HIT Consultant Insightful coverage of healthcare innovation
 

data applications

Results 826 - 843 of 843Sort Results By: Published Date | Title | Company Name
Published By: Sierra Wireless     Published Date: Jun 19, 2019
By simplifying the ability of companies to securely extract, orchestrate and act on data from when it is generated by energy assets to when it is transmitted to the cloud, Octave simplifies the development and commercialization of Energy IoT applications. With Octave, energy companies are empowered to realize the Energy IoT’s tremendous potential, with new demand response, energy efficiency optimization, predictive maintenance and other applications that maximize the value created by energy assets and minimize their environmental impact. In doing so, these Energy IoT applications can reduce energy costs, improve customer engagement, lower greenhouse gas emissions and increase energy reliability. Start with Sierra to learn more about how our Octave D2C data orchestration solution can help you bring to market Energy IoT applications that reimagine the future of energy.
Tags : 
    
Sierra Wireless
Published By: Dynatrace     Published Date: Jul 29, 2016
Gap free data helps you create and manage high-performing applications that deliver flawless end-user experience and customer loyalty. To be gap free, you must capture data from every single method in your application infrastructure, end-to-end, including timing and code-level context for all transactions, services and tiers, and make the data available for analysis. This eBook gives you technical and business case details that will show you why gap free data is a critical part of your application management strategy.
Tags : 
dynatrace, gap free data, applications, application performance, development, devops, application infrastructure, application performance management
    
Dynatrace
Published By: National Instruments      Published Date: Feb 06, 2009
National Instruments LabVIEW is a dataflow programming language, developers can write inherently parallel applications that can map to parallel hardware such as multicore processors and FPGAs for optimal performance. This white paper discusses dataflow programming and why NI LabVIEW is ideal for programming multicore systems.
Tags : 
national instruments, labview, multicore programming, fgpa, dataflow programming
    
National Instruments
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Published By: HP     Published Date: Aug 21, 2009
Microsoft Windows-based applications and data are growing in size and complexity, reaching the limits of their architecture and scalability. Download this whitepaper to read the benefits of updating database applications to the Microsoft SQL Server 2005 platform with the HP Integrity family of 64-bit servers.
Tags : 
active directory, hp integrity, servers, windows server, sql server
    
HP
Published By: Dell EMC     Published Date: Aug 01, 2019
Software might run the world, but software still runs on hardware. It’s a misperception that hardware has little value anymore. Every application, every workload, every data set runs on physical servers. Read “Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business,” a Frost & Sullivan report of 500 IT decision makers, on the value of global server brands vs. commodity servers. Look beyond commodity status to discover: • Key server purchase criteria • How top brands directly compare • How to choose based on workload Server brands very significantly, and a commodity brand may not provide the outcomes you need, especially for new and next-generation applications. Download this analyst report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell and Nutanix     Published Date: Jan 16, 2018
Because many SQL Server implementations are running on virtual machines already, the use of a hyperconverged appliance is a logical choice. The Dell EMC XC Series with Nutanix software delivers high performance and low Opex for both OLTP and analytical database applications. For those moving from SQL Server 2005 to SQL Server 2016, this hyperconverged solution provides particularly significant benefits.
Tags : 
data, security, add capacity, infrastructure, networking, virtualization, dell
    
Dell and Nutanix
Published By: Datastax     Published Date: Aug 23, 2017
Relational databases had their day and are still viable for certain use cases, but the advent of the cloud and subsequent proliferation of cloud applications is putting an almost unmanageable burden on their capabilities. Read this eBook to learn why your RBMS fails at scale, and why it’s no longer a viable option for today’s distributed, super fast-paced, cloud-friendly world.
Tags : 
cloud, application, rbms
    
Datastax
Published By: Datastax     Published Date: Aug 07, 2018
Relational databases had their day and are still viable for certain use cases, but the advent of the cloud and subsequent proliferation of cloud applications is putting an almost unmanageable burden on their capabilities. Read this eBook to learn why your RBMS fails at scale, and why it's no longer a viable option for today's distributed, super fast-paced, cloud-friendly world.
Tags : 
    
Datastax
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: NetApp     Published Date: Nov 14, 2017
As companies’ transition to become digital enterprises, they must increasingly manage cost and performance across a hybrid IT environment. On-demand consumption strategies can be used to optimize your data storage costs, whether you are running applications in a private data center, across a hybrid cloud, or in the public cloud. Read this eBook and learn how on-demand consumption models can help you align IT spending with your business needs, both on-premises and in the cloud.
Tags : 
    
NetApp
Published By: HPE Intel     Published Date: Mar 09, 2016
State agency and higher education CIOs are under intense pressure to modernize their legacy IT systems. Whether that requires moving from one infrastructure to another, or moving to or from the cloud, the chief challenge remains: How to migrate data and applications without disrupting critical operations, ensure improved performance and avoid pricing and other traps that often accompany virtualizing in the cloud. Learn what’s made the difference in overcoming the impediments to workload migrations from IT leaders who’ve lived through big data and application moves. Topics include: Preparing workloads for cloud on-boarding – and off-boarding Tools for simplifying the consolidation and migration of apps and supporting services Forecasting workloads, and planning for associated testing, training, and other costs
Tags : 
    
HPE Intel
Published By: VMware     Published Date: Nov 04, 2016
From private, public, and hybrid clouds to traditional and modern application architectures, today’s modern data center is complex. To effectively manage the evolving topology, IT needs a unified approach to management, with intelligent, cost-effective tools – which is just what an enterprise-ready cloud management platform (CMP) provides. CMP enables IT teams to automate provisioning as well as manage applications throughout their lifecycle with a single platform. Read this eGuide to learn more about how to avoid chaos in the data center with a unified cloud management platform.
Tags : 
    
VMware
Published By: IBM     Published Date: Jul 07, 2015
Users expect quick, consistent access to their business-critical data and applications around the clock. That’s why outages, whether they are planned or unplanned, can negatively affect revenue, consumer trust and your reputation.
Tags : 
big data, mobility, compute-intensive apps, virtualization, cloud computing, scalable infrastructure, reliability
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
Users expect quick, consistent access to their business-critical data and applications around the clock. That’s why outages, whether they are planned or unplanned, can negatively affect revenue, consumer trust and your reputation.
Tags : 
ibm, technology, always on, cloud, analytics, outages, always on
    
IBM
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media
    
SnowFlake
Published By: Cisco     Published Date: Apr 10, 2015
The data center has gone through many major evolutionary changes over the past several decades, and each change has been defined by major shifts in architectures. The industry moved from the mainframe era to client/server computing and then to Internet computing. In 2011, another major shift began: the shift to a virtual data center. This has been the primary driver in enabling customers to transition to the cloud and ultimately IT as a service. The shift to a virtual data center will be the single biggest transition in the history of computing. It will reshape all the major data center tiers: applications, storage, servers and the network.
Tags : 
cisco, zk research, data center, itaas, migration, cloud computing, applications, servers
    
Cisco
Start   Previous    20 21 22 23 24 25 26 27 28 29 30 31 32 33 34     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.