analysis

Results 1 - 25 of 1100Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: May 25, 2014
Deconstructing NoSQL: Analysis of a 2013 Survey on the Use, Production, and Assessment of NoSQL Technologies in the Enterprise This report examines the non-relational database environment from the viewpoints of those within the industry–whether current or future adopters, consultants, developers, business analysts, vendors, or others. This paper is sponsored by: MarkLogic, Cloudant and Neo4j.
Tags : 
research paper, analysis, nosql, database, nosql database, white paper, nosql white paper
    
DATAVERSITY
Published By: DATAVERSITY     Published Date: Oct 04, 2016
This report evaluates each question posed in a recent survey and provides subsequent analysis in a detailed format that includes the most noteworthy statistics, direct comments from survey respondents, and the influence on the industry as a whole. It seeks to present readers with a thorough review of the state of Metadata Management as it exists today.
Tags : 
    
DATAVERSITY
Published By: DATAVERSITY     Published Date: Oct 12, 2017
The foundation of this report is a survey conducted by DATAVERSITY® that included a range of different question types and topics on the current state of Data Architecture. The report evaluates the topic through a discussion and analysis of each presented survey question, as well as a deeper examination of the present and future trends.
Tags : 
    
DATAVERSITY
Published By: Ted Hills     Published Date: Mar 08, 2017
This paper explores the differences between three situations that appear on the surface to be very similar: a data attribute that may occur zero or one times, a data attribute that is optional, and a data attribute whose value may be unknown. It shows how each of these different situations is represented in Concept and Object Modeling Notation (COMN, pronounced “common”). The theory behind the analysis is explained in greater detail by three papers: Three-Valued Logic, A Systematic Solution to Handling Unknown Data in Databases, and An Approach to Representing Non-Applicable Data in Relational Databases.
Tags : 
    
Ted Hills
Published By: CA Technologies     Published Date: Apr 24, 2013
Using ERwin Data Modeler & Microsoft SQL Azure to Move Data to the Cloud within the DaaS Lifecycle by Nuccio Piscopo Cloud computing is one of the major growth areas in the world of IT. This article provides an analysis of how to apply the DaaS (Database as a Service) lifecycle working with ERwin and the SQL Azure platform. It should help enterprises to obtain the benefits of DaaS and take advantage of its potential for improvement and transformation of data models in the Cloud. The use case introduced identifies key actions, requirements and practices that can support activities to help formulate a plan for successfully moving data to the Cloud.
Tags : 
    
CA Technologies
Published By: MemSQL     Published Date: Jun 25, 2014
Emerging business innovations focused on realizing quick business value on new and growing data sources require “hybrid transactional and analytical processing” (HTAP), the notion of performing analysis on data directly in an operational data store. While this is not a new idea, Gartner reports that the potential for HTAP has not been fully realized due to technology limitations and inertia in IT departments. MemSQL offers a unique combination of performance, flexibility, and ease of use that allows companies to implement HTAP to power their business applications.
Tags : 
    
MemSQL
Published By: Skytree     Published Date: Nov 23, 2014
Critical business information is often in the form of unstructured and semi-structured data that can be hard or impossible to interpret with legacy systems. In this brief, discover how you can use machine learning to analyze both unstructured text data and semi- structured log data, providing you with the insights needed to achieve your business goals.
Tags : 
log data, machine learning, natural language, nlp, natural language processing, skytree, unstructured data, semi-structured data
    
Skytree
Published By: Data Ninja     Published Date: Apr 16, 2017
By adding structure to free text using text analytics and graph databases, text becomes valuable business data. This paper examines a real life use case in risk analysis. Text is a part of all communication channels from social media, documents, logs, and data bases. In order to use the information from text, you need to extract the data in a way that provides useful information on entities, locations, organizations, and their properties. Graph databases are very powerful in showing the text relationships including the nearest neighbors, clusters, and the shortest paths. The combination of text analytics and graph databases can be used to solve business problems.
Tags : 
    
Data Ninja
Published By: Alteryx     Published Date: May 24, 2017
Spreadsheets are a mainstay in almost every organization. They are a great way to calculate and manipulate numeric data to make decisions. Unfortunately, as organizations grow, so does the data, and relying on spreadsheet-based tools like Excel for heavy data preparation, blending and analysis can be cumbersome and unreliable. Alteryx, Inc. is a leader in self-service data analytics and provides analysts with the ability to easily prep, blend, and analyze all data using a repeatable workflow, then deploy and share analytics at scale for deeper insights in hours, not weeks. This paper highlights how transitioning from a spreadsheet-based environment to an Alteryx workflow approach can help analyst better understand their data, improve consistency, and operationalize analytics through a flexible deployment and consumption environment.
Tags : 
    
Alteryx
Published By: DATAVERSITY     Published Date: Jun 14, 2013
This report analyzes many challenges faced when beginning a new Data Governance program, and outlines many crucial elements in successfully executing such a program. “Data Governance” is a term fraught with nuance, misunderstanding, myriad opinions, and fear. It is often enough to keep Data Stewards and senior executives awake late into the night. The modern enterprise needs reliable and sustainable control over its technological systems, business processes, and data assets. Such control is tantamount to competitive success in an ever-changing marketplace driven by the exponential growth of data, mobile computing, social networking, the need for real-time analytics and reporting mechanisms, and increasing regulatory compliance requirements. Data Governance can enhance and buttress (or resuscitate, if needed) the strategic and tactical business drivers every enterprise needs for market success. This paper is sponsored by: ASG, DGPO and DebTech International.
Tags : 
data, data management, data governance, data steward, dataversity, research paper
    
DATAVERSITY
Published By: DATAVERSITY     Published Date: Nov 11, 2013
This report investigates the level of Information Architecture (IA) implementation and usage at the enterprise level. The primary support for the report is an analysis of a 2013 DATAVERSITY™ survey on Data and Information Architecture. This paper is sponsored by: HP, Vertica, Denodo, Embarcadero and CA Technologies.
Tags : 
information architecture, data architecture, white paper, mdm, master data management, data, data management, enterprise information management
    
DATAVERSITY
Published By: DATAVERSITY     Published Date: Jun 17, 2013
This report analyzes many challenges faced when beginning a new Data Governance program, and outlines many crucial elements in successfully executing such a program. “Data Governance” is a term fraught with nuance, misunderstanding, myriad opinions, and fear. It is often enough to keep Data Stewards and senior executives awake late into the night. The modern enterprise needs reliable and sustainable control over its technological systems, business processes, and data assets. Such control is tantamount to competitive success in an ever-changing marketplace driven by the exponential growth of data, mobile computing, social networking, the need for real-time analytics and reporting mechanisms, and increasing regulatory compliance requirements. Data Governance can enhance and buttress (or resuscitate,if needed) the strategic and tactical business drivers every enterprise needs for market success.
Tags : 
research paper, data, data management, data governance, data steward
    
DATAVERSITY
Published By: Schneider Electric     Published Date: Jan 02, 2018
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula
Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company
Published By: Cyren     Published Date: Jan 03, 2018
Cyren examined 11.7 million inbound emails at companies using various email security solutions to measure any possible “security gaps” in their protection,and identify any potential risks for the companies. Solutions tested ranged from hosted email services with included security filtering to on-premises email security gateways. The study was conducted during September and October 2017, and revealed that, on average, 10.5% of email delivered to users after being scanned by their current email security solution was spam, phishing, or malware email. The report also summarizes results for three separate cases, which illustrate how penetration rates can vary across different companies.
Tags : 
anti spam, email security, email fraud, email archiving, office 365, cyber threats, phishing, malware
    
Cyren
Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Tags : 
thousandeyes, ddos, migration, network migration
    
ThousandEyes
Published By: Virtuant Corp.     Published Date: Oct 29, 2011
A benchmark report to provide IT decision makers with a fair comparison of two of the most popular application server products on the market today.
Tags : 
    
Virtuant Corp.
Published By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management
    
Zynapse
Published By: SurchSquad     Published Date: May 19, 2010
Register to speak with a professional SEO consultant about improving your site's search engine visibility. A consultant will follow-up to schedule your free, no-obligation consultation.
Tags : 
surchsquad, search engine, seo, consultant
    
SurchSquad
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.