• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

data practices

Results 151 - 175 of 405Sort Results By: Published Date | Title | Company Name
By: TIBCO Software     Published Date: Sep 12, 2018
By processing real-time data from machine sensors using artificial intelligence and machine learning, it’s possible to predict critical events and take preventive action to avoid problems. TIBCO helps manufacturers around the world predict issues with greater accuracy, reduce downtime, increase quality, and improve yield. Read about our top data science best practices for becoming a smart manufacturer.
Tags : 
inter-company connectivity, real-time tracking, automate analytic models, efficient analytics, collaboration
    
TIBCO Software
By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
By: Macquarie Telecom     Published Date: Mar 30, 2015
This Guide will help companies to improve the effectiveness of their existing strategy or are looking to make their first move into the cloud.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions
    
Macquarie Telecom
By: StreamSets     Published Date: Sep 24, 2018
The advent of Apache Hadoop™ has led many organizations to replatform their existing architectures to reduce data management costs and find new ways to unlock the value of their data. One area that benefits from replatforming is the data warehouse. According to research firm Gartner, “starting in 2018, data warehouse managers will benefit from hybrid architectures that eliminate data silos by blending current best practices with ‘big data’ and other emerging technology types.” There’s undoubtedly a lot to ain by modernizing data warehouse architectures to leverage new technologies, however the replatforming process itself can be harder than it would at first appear. Hadoop projects are often taking longer than they need to create the promised benefits, and often times problems can be avoided if you know what to avoid from the onset.
Tags : 
replatforming, age, data, lake, apache, hadoop
    
StreamSets
By: StreamSets     Published Date: Dec 05, 2018
Enterprise analytics is quickly evolving into a democratized capability where anyone can access and act on all available information, often in real-time employing advanced techniques. But the complex, dynamic and urgent nature of modern data analytics demands a new approach to data integration. This paper proposes that DataOps, the application of DevOps practices to data analytics, is the best way to overcome these challenges to create an iterative build-operate process for data movement. Read this white paper to: Understand how modern data analytics create data integration challenges due to architectural complexity, operational blindness and data drift. Learn how DevOps pillars of automation and monitoring can create higher developer productivity, operational efficiency and business confidence in data. See specific examples of DataOps functionality being applied to data integration across modern architectures.
Tags : 
    
StreamSets
By: Oracle     Published Date: Apr 22, 2015
This paper explores the benefits of modern EPM tools for finance organisations.
Tags : 
enterprise performance management, epm, finance, epm trends, finance leaders, cloud computing, mobile technology, big data finance
    
Oracle
By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy, compliance, email security, intrusion prevention
    
M86 Security
By: Pentaho     Published Date: Apr 28, 2016
As data warehouses (DWs) and requirements for them continue to evolve, having a strategy to catch up and continuously modernize DWs is vital. DWs continue to be relevant, since as they support operationalized analytics, and enable business value from machine data and other new forms of big data. This TDWI Best Practices report covers how to modernize a DW environment, to keep it competitive and aligned with business goals, in the new age of big data analytics. This report covers: • The many options – both old and new – for modernizing a data warehouse • New technologies, products, and practices to real-world use cases • How to extend the lifespan, range of uses, and value of existing data warehouses
Tags : 
pentaho, data warehouse, modernization, big data, bug data analytics, best practices, networking, it management
    
Pentaho
By: Tripp Lite     Published Date: Jun 28, 2018
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. End users may assume they need to increase cooling capacity, but this is often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : 
    
Tripp Lite
By: NetApp     Published Date: Oct 08, 2013
Learn how efficient NetApp IT empowers the Denver Broncos to invest in the future by providing asychronous disaster recovery and data protection.
Tags : 
data protection, security, netapp, disaster recover, technology, best practices, it management, data management
    
NetApp
By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
By: Dell EMC     Published Date: Jun 29, 2016
EMC Isilon scale-out network-attached storage (NAS) is a simple and scalable platform to build a scale-out data lake and persist enterprise files of all sizes that scale from terabytes to petabytes in a single cluster. It enables you to consolidate storage silos, improve storage utilization, reduce costs, while providing you a future proofed platform to run today and tomorrow's workloads.
Tags : 
network, storage, data, best practices, network attached storage, storage area networks, storage management, storage virtualization
    
Dell EMC
By: Dell EMC     Published Date: Jun 29, 2016
EMC Isilon Cloudpools software provides policy-based automated tiering that lets you seamlessly integrate with the cloud as on additional storage tier for the isilon cluster at your data center. Learn more about groundbreaking software in this solution brief.
Tags : 
data, storage, best practices, enterprise, management, network attached storage, storage area networks, storage management
    
Dell EMC
By: Dell EMC     Published Date: Jun 29, 2016
The EMC IsilonSD product family combines the power of Isilon scale-out NAS with the economy of software-defined storage. IsilonSD Edge is purpose built to address the needs associated with growing unstructured data in enterprise edge location including remote and branch offices. Read the solution brief to find out more about the power of software-defined storage combined with EMC Isilon.
Tags : 
storage, data, best practices, enterprise, network attached storage, storage area networks, storage management
    
Dell EMC
By: Dell EMC     Published Date: Jun 29, 2016
IDC believes that EMC Isilon is indeed an easy to operate, highly scalable and efficient Enterprise Data Lake Platform. IDC validated that a shared storage model based on the Data Lake can in fact provide enterprise-grade service-levels while performing better than dedicated commodity off-the-shelf storage for Hadoop workloads.
Tags : 
storage, data, enterprise, best practices, platform, network attached storage, storage area networks, storage management
    
Dell EMC
By: AWS     Published Date: Nov 15, 2018
Businesses are generating staggering amounts of data—and extracting the most value from this information is paramount. Amazon Redshift provides organizations what they’re looking for: Affordability and flexibility combined with a powerful feature set. Download our solution overview covering some of the best practices on loading data and making the most of Amazon Redshift, including: • Loading data for faster results • Querying data for gaining actionable insights • Creating a schema to forgo complicated queries, saving time
Tags : 
    
AWS
By: AWS     Published Date: Jan 03, 2019
Managing your data can be a challenge, but establishing an analytics solution that every user can navigate, regardless of skillset, is where organizations often need help. TIBCO® Spotfire® features AI-driven data visualizations and dashboards, which helps enables each organizational role to discover and deliver valuable insights with ease. Riteway Sales and Marketing, which helps many Southeastern supermarkets execute strategies, leveraged the power of TIBCO Spotfire to better understand individual product performance throughout their stores, achieving exponentially faster time to insight than their previous solution allowed. Watch this on-demand webinar to learn how TIBCO Spotfire, when leveraged on Amazon Web Services cloud, can help you generate deep insights in minutes. You’ll learn: • How to generate relevant, actionable insights from any data, anywhere • Some of the best practices for leveraging AI-driven visual and predictive analytics solutions in the cloud • How to
Tags : 
    
AWS
By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: May 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter