data system

Results 926 - 950 of 1298Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 16, 2014
Speed, simplicity and affordability: 3 capabilities businesses need from their warehousing environment. IBM DB2 with BLU Acceleration gives organizations a complete, multipurpose environment to rapidly distill insight from their data, make timely decisions and capitalize on opportunities
Tags : 
ibm, data warehouse, warehouse environment, speed, simplicity, affordibility, db2 with blu, acceleration
    
IBM
Published By: IBM     Published Date: Apr 16, 2014
IBM DB2 offers multi-platform flexibility and optimized capabilities for a variety of workloads. This e-book highlights some common scenarios where DB2 helps businesses derive unprecedented value from expanding data stores—affordably and reliably.
Tags : 
ibm, ibm db2, platform, flexibility, workload, data stores, agile, infrastructure
    
IBM
Published By: IBM     Published Date: May 02, 2014
This paper introduces you to Big SQL, answering many of the common questions that relational database management system (DBMS) users have about this IBM technology.
Tags : 
ibm, big data, big sql, querying data, database management technology, apache hadoop, data administrators, infosphere
    
IBM
Published By: IBM     Published Date: May 02, 2014
These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse.
Tags : 
ibm, big data platform, architecting big data, analytics, intelligent business strategies, data complexity, data types, workload growth
    
IBM
Published By: IBM     Published Date: May 28, 2014
The ability to keep pace with trends like big data, open data, sophisticated analytics, and the de-compartmentalization of data silos and processes, distinguishes leading master data management (MDM) solutions from their counterparts. IBM, one of the five vendors in this evaluation, is positioned as THE leader with the most prominent, widely implemented solution in the market.
Tags : 
ibm, forrester, master data management, big data, database management technology, data administrators, infosphere, biginsights
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
With disastrous data breaches in the headlines, retail executives need to re-think the dangers of their digital environment. What are the best ways to protect the business? Keeping ahead of attackers will require a combination of systems defense, analytics and the ability to react quickly
Tags : 
ibm, retail, data, security, digital, defense, analytics
    
IBM
Published By: IBM     Published Date: Sep 15, 2014
In business timing is everything, especially for business-critical applications. Delays in delivering critical data and processing can significantly increase business and financial risks. IBM’s new eBook FlashAhead discusses these challenges and offers up the all-flash storage system as a solution.
Tags : 
data center economics, application performance, critical data, big data, flash storage, storage system, data management
    
IBM
Published By: IBM     Published Date: Sep 16, 2014
To compete in today’s rapidly changing business environment, organizations need to capture, analyze and act on information rapidly. If they can quickly identify trends, discover patterns and generate new insights, they can address a wide array of strategic and operational goals—from increasing customer loyalty and creating targeted marketing offers to enhancing operational efficiency and reducing risk. In their report, Business Value of Big Data on Power Systems, NC State University talks about unlocking the business value of big data, and how IBM Power Systems can deliver the foundation for organizations to bring insight to the point of impact faster.
Tags : 
big data, targeted marketing offers, ibm power systems, structured data, data management
    
IBM
Published By: IBM     Published Date: Dec 02, 2014
Across the automotive industry, organizations are using analytics to transform all aspects of their business. In the vast majority of instances, the analytics performed is on data that is already available within the organization or wider automotive ecosystem, but has not yet been tapped to use its full potential. Analytics can unlock the value held in this data, helping to answer key “what if” questions across the organization and the value chain. For example, what if dealerships could better understand their customers’ digital journey? Or what if manufacturing could improve visibility into parts, assembly and vehicle inventory?
Tags : 
automotive analytics, automotive ecosystem, automotive manufacturing, advanced analytics, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, cloud, social business, big data, data security, data protection, privacy, security
    
IBM
Published By: IBM     Published Date: Jan 13, 2016
By using InfoSphere Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of-impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time.
Tags : 
ibm, data, infosphere, server, data warehousing, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Jan 14, 2016
Built using the IBM® InfoSphere® Information Server, IBM BigInsights® BigIntegrate and BigInsights BigQuality provide the end-to-end information integration and governance capabilities that organizations need.
Tags : 
ibm, biginsights, bigintegrate, bigquality, data, ecosystem, governance, integration
    
IBM
Published By: IBM     Published Date: Jan 14, 2016
Built using the IBM® InfoSphere® Information Server, IBM BigInsights® BigIntegrate and BigInsights BigQuality provide the end-to-end information integration and governance capabilities that organizations need.
Tags : 
ibm, biginsights, bigintegrate, bigquality, data, ecosystem, governance, integration
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data, security
    
IBM
Published By: IBM     Published Date: Apr 18, 2016
"Built using the IBM® InfoSphere® Information Server, IBM BigInsights® BigIntegrate and BigInsights BigQuality provide the end-to-end information integration and governance capabilities that organizations need."
Tags : 
ibm, big data, ibm infosphere, ibm biginsights, ibm bigintegrate, ibm bigquality, data management, data quality
    
IBM
Published By: IBM     Published Date: Apr 18, 2016
By using InfoSphere Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of-impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time.
Tags : 
ibm, big data, ibm infosphere, information empowerment, data integration, data management
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi, security
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
    
Group M_IBM Q418
Published By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: Jun 21, 2017
Today, it’s unlikely that a single database will meet all your needs. For a variety of reasons—including the need to support cloud-scale solutions and increasingly dynamic app ecosystems—startups and enterprises alike are embracing a wide variety of open source databases. These varied databases—including MongoDB, Redis and PostgreSQL— open doors to building sophisticated and scalable applications on battle-hardened, non-proprietary databases.
Tags : 
ibm, data base, cloud, scalability, app ecosystem
    
IBM
Start   Previous    31 32 33 34 35 36 37 38 39 40 41 42 43 44 45    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.