"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

data change

Results 276 - 300 of 376Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Mar 06, 2018
Machines learn by studying data to detect patterns or by applying known rules to: • Categorize or catalog like people or things • Predict likely outcomes or actions based on identified patterns • Identify hitherto unknown patterns and relationships • Detect anomalous or unexpected behaviors The processes machines use to learn are known as algorithms. Different algorithms learn in different ways. As new data regarding observed responses or changes to the environment are provided to the “machine” the algorithm’s performance improves. Thereby resulting in increasing “intelligence” over time.
Tags : 
    
SAS
Published By: Evergreen Systems, Inc.     Published Date: Dec 16, 2008
This comprehensive white paper applies automation and ITIL best practices to the data center and reviews current industry trends, server automation energy usage issues and a variety of optimization strategies for data center improvement.  The effects of virtualization are explored in-depth.  Includes detailed sections on increasing operational efficiency using workflow analysis, automating and optimizing server change management, reducing infrastructure complexity and developing security, disaster recovery and business continuity procedures.  Step by step instructions for developing metrics and a business case to justify data center and server automation are included.
Tags : 
evergreen system, data center automation, data center automation manager, network automation, server automation, server virtualization, itil, data center optimization, roi, server management, data storage, server storage, it management, enterprise applications, storage, data management, storage management, service management, data center design and management
    
Evergreen Systems, Inc.
Published By: Salesforce.com     Published Date: Mar 11, 2008
This 34 page guide readies you for a Salesforce Mobile rollout. Salesforce Mobile helps your mobile teams succeed by keeping them in touch with the latest data, whenever and wherever they need it, directly from mobile devices. With Salesforce Mobile, field professionals are prompted to log information directly in Salesforce or AppExchange apps immediately after important customer calls, emails, and appointments, so critical information is logged in near real time.
Tags : 
salesforce, crm, customer relationship management, sales tools, collaboration, smart phones, blackberry, appexchange, salesforce mobile, best practices, business intelligence, project management
    
Salesforce.com
Published By: Pillar Data Systems     Published Date: Apr 20, 2010
The most critical component of an Exchange deployment is the storage subsystem where the data is held. Download this white paper to learn best practices in storage sizing and deployment.
Tags : 
pillar data systems, microsoft exchange best practices, storage size, exchange deployment, virtualization, storage configuration, data priority, storage virtualization, best practices, microsoft exchange
    
Pillar Data Systems
Published By: ZoomInfo     Published Date: Sep 07, 2010
Generate highly-qualified candidate lists effortlessly and instantly connect with direct contact information. The ZoomInfoT Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation candidate sourcing tool, ZoomInfoT Pro, featuring robust search criteria, in-depth candidate profiles, and automated alerts on profile updates and changes. Start your free trial today.
Tags : 
zoominfo, candidate, search, database, sourcing, pipeline, conversion rates
    
ZoomInfo
Published By: Intel Corp.     Published Date: Aug 08, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated storage and the discernment to send new data or not is performed within the production server instead of the backup server or deduplicated storage. Hence, network savings begin at the production server and backups are significantly faster since only changed data is transmitted from the production server to the storage solution.
Tags : 
dedupe, 2.0, store, once, enterprise, strategy, group, client, deduplication, dedupe, awareness, backup, server, storage, device, data, it management, data management, backup and recovery, blade servers
    
Intel Corp.
Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud, server, technology, configuration, cloudformation, security, knowledge management, enterprise applications
    
Amazon Web Services, Inc
Published By: Adobe     Published Date: Apr 03, 2015
A lack of executive support and poor data quality are just some reasons why analytics programs fail. The guide by Adam Greco, Reenergize Your Web Analytics, identifies the key reasons for program failures and provides ten ways to make your analytics program successful. Read the guide to discover key ways to improve your analytics program, including: • How to deal with your stakeholders • How to set your analytics priorities • How to reap the rewards of change
Tags : 
analytics program, stakeholders, adobe, marketing, personalization
    
Adobe
Published By: Exablox     Published Date: Jan 27, 2015
Object-based storage (referred to as OBS throughout this document) platforms continue to perpetuate cloud and enterprise IT infrastructure. As businesses move toward petabyte-scale data storage, OBS solutions are turning out to be the right choice for balancing scale, complexity, and costs. By way of their core design principles, OBS platforms deliver unprecedented scale at reduced complexity and reduced costs over the long term. Early OBS platforms suffered from "necessity crisis," were too cumbersome to deploy and, in some cases, caused a platform lock-in because of their proprietary access mechanisms. In spite of their from-the-ground-up design, a departure from how traditional SAN and NAS arrays are deployed and, more importantly, a lack of standard interfaces made it difficult for IT organizations to deploy OBS solutions in the infrastructure. Thanks to Amazon S3 and OpenStack Swift becoming de facto access interfaces, this situation has changed.
Tags : 
network attached storage, nas arrays, storage efficiency, idc storage marketscape, storage data resiliency, storage platform scalability, exablox, oneblox, it management
    
Exablox
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Over 90% of organizations believe that the GDPR will impact the way they collect, use and process personal data. It’s one of the biggest changes to hit the digital privacy landscape in 20 years. And, in May 2018, the EU General Data Protection Regulation (GDPR) will introduce maximum fines of €20 million for non-compliance.
Tags : 
digital privacy, data protection, gdpr, organization optimization, technical challenges, data regulation, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : 
compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data, pci dss, data protection, database security, authentication, monitoring, change management, tripwire
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Understand the compliance requirements of the European Union's Markets in Financial Instruments Directive (MiFiD), and how controlling IT change addresses many of those requirements.
Tags : 
tripwire, mifid, compliance, requirements, europe, markets, european union, financial, instruments, institution, administration, control, address, directive, security, data, control, information, organization, change
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Since the adoption of SOX, much has been learned about IT compliance. Discover how to make SOX efforts more effective in "Sustaining Sox Compliance."
Tags : 
tripwire, sustain, sox, compliance, practice, risk, control, data, security, system, administration, institution, automated, reduce, cost, effective, sustainability, governance, business, change
    
Tripwire
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization has changed the data center dynamic from static to fluid. While workloads used to be confined to the hardware on which they were installed, workloads today flow from host to host based on administrator-defined rules, as well as in reaction to changes in the host environment. The fluidic nature of the new data center has brought challenges to resource allocation; find out how your organization can stay ahead of the curve. Read the White Paper"
Tags : 
best practices, cpu, memory, storage, vsphere, virtual, storage management, virtualization, infrastructure
    
Dell
Published By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
networks, ibm, redefining networks, cloud, analytics, mobile, social, security, big data, it security, data center, enterprise networks, it management, data management
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
ibm, network, cloud, analytics, mobile, social, big data, it security, networking, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 21, 2016
"Reshaping trading partner communities with growth, agility and scalability View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM B2B Cloud Services cite, including: - Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners"
Tags : 
ibm, b2b, cloud, b2b integration, cloud computing
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM Sterling B2B Cloud Services cite, including: -Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners
Tags : 
ibm, commerce, b2b, b2b integration, cloud, advantage cloud, networking, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running
Tags : 
    
IBM
Published By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : 
endpoints, employees, security landscape, security leaders, it security, unified endpoint management
    
IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Special Report

What does it take to succeed in today’s hypercompetitive and hyperconnected digital economy? Keep reading to find out.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory