: Reveal how these capabilities are being delivered on-premise and on t
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft
    
IBM
Published By: IBM     Published Date: Jan 12, 2016
The core principles of retailing may remain the same but the methods by which retailers must reach out to customers are constantly evolving. As the need for real-time analytics and customer information grows more important, retailers need robust systems to manage the ever-expanding volumes of data.
Tags : 
customer experience, transaction processing, omnichannel banking, consumer demands, customer interaction, shopper experience, retail
    
IBM
Published By: IBM     Published Date: Feb 03, 2016
The more real-time and granular your data is, the more responsive and competitive your organization can become.
Tags : 
ibm, data management, apache, hadoop, analytics
    
IBM
Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.