asset data

Results 26 - 50 of 193Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software     Published Date: Feb 14, 2019
Tips and best practices for data analytics executives Organizations today understand the value to be derived from arguably their greatest asset—data. When successfully aggregated and analyzed, data can unlock valuable insights, solve problems, improve products and services, and help companies gain a competitive edge. However, analytics executives face significant challenges in collecting, validating and analyzing data to deliver the right analytic insight to the right person at the right time. This e-book is designed to help. First, we'll explore the growing expectations for data analytics and the rise of the analytics executive. Then we'll explore a range of specific challenges those executives face, including those around data blending, analytics, and the organization itself, and offer best practices and strategies for meeting them.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Feb 14, 2019
Tips and best practices for data analytics executives Organizations today understand the value to be derived from arguably their greatest asset—data. When successfully aggregated and analyzed, data can unlock valuable insights, solve problems, improve products and services, and help companies gain a competitive edge. However, analytics executives face significant challenges in collecting, validating and analyzing data to deliver the right analytic insight to the right person at the right time. This e-book is designed to help. First, we'll explore the growing expectations for data analytics and the rise of the analytics executive. Then we'll explore a range of specific challenges those executives face, including those around data blending, analytics, and the organization itself, and offer best practices and strategies for meeting them. We'll also provide a short overview of TIBCO Statistica, an easy-to-use predictive analytics software solution designed to turn big data into your bigg
Tags : 
    
TIBCO Software
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Choosing Azure revolutionizes your environment's agility, simplicity, and innovation, but have you achieved the cost savings you expected? Discover 10 ways you can reduce your spend in Azure, including: -Terminate Zombie Assets -Delete Aged Snapshots -Rightsize Virtual Machines -Rightsize SQL Databases Read 10 Best Practices for Reducing Spend in Azure, to learn key strategies for optimizing cloud spend and saving 10-20% on your monthly Azure costs.
Tags : 
cloud management, microsoft azure, multicloud management
    
CloudHealth by VMware
Published By: HERE Technologies     Published Date: Feb 13, 2019
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: Rubrik EMEA     Published Date: Jan 04, 2019
Your company’s data is an irreplaceable asset, and every day your users are creating and storing that data on a mounting diversity of devices as well as in the cloud.
Tags : 
data, api, functionality, gui, backup, software, scripting, management
    
Rubrik EMEA
Published By: HERE Technologies     Published Date: Dec 05, 2018
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: AWS     Published Date: Nov 28, 2018
Financial institutions run on data: collecting it, analyzing it, delivering meaningful insights, and taking action in real time. As data volumes increase, organizations demand a scalable analytics platform that can meet the needs of data scientists and business users alike. However, managing an on-premises analytics environment for a large and diverse user base can become time-consuming, costly, and unwieldy. Tableau Server on Amazon Web Services (AWS) is helping major Financial Services organizations shift data visualization and analytics workloads to the cloud. The result is fewer hours spent on manual work and more time to ask deeper questions and launch new data analyses, with easily-scalable support for large numbers of users. In this webinar, you’ll hear how one major asset management company made the shift to cloud data visualization with Tableau Server on AWS. Discover lessons learned, best practices tailored to Financial Services organizations, and starting tactics for scalable analytics on the cloud.
Tags : 
    
AWS
Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike
Published By: MuleSoft     Published Date: Nov 27, 2018
Traditional insurers are no longer safe with insurtechs challenging incumbents to rethink their business and operating models. This mass disruption creates increased pressure on IT to deliver intrinsic business value, including new services, customer touchpoints, and experiences. Successful insurance transformation requires rethinking the traditional IT operating model to allow IT to focus on creating reusable assets that empower lines of business. Doing so increases IT’s delivery capacity, making businesses more agile. Read this whitepaper to learn: An overview of the challenges insurers are facing in the industry. How a new IT operating model – API-led connectivity – allows IT teams to unlock data from legacy systems and drive reuse across the enterprise. Strategies for using APIs to create a single view of the customer and build connected customer experiences.
Tags : 
    
MuleSoft
Published By: Flexera     Published Date: Nov 19, 2018
In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Enterprise Architecture (EA), IT Service Management (ITSM) and Security teams need enriched technology asset data and accurate analytics so they can keep the enterprise running like a well-oiled machine. Join us to hear R “Ray” Wang, Principal Analyst and Founder of Constellation Research, and Alan Lopez, Senior Director of Global Product Marketing from Flexera, discuss use cases where asset data and analytics are becoming business-critical.
Tags : 
    
Flexera
Published By: HERE Technologies     Published Date: Sep 26, 2018
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Complete the form to the right to receive the ebook today.
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: SAS     Published Date: Aug 28, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues. As our corporate data stores have grown in both size and subject area diversity, it has become clear that a strategy to address data is necessary. Yet some still struggle with the idea that corporate data needs a comprehensive strategy. There’s no shortage of blue-sky thinking when it comes to organizations’ strategic plans and road maps. To many, such efforts are just a novelty. Indeed, organizations’ strategic plans often generate very few tangible results for organizations – only lots of meetings and documentation. A successful plan, on the other hand, will identify realistic goals along with a r
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
    
SAS
Published By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 07, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
    
Oracle
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"MVP ASSET IN STORAGE CAMPAIGN • HPE enhanced the perception of SimpliVity's supportability and stability by leveraging the global go-to-market reach and capabilities of HPE and its channel partners. • SimpliVity delivers robust data services, such as in-line global compression and deduplication combined with an integrated backup solution and rapid disaster recovery capabilities for operational simplicity and cost reduction. • The HPE ProLiant DL380 installed base and global market acceptance make SimpliVity one of the top choices as an HCI platform for existing HPE customers."
Tags : 
    
Hewlett Packard Enterprise
Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
This workshop explains and demonstrates how to secure your infrastructure, protect your digital assets, and automate threat detection and incident correction—providing complete visibility into your data center security operations.
Tags : 
    
Hewlett Packard Enterprise
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
If your business is like most, you are grappling with data storage. In an annual Frost & Sullivan survey of IT decision-makers, storage growth has been listed among top data center challenges for the past five years.2 With businesses collecting, replicating, and storing exponentially more data than ever before, simply acquiring sufficient storage capacity is a problem. Even more challenging is that businesses expect more from their stored data. Data is now recognized as a precious corporate asset and competitive differentiator: spawning new business models, new revenue streams, greater intelligence, streamlined operations, and lower costs. Booming market trends such as Internet of Things and Big Data analytics are generating new opportunities faster than IT organizations can prepare for them.
Tags : 
    
Hewlett Packard Enterprise
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.