data architecture

Results 201 - 225 of 443Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Apr 04, 2012
IT departments are always being asked to deliver more for less. SOA has garnered widespread attention because it promises to do just that - deliver more business benefit while reducing costs. This is why Oracle has developed a pragmatic approach.
Tags : oracle, apm, enterprise manager, java ee, soa, data grid, application grid, soa
     Oracle
By: Teradata     Published Date: Feb 26, 2013
This survey and research report discusses shifts in the data management landscape and the movement to align data with operational and analytical workloads creating the best possible unified data architecture platform. Read on to learn more.
Tags : big data, survey report, data management, landscape, movement, align data, operational and analytics workloads, business intelligence
     Teradata
By: Teradata     Published Date: Feb 26, 2013
This report explores the evolution of big data analytics and its maturity within the enterprise. It discusses the approaches and economics to using a Discovery platform and Apache Hadoop within the same unified analytical architecture.
Tags : big data analytics, experiences with teradata, apache hadoop, analytics, discovery platform, apache hadoop, teradata, it management
     Teradata
By: Teradata     Published Date: Feb 26, 2013
Business Insights Using Hadoop with SQL Analytics. Harness the value of big data analytics -- This report discusses a unified data architecture solution providing valuable insight from new and existing data.
Tags : power of analytics, harnessing the value of big data, business intelligence, teradata, unified data architecture, it management, data management, business technology
     Teradata
By: Teradata     Published Date: Feb 26, 2013
Data is now available, often in endless amounts, from many rich sources. This article discusses the answers to how organizations can thrive in this era of rich and boundless information using a Unified Data Architecture platform.
Tags : gaining value from emerging data, nothing more than just the next step, data mining, unified data architecture platform, social media, mobile devices, it management, data center
     Teradata
By: Workterra     Published Date: Nov 10, 2017
Mid-market HR today is being asked to be a business partner in areas that range from compliance to employee engagement. They need to be able to connect the dots among various sources of employee data to deliver better-informed business decisions to help achieve strategic goals. Connecting those dots and delivering those results demands more HR firepower and greater data visibility than the manual or homegrown processes and systems often used by mid-market organizations can deliver. On the other hand, most mid-market companies aren’t ready for the intricacies or expense of human capital management (HCM) systems designed for enterprise-level organizations. The answer for forward-thinking HR leaders who want to boost their team’s capabilities and play a greater role in their company’s future is having core HR functionality designed into an integrated benefits administration solution. Automated HR that delivers core HR features as part of its architecture — not as an afterthought or a separate, stand-alone module — gives HR leaders: • The tools they need to better handle their administrative work • The data and analytics necessary to better coordinate programs and more confidently make strategic decisions • A user experience that makes life easier for HR and employees
Tags : 
     Workterra
By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
     Ciena
By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: CA Technologies EMEA     Published Date: May 23, 2018
To move your business from its current state to the connected enterprise, you have to define a common API to your database and other systems, while providing the infrastructure to support the new model. The new systems must incorporate the security safeguards while ensuring the infrastructure can support the new growing, but variable, load. With the rapid adoption of mobile and web-based services across the industry, the REST architecture has emerged as the de facto standard for API integration across systems. This white paper addresses the concepts of REST, creating REST APIs for your databases and integrating with other systems: • What is REST? • Why use REST for database access? • Building REST infrastructure for database access • The REST enabled database • Integrating REST with other services • Criteria for selecting REST services platform
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
     CA Technologies EMEA
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Learn how Forcepoint Solutions can help you successfully adopt Office 365 and protect your entire cloud environment Driving Office 365 adoption is an important goal—87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance, and poor user experience caused by network architecture limitations and constraints. Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite. Enhance Microsoft's integrated cloud security and regain visibility and protection against advanced attacks and data loss Extend compliance consistently into the Microsoft ecosystem and beyond Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to t
Tags : 
     Forcepoint
By: BMC ASEAN     Published Date: Dec 18, 2018
400+ IT professionals reveal what’s next for workload automation How are today’s leading companies using workload automation to drive their most important IT initiatives? Find out in this detailed report summary from analyst firm Enterprise Management Associates (EMA). You’ll learn how the role of workload automation is evolving, including: The rise of predictive analytics in WLA Surprising stats on the frequency and ease of migration How big data and cloud impact WLA The use of containers and micro services architectures Workload automation is changing fast. Keep up with the latest analyst research – download the report.
Tags : 
     BMC ASEAN
By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create “virtual workforces” of robotic workers.
Tags : 
     Blue Prism
By: Citrix NetScaler     Published Date: May 06, 2013
The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience and maintaining the highest levels of employee productivity and customer satisfaction. The challenge of establishing an effective application visibility and control function is only growing, as trends such as mobility, virtualization, and cloud computing fundamentally alter datacenter and application architectures. With NetScaler Insight Center enterprises get: • Unparalleled application visibility and invaluable operational intelligence; • Increased operational efficiency, as troubleshooting and capacity planning efforts are greatly simplified; • An optimized user experience that drives greater employee productivity and customer satisfaction; • Increased assurance that governing SLAs will always be met; and, • Reduced total cost of ownership, based on having a low-cost, low-impact solution—particularly compared to traditional
Tags : application visibility, netscaler insight center, optimized user experience, low cost, citrix, knowledge management, enterprise applications
     Citrix NetScaler
By: Symantec     Published Date: Nov 19, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
     Symantec
By: Amazon Web Services     Published Date: Sep 05, 2018
Big data alone does not guarantee better business decisions. Often that data needs to be moved and transformed so Insight Platforms can discern useful business intelligence. To deliver those results faster than traditional Extract, Transform, and Load (ETL) technologies, use Matillion ETL for Amazon Redshift. This cloud- native ETL/ELT offering, built specifically for Amazon Redshift, simplifies the process of loading and transforming data and can help reduce your development time. This white paper will focus on approaches that can help you maximize your investment in Amazon Redshift. Learn how the scalable, cloud- native architecture and fast, secure integrations can benefit your organization, and discover ways this cost- effective solution is designed with cloud computing in mind. In addition, we will explore how Matillion ETL and Amazon Redshift make it possible for you to automate data transformation directly in the data warehouse to deliver analytics and business intelligence (BI
Tags : 
     Amazon Web Services
By: Fujitsu     Published Date: Dec 22, 2015
This whitepaper reveals how Ceph can be summed up as an open source software solution conceived and built to deliver hyper-scale performance and almost limitless expandability.
Tags : ceph, storage, software, big data, data, scalability, storage infrastructure, software solution
     Fujitsu
By: Epicor     Published Date: Aug 03, 2012
Risk-averse distributors may feel that the safest and simplest IT strategy is to stay with their existing "homegrown" enterprise resource planning (ERP) solution. But just as sticking your money under the mattress offers no protection against inflation, maintaining an outdated system can rob you of a distinct competitive advantage.
Tags : immediacy, erp software, data duplication, data discrepancies, lack of testing, lack of vision, new advances, systems architecture
     Epicor
By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
     VeriSign Incorp.
By: F5 Networks Inc     Published Date: Jan 22, 2009
The demand for (and benefits of) web-based interfaces combined with an increasingly mobile and distributed workforce has exposed inefficiencies inherent in the browser, the network and its protocols, and the data center. These inefficiencies create performance problems for applications that continue to be magnified by emerging technologies like Web 2.0 and SOA. This White Paper details how F5's approach to Application Delivery Networking eliminates the bottlenecks inherent in browsers, in the network, and in the data.
Tags : web acceleration 2.0., web-based interfaces, data center, soa, service-oriented architecture, application delivery networking, enterprise applications, data management
     F5 Networks Inc
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com