integrity

Results 26 - 50 of 208Sort Results By: Published Date | Title | Company Name

Maximizing your Data Lake with a Cloud or Hybrid Approach

Published By: IBM     Published Date: Jul 06, 2017
Companies today increasingly look for ways to house multiple disparate forms of data under the same roof, maintaining original integrity and attributes. Enter the Hadoop-based data lake. While a traditional on-premise data lake might address the immediate needs for scalability and flexibility, research suggests that it may fall short in supporting key aspects of the user experience. This Knowledge Brief investigate the impact of a data lake maintained in a cloud or hybrid infrastucture.
Tags : 
data lake, user experience, knowledge brief, cloud infrastructure
    
IBM

Don't let bad data compromise your intelligence

Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19

Pipeline Integrity: How to Detect, Prevent and Mitigate Commodity Releases

Published By: Schneider Electric     Published Date: May 04, 2016
This paper discusses advanced technologies and tools that enable greater pipeline integrity, particularly computational pipeline monitoring (CPM) methodologies as a means to identify anomalies that signal a possible commodity pipeline release.
Tags : 
pipeline integrity, oil and gas, pipelines, control room, control room management, leak detection, schneider electric, telvent
    
Schneider Electric

Streaming Information for Control Room Management

Published By: Schneider Electric     Published Date: May 04, 2016
This paper discusses how an automated system helps pipeline operators comply with new federal regulations by safely reducing demands placed on controllers and the fatigue often associated with their tasks.
Tags : 
pipeline integrity, oil and gas, pipelines, control room, control room management, leak detection, schneider electric, telvent
    
Schneider Electric

CFO eBook: Transform Your Financial Close

Published By: Fiserv     Published Date: Mar 02, 2018
According to the report, Benchmarking the Accounting Function 2015, only 56% of companies currently use automation to reconcile accounts. While many finance leaders want to change the process of reconciliation, the task can seem overwhelming. However, developing a plan does not have to be complicated or time-consuming – and the benefits far outweigh the risks. A smooth, stress-free financial close adds qualitative value to the company by freeing employees to focus on strategic initiatives and ways to grow business. A CFO’s Guide to Transforming the Financial Close shares how to build a center of excellence to streamline reconciliation so you can align objectives to overall business goals. Leading-edge automation tools can stop the madness of shuffling papers, sorting emails and searching spreadsheets, turning the reconciliation process from a cost center to a value-add for the company.
Tags : 
automating financial close, streamlining reconciliation, data integrity, single version of truth, reconciliation process
    
Fiserv

The value of knowing: Build a trusted analytics foundation

Published By: IBM     Published Date: Jul 09, 2018
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions. In search of instant analytical insights, businesses often prioritize data access and analysis over governance and quality. However, without ensuring the data is trustworthy, complete and consistent, leaders cannot be confident their decisions are rooted in facts and reality
Tags : 
    
IBM

Global Employment Screening is the Right Thing To Do

Published By: First Advantage     Published Date: Apr 30, 2018
If you’re reading this ebook, you get it. Organizations like yours know that background screening is becoming a service without borders. You simply must screen the people who work for your organization, no matter where they’re from or where they work, or you risk the integrity and worldwide credibility of your company. Global screening can be very different from U.S. background screening. Availability of information, and the time and requirements to conduct the searches are different than what is standard in the U.S. That complexity is what drove the development of this eBook.
Tags : 
    
First Advantage

7 Steps to Success: Creating a Culture of Ethics, Integrity & Compliance

Published By: NAVEX Global     Published Date: Oct 15, 2014
This paper shares the 7 steps organisations need to take to ensure that they meet the requirements of standard-making bodies worldwide and to also establish a culture of ethics, integrity and compliance.
Tags : 
creating a compliance programme, how to meet compliance standards, creating a culture of ethics, integrity and compliance, compliance in the workplace, a guide to creating compliance, employee training software
    
NAVEX Global

Database Protection for Dummies

Published By: Oracle     Published Date: May 03, 2017
Traditional backup systems fail to meet the needs of modern organisations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements.
Tags : 
    
Oracle

Reduce Your Breach Risk: File Integrity Monitoring for PCI DSS Compliance and Data Security

Published By: NetIQ     Published Date: Nov 01, 2012
This paper discusses the importance of file integrity monitoring, which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches.
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance, security, business technology
    
NetIQ

Real Usage Scenarios on HP Integrity Servers

Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This whitepaper illustrates how HP Integrity virtualization technologies on the HP Integrity i2 servers play a key role in high-end UNIX® servers.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors

Accelerate Deployment of mission-critical Virtualization on Integrity Superdome 2 Servers

Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This white paper outlines and explains the core components and benefits of the HP VirtualSystem solution.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors

Accelerate Deployment of mission-critical Virtualization on HP Integrity Server Blades

Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This technical white paper outlines the mission critical reference configuration that is part of the HP Virtual System family.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors

Check Yourself Before You "Rec" Yourself

Published By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
    
BlackLine

LifeLock Breach Services Guide

Published By: LifeLock     Published Date: Sep 12, 2016
How you handle a data breach says a great deal about your company’s integrity. LifeLock Breach Response Services works with corporations to develop proactive, pre-negotiated strategies and breach response plans to stay ahead of a crisis.
Tags : 
authentication
    
LifeLock

11 Things You Should Know About Influencer Marketing

Published By: Tapinfluence     Published Date: Jun 07, 2016
By utilizing these best practices from TapInfluence, you’ll increase your brand’s credibility while building goodwill and trust with potential customers. Incorporating the expert voices of industry influencers engages your audience, highlights brand integrity, and helps further your marketing goals.
Tags : 
marketing, content marketing, best practices, business optimization, business practices, business intelligence, business management
    
Tapinfluence

With Data Breaches on the Rise, HP Point of Sale Systems Offer Protection

Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.

The Indegy Industrial Cybersecurity Suite

Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy

Database Protection for Dummies

Published By: Oracle     Published Date: Oct 20, 2017
Traditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance
Tags : 
    
Oracle

2018 Market Report: Fighting Bribery and Corruption on the Global Stage

Published By: NAVEX Global     Published Date: Apr 20, 2018
Our new market report takes an in depth look at recent developments and offers insight into running a compliant and ethical global business. With primary research and articles written by industry experts, you’ll get answers to some of today’s most important questions like: How are businesses navigating the risks posed by global supply chains? Have compliance risks changed since the rise of anti-corruption purges? How do you set the right tone for disclosing misconduct in the workplace? How can I evaluate the integrity of third parties within the era of fake news?
Tags : 
    
NAVEX Global

Overall Approach to Data Quality ROI.

Published By: SAP Inc.     Published Date: Jul 28, 2009
Data quality is an elusive subject that can defy measurement and yet be critical enough to derail any single IT project, strategic initiative, or even a company as a whole.
Tags : 
roi, data quality, sap, return-on-investment, crm, erp, enterprise resource management, customer relationship management
    
SAP Inc.

IaaS For Solution Providers: Finding the Right Mix

Published By: ProfitBricks     Published Date: Apr 01, 2013
The value of conventional on-premises servers is eroding. As with all decay, it starts slowly and declines steadily. Bits and pieces of the physical server market are peeling off as businesses turn away from conventional data center and IT closet deployments in favor of cloud-based infrastructure-as-a-service (IaaS). And there’s no shortage of IaaS; hosting and service-provider companies are flooding the market with low-cost access to hosted servers. The challenge for adopting businesses is leveraging hosted assets that guarantee data security and integrity with fine-grained levels of adjustable capacity, high performance and price predictability.
Tags : 
iaas, solution, cloud-based
    
ProfitBricks

Medamerica Billing Services: Xangati’s Root Cause Analysis Keeps Operations Running Smoothly

Published By: Xangati     Published Date: Feb 04, 2016
MBSI was providing approximately 800 virtual desktops to their employees using VMware Horizon with View and 8 VMware ESXi hosts and they were running an additional 140 virtual servers using 5 VMware ESXi hosts – all on a Tegile Hybrid SAN. “It was shortly after we converted from ICD-9 diagnosis codes to ICD-10 codes that performance for the VDI desktops began to suffer noticeably,” explained Shawn Wood, Assistant Manager of Systems Administration, MBSI. “We have relied on Xangati for a number of years now to help us quickly see where bottlenecks are in a short period of time. It's an important part of maintaining the integrity of our infrastructure.” Read more to learn how Xangati helped MBSI address this problem.
Tags : 
xangati, medamerica, mbsi, case study, networking, security, it management, enterprise applications
    
Xangati

How a Rideshare Giant Uses AI to Detect Business Anomalies

Published By: AWS     Published Date: Aug 01, 2018
Learn more about the AWS Partner Webinar Series at - https://amzn.to/2ILG0R7. Join our webinar to hear how Lyft and other data-driven organizations benefit from uncovering hidden insights in real time with AI solutions from Amazon Web Services (AWS) and Anodot. Learn how to prevent events that can impact your revenue and brand integrity with a solution that detects anomalies quickly, allowing you to address issues in a timely manner to help ensure a consistently high-quality experience for your customers.
Tags : 
    
AWS

Dresner Wisdom of Crowds Report

Published By: Looker EMEA     Published Date: Sep 27, 2017
Want to know how Business Intelligence products vary in categories such as scalability, reliability, technical support, value for price paid, integrity, and whether the vendor is recommended? Read this report to get: • A side-by-side comparison of 28 BI tools • Ratings across 33 metrics for each vendor • Real customer feedback on performance
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
    
Looker EMEA
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.