system application

Results 626 - 630 of 630Sort Results By: Published Date | Title | Company Name

Modern Storage Accelerates Data Insights, Speeding Innovation

Published By: Pure Storage     Published Date: Jul 03, 2019
Deep learning opens up new worlds of possibility in artificial intelligence within the Financial Services industry, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage

Forrester Report: Your-Three Step Guide to Planning Cloud Migration

Published By: Skytap     Published Date: Aug 23, 2017
Cloud migration has exploded in popularity since General Electric’s (GE’s) flashy keynote at Amazon Web Service’s (AWS’s) re:Invent in September 2015. GE claims to be migrating all workloads not containing secret information. Enterprises are revisiting public cloud and exploring whether existing or systems-of-record applications have a place in that world. Infrastructure and operations (I&O) professionals on this path should avoid a one-size-fits-all approach to outsourcing and migration plans, opting instead for an app-by-app assessment.
Tags : 
    
Skytap

Stop the Manual Madness with Datavail's DRM PeopleSoft Adapter

Published By: Datavail     Published Date: Nov 03, 2017
The management of financial data in an organization is of paramount importance. Reporting, evaluating ROI, making adjustments across the business, and increasing revenue depend on good, accessible financial data that can be updated and integrated across systems and software. For these reasons, many organizations have turned to master data management (MDM) software in the effort to better store, access, search, retrieve, and analyze their financial data. These MDM solutions are able to collect data within a single unified, fully integrated, user-friendly platform. However, in order to be most effective, MDM applications must also have capabilities in data relationship management (DRM). DRM software is able to describe and enforce the relationships between data, no matter where it's located within an organization, to provide a holistic and consistent solution.
Tags : 
    
Datavail

E-book: La fabrication additive en plastique pour votre environnement de production

Published By: 3D Systems     Published Date: Feb 28, 2019
L'impression 3D s'est imposée comme technologie de prototypage dans les années 80 et a rapidement évolué depuis. Les développements continus des dernières décennies ont transformé l’impression 3D (également appelée fabrication additive) en technologie durable et économique dans tout l’environnement de production : du prototypage à l'intégration à la production, jusqu'à la production 3D directe. Les entreprises qui utilisent l’impression 3D peuvent devenir des leaders de leur secteur et conforter leur position grâce aux progrès réalisés avec l'impression 3D en matière de délais, de coûts et de capacité. Cet ebook contient une présentation générale des avancées réalisées dans la technologie d’impression 3D et les matériaux de fabrication additive en plastique de 3D Systems, qui étendent l'éventail des applications de production possibles.
Tags : 
    
3D Systems

Cyber Security Checklist Part 2

Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.