IBM Big Data Analytics Vienna, 2013 May 13
|
|
|
- Gwendolyn West
- 10 years ago
- Views:
Transcription
1 IBM Big Data Analytics Vienna, 2013 May 13 Dipl.Ing.Wolfgang Nimführ Big Data Industry Solutions Regional Leader IBM Software Group Europe
2 Agenda for today 1 IBM s viewpoint on on big big data data and and analytics 2 Five compelling big data use cases 3 IBM s unique value for client success 4 Recommendations on how to get started 2
3 Something Profound is Happening Continuous transformation is the new normal Business models are under constant threat Convergence of technology disruptors creates opportunity Shift of power to the consumer and the citizen Mobile Cloud Social Accelerating pressure to do more with less Great relationships trump great products Internet of Things 3 Not changing is the same as losing
4 Big Data is the Next Natural Resource Data is the We New have Oil for the first time an economy based on a key resource [Information] that is not only renewable, but self-generating. Running out of it is not a problem, but drowning in it is. John Naisbitt Harvesting any resource requires Mining, Refining and Delivering 4 4 IBM Conf idential
5 The IBM Big Data Platform Advantage The platform enables starting small and growing without throwing away work BI / Reporting Analytic Applications Exploration / Visualization Functional App Industry App Predictive Analytics Content BI / Reporting Analytics Shared components and integration between systems lowers deployment cost, time and risk Key points of leverage Visualization & Discovery IBM Big Data Platform Application Development Systems Management Accelerators to address common use cases Proven integration technology Hadoop System Accelerators Stream Computing Data Warehouse Common analytic engines (i.e. text analytics) Common metadata, integration design and governance across components Information Integration & Governance 27
6 youtube.com/user/ibmbigdata 33
7 ibmbigdatahub.com 34
8 Questions & Answers Dipl.Ing. Wolfgang Nimführ Big Data Industry Team Regional Leader IBM Software Group Europe IBM Austria Obere Donaustrasse 95 A1020 Vienna Tel
9 Legal Disclaimer IBM Corporation All Rights Reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. 37
Demystifying Big Data Government Agencies & The Big Data Phenomenon
Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed
Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist
Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist 2008 IBM Corporation Agenda Objective Interoperability Prerequisites Where to model
Focus on the business, not the business of data warehousing!
Focus on the business, not the business of data warehousing! Adam M. Ronthal Technical Product Marketing and Strategy Big Data, Cloud, and Appliances @ARonthal 1 Disclaimer Copyright IBM Corporation 2014.
Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data
Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data IBM Software Group Important Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL
Rational Asset Manager 7.2 Editions and Licensing
Rational Asset Manager 7.2 Editions and Licensing Derek D. Baron, [email protected] Product Manager, Rational Asset Manager 2009 IBM Corporation IBM Corporation 200 The information contained in this presentation
Tivoli Automation for Proactive Integrated Service Management
Tivoli Automation for Proactive Integrated Service Management Gain advantage with Tivoli Automation portfolio Optimizing the World s Infrastructure 24 October 2012, Moscow 2012 IBM Corporation Acknowledgements,
IBM s Cloud Platform : IBM Bluemix
IBM s Cloud Platform : IBM Bluemix IBM Ecosystem Development Instructor : IBM Bluemix Registration Go to bluemix.net and sign up Use your laptop, mobile device or classroom system
Technology and Trends for Smarter Business Analytics
Don Campbell Chief Technology Officer, Business Analytics, IBM Technology and Trends for Smarter Business Analytics Business Analytics software Where organizations are focusing Business Analytics Enhance
Ten questions to ask when evaluating contract management solutions
IBM Software Industry Solutions Contract Management Ten questions to ask when evaluating contract management solutions Ten questions to ask when evaluating contract management solutions Contents 2 Top
Predictive and Prescriptive Analytics An Example: Advanced Sales & Operations Planning
Arnold Mark Wells 12 April 2015 Predictive and Prescriptive Analytics An Example: Advanced Sales & Operations Planning 2 Good Decisions Are Integrated Decisions Requires an understanding of inter-related
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Big Data & Analytics Heute & Morgen
Big Data & Analytics Heute & Morgen Dipl.Ing.Wolfgang Nimführ Business Development Executive Big Data Analytics Watson Ambassador IBM Analytics Group Europe 2015 IBM Corporation The World of Big Data &
Name: Srinivasan Govindaraj Title: Big Data Predictive Analytics
Name: Srinivasan Govindaraj Title: Big Data Predictive Analytics Please note the following IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
Big Data Use Case Deep Dive 5 Game Changing Use Cases for Big Data
Big Data Use Case Deep Dive 5 Game Changing Use Cases for Big Data Disruptive forces impact long standing business models across industries Pressure to do more with less Shift of power to the consumer
IBM Counter Fraud Signature Solutions
IBM Counter Fraud Signature Solutions November 5th, 2013 Athens Carmen Ene, VP IBM Global Business Services, Europe Leader Counter Fraud & Financial Crimes Provider ID Theft o Claim for routine services
A proven 5-step framework for managing supplier performance
IBM Software Industry Solutions Industry/Product Identifier A proven 5-step framework for managing supplier performance Achieving proven 5-step spend framework visibility: benefits, for managing barriers,
IBM Tivoli Provisioning Manager V 7.1
IBM Tivoli Provisioning Manager V 7.1 Preparing for patch management in a small environment 2011 IBM Corporation Welcome to the training module for Tivoli Provisioning Manager version 7.1, preparing for
IBM Rational DOORS Next Generation
Silvio Ronchi, Technical Sales & Solutions IBM Software, Rational 26/06/2014 IBM Rational DOORS Next Generation Software and Systems Engineering Rational Agenda 1 Why DOORS Next Generation? 2 Collaborative
Security Intelligence Solutions
Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 [email protected] What is Security
Industry Models and Information Server
1 September 2013 Industry Models and Information Server Data Models, Metadata Management and Data Governance Gary Thompson ([email protected] ) Information Management Disclaimer. All rights reserved.
Addressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : [email protected] Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
Big Data & Analytics. The. Deal. About. Jacob Büchler [email protected] Cand. Polit. IBM Denmark, Solution Exec. 2013 IBM Corporation
The Big Data & Analytics Deal About Jacob Büchler [email protected] Cand. Polit. IBM Denmark, Solution Exec. 1 Big Data is All Data from Everywhere Big Data Is Becoming The Next Natural Resource We
C05 Discovery of Enterprise zsystems Assets for API Management
C05 Discovery of Enterprise zsystems Assets for API Management Unlocking mainframe assets for mobile and cloud applications Haley Fung [email protected] IMS Mobile and APIM Development Lead * IMS Technical
IBM Software Services for Collaboration
An introduction to: IBM Collaboration Services for ProjExec ProjExec is easy to use professional project management software that is combined with innovative social features to provide project teams a
2792 - Leveraging WebSphere Commerce for Search Engine Optimization (SEO)
2792 - Leveraging WebSphere Commerce for Search Engine Optimization (SEO) Walfrey Ng, Development Manger, WebSphere Commerce Srini Rangaswamy, Product Manager, WebSphere Commerce IBM s statements regarding
Increased Agility with Integration Testing
Increased Agility with Integration Testing Monica Luke ([email protected]) Scenario Designer IBM Rational Agenda ALM Community Office Hours Increased Agility with Integration Testing 2 Application Lifecycle
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
IBM Sterling Order Management
IBM Sterling Order Management Manage orders and grow revenue across your extended enterprise Overview In this Solution Overview, you will learn: How to obtain cross-channel excellence by efficiently orchestrating
IBM WebSphere Application Server Communications Enabled Applications
IBM WebSphere Application Server Communications Enabled Applications Configuring a CEA environment 2011 IBM Corporation This presentation describes how to configure a WebSphere Application Server environment
IBM Website Monitoring on Cloud
Mark Weatherill APM architect 17th September 2015 IBM Website Monitoring on Cloud Document number 2015 IBM Corporation Important Notice & Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
Security for a Smarter Planet. 2011 IBM Corporation All Rights Reserved.
Security for a Smarter Planet The Smarter Planet Our world is getting Instrumented Our world is getting Interconnected Our world is getting Intelligent Growing Security Challenges on the Smarter Planet
Security Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
Improving sales effectiveness in the quote-to-cash process
IBM Software Industry Solutions Management Improving sales effectiveness in the quote-to-cash process Improving sales effectiveness in the quote-to-cash process Contents 2 Executive summary 2 Effective
Big Data, Integration and Governance: Ask the Experts
Big, Integration and Governance: Ask the Experts January 29, 2013 1 The fourth dimension of Big : Veracity handling data in doubt Volume Velocity Variety Veracity* at Rest Terabytes to exabytes of existing
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Manage your IT Resources with IBM Capacity Management Analytics (CMA)
Manage your IT Resources with IBM Capacity Management Analytics (CMA) New England Users Group (NEDB2UG) Meeting Sturbridge, Massachusetts, USA, http://www.nedb2ug.org November 19, 2015 Milan Babiak Technical
Four keys to effectively monitor and control secure file transfer
Four keys to effectively monitor and control secure file transfer Contents: 1 Executive summary 2 Key #1 Make your data visible wherever it is in the network 2 Key #2 Reduce or even eliminate ad hoc use
Monitoring your cloud based applications running on Ruby and MongoDB
IBM Smart Cloud Application Performance Monitoring Monitoring your cloud based applications running on Ruby and MongoDB Important Notice & Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED
IBM Sterling Warehouse Management System
IBM Sterling Warehouse Management System Increase warehouse productivity and reduce costs Overview In this solution overview, you will learn: How you can improve every aspect of your warehouse operations
Big Data and the new trends for BI and Analytics Juha Teljo Business Intelligence and Predictive Solutions Executive IBM Europe
Big Data and the new trends for BI and Analytics Juha Teljo Business Intelligence and Predictive Solutions Executive IBM Europe 2012 IBM Corporation The Mega Trends Cloud Mobile Social Analytics 2014 International
Disrupt or be disrupted IT Driving Business Transformation
Disrupt or be disrupted IT Driving Business Transformation Gokula Mishra VP, Big Data & Advanced Analytics Business Analytics Product Group Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Securing the Cloud infrastructure with IBM Dynamic Cloud Security
Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: [email protected] 12015 IBM Corporation Cloud is rapidly transforming
Memory-to-memory session replication
Memory-to-memory session replication IBM WebSphere Application Server V7 This presentation will cover memory-to-memory session replication in WebSphere Application Server V7. WASv7_MemorytoMemoryReplication.ppt
and Security in the Era of Cloud
Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Leverage Cloud as a growth engine for business Exploit Mobile to build customer
Requirements Management im Kontext von DevOps
IBM Software Group Rational software Requirements Management im Kontext von DevOps DI Steindl Wolfgang https://www.xing.com/profiles/wolfgang_steindl Senior IT Specialist [email protected] http://lnkd.in/tpzrug
Harnessing the power of software-driven innovation. Martin Nally IBM Rational CTO IBM Fellow and VP
Harnessing the power of software-driven innovation Martin Nally IBM Rational CTO IBM Fellow and VP We have entered a new wave of innovation Innovation The Industrial Revolution Age of Steam and Railways
Gain a competitive edge through optimized B2B file transfer
Gain a competitive edge through optimized B2B file transfer Contents: 1 Centralized systems enable business success 2 Business benefits of strategic file transfer that you can experience for yourself 2
Mobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
Leveraging Rational Team Concert's build capabilities for Continuous Integration
Leveraging Rational Team Concert's build capabilities for Continuous Integration Krishna Kishore Senior Engineer, RTC IBM [email protected] August 9-11, Bangalore August 11, Delhi Agenda What
IBM Innovate 2011. AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC [email protected] Application Security & Compliance
IBM Innovate 2011 Bobby Walters Consultant, ATSC [email protected] Application Security & Compliance AppScan: Introducin g Security, a first June 5 9 Orlando, Florida Agenda Defining Application Security
Safe Harbor Statement
Defining a Roadmap to Big Data Success Robert Stackowiak, Oracle Vice President, Big Data 17 November 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Agile enterprise content management and the IBM Information Agenda.
Transforming your content into a trusted, strategic asset Agile enterprise content management and the IBM Information Agenda. Delivering a common information framework for uncommon business agility Highlights
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
The Current State of Cyber Security
The Current State of Cyber Security Bob Kalka, Vice President, IBM Security PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED 2 Cyber criminals use BUSINESS INTELLIGENCE 3 NOBODY IS IMMUNE 2012
Business Process Management IBM Business Process Manager V7.5
Business Process Management IBM Business Process Manager V7.5 Federated task management overview This presentation gives you an overview on the federated task management feature in IBM Business Process
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
Insights into Enterprise Telecom Expense Management
IBM Software Industry Solutions Telecom Expense Management Insights into Enterprise Telecom Expense Management Trends and Best Practices Insights into Enterprise Telecom Expense Management Introduction
Three significant risks of FTP use and how to overcome them
Three significant risks of FTP use and how to overcome them Management, security and automation Contents: 1 Make sure your file transfer infrastructure keeps pace with your business strategy 1 The nature
IBM Tivoli Network Manager V3.9
IBM Tivoli Network Manager V3.9 Architecture and configuration for shared and replicated NCIM 2013 IBM Corporation IBM Tivoli Network Manager V3.9, Architecture and configuration for shared and replicated
www.pwc.com Implementation of Big Data and Analytics Projects with Big Data Discovery and BICS March 2015
www.pwc.com Implementation of Big Data and Analytics Projects with Big Data Discovery and BICS Agenda Big Data Discovery Oracle Business Intelligence Cloud Services (BICS) Use Cases How to start and our
IBM WebSphere Application Server
IBM WebSphere Application Server Multihomed hosting 2011 IBM Corporation Multihoming allows you to have a single application communicate with different user agent clients and user agent servers on different
How the oil and gas industry can gain value from Big Data?
How the oil and gas industry can gain value from Big Data? Arild Kristensen Nordic Sales Manager, Big Data Analytics [email protected], tlf. +4790532591 April 25, 2013 2013 IBM Corporation Dilbert
The Smart Archive strategy from IBM
The Smart Archive strategy from IBM IBM s comprehensive, unified, integrated and information-aware archiving strategy Highlights: A smarter approach to archiving Today, almost all processes and information
OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY
OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY 2014 TABLE OF CONTENTS 3 Legal Notice 5 Executive Summary 5 ODCA Members Respond to Survey on Data Center Practices and Plans 6 Methodology 6 Growth in
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
Smarter Analytics Leadership Summit Big Data. Real Solutions. Big Results.
Smarter Analytics Leadership Summit Big Data. Real Solutions. Big Results. 5 Game Changing Use Cases for Big Data Inhi Cho Suh Vice President Product Management & Strategy Information Management IBM Software
SPSS Statistics Server 22.0.0.0 on Windows Detailed system requirements
Report data as of 2013-08-21 03:01:57 MDT SPSS Statistics 22.0.0.0 on Windows Detailed system requirements Operating systems The operating systems section specifies the operating systems within the Windows
Beyond the Single View with IBM InfoSphere
Ian Bowring MDM & Information Integration Sales Leader, NE Europe Beyond the Single View with IBM InfoSphere We are at a pivotal point with our information intensive projects 10-40% of each initiative
Software change and release management White paper June 2008. Extending open source tools for more effective software delivery.
Software change and release management White paper June 2008 Extending open source tools for more Page 2 Contents 2 Integrating and complementing open source tools 2 Trends in business shape software development
Developing Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory. 2012 IBM Corporation 1
Developing Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory 1 Agenda Mobile web applications and Web Experience Factory High-level tour of Web Experience Factory automation
Contract management's effect on in house counsel
IBM Software Industry Solutions Industry/Product Identifier Contract management's effect on in house counsel Impacting contract visibility, analysis and compliance Emptoris Contract Management Solutions
The predictive power of Big Data in healthcare
Charlie Schick, PhD Big Data, Healthcare and Life Sciences The predictive power of Big Data in healthcare 2012 IBM Corporation Market Forces Driving Health Care Transformation Increasing incidence and
EDI outsourcing: The evolution to B2B managed services
EDI outsourcing: The evolution to B2B managed services Contents: 1 Summary 1 EDI in the beginning 2 EDI outsourcing in the beginning 2 Now, it s about more than EDI 4 It s about supporting B2B integration
Mobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.
Mobile Security Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015 12015 IBM Corporation Where I Started: Blackberry Migration BYOD Bring Your Own
Developing in the Cloud Environment. Rosalind Radcliffe IBM Distinguished Engineer, IBM Academy of Technology [email protected].
Developing in the Cloud Environment Rosalind Radcliffe IBM Distinguished Engineer, IBM Academy of Technology [email protected] @RosalindRad Organizations are combining on-premise, off-premise and public
Data Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution
Smart SOA application integration with WebSphere software To support your business objectives Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment
CA Technologies optimizes business systems worldwide with enterprise data model
CUSTOMER SUCCESS STORY CA Technologies optimizes business systems worldwide with enterprise data model CLIENT PROFILE Industry: IT Organization: CA Technologies Employees: 13,600 Revenue: $4.8 billion
QLIKVIEW DEPLOYMENT FOR BIG DATA ANALYTICS AT KING.COM
QLIKVIEW DEPLOYMENT FOR BIG DATA ANALYTICS AT KING.COM QlikView Technical Case Study Series Big Data June 2012 qlikview.com Introduction This QlikView technical case study focuses on the QlikView deployment
Why Finance Should Automate Management & Regulatory Reporting Processes
May 25, 2016 Why Finance Should Automate Management & Regulatory Reporting Processes connecting senior-level financial executives since 1931 CPE Credits Today s webcast is worth 1 Continuing Professional
TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla
TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla Sales Engineer [email protected] Agenda Overview Manual Deployment Orchestration Generic workload autoscaling Sahara Dedicated for Hadoop
This document has been provided by the International Center for Not-for-Profit Law (ICNL).
This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.
Oracle Data Integration: CON7926 Oracle Data Integration: A Crucial Ingredient for Cloud Integration
Oracle Data Integration: CON7926 Oracle Data Integration: A Crucial Ingredient for Cloud Integration Julien Testut Principal Product Manager, Oracle Data Integration Sumit Sarkar Principal Systems Engineer,
DevOps for the Mainframe
DevOps for the Mainframe Rosalind Radcliffe IBM Distinguished Engineer, Enterprise Modernization Solution Architect [email protected] 1 Please note IBM s statements regarding its plans, directions, and
A Study on Reducing Labor Costs Through the Use of WebSphere Cloudburst Appliance
A Study on Reducing Labor Costs Through the Use of WebSphere Cloudburst Appliance IBM Software Group, Competitive Project Office Scott Bain Faisal Rajib Barbara Sannerud Dr. John Shedletsky Dr. Barry Willner
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
