best practice

Results 1 - 25 of 2746Sort Results By: Published Date | Title | Company Name
Published By: First San Francisco Partners     Published Date: Mar 13, 2015
A Data Governance Organization and its structure should be defined to align with your company’s organizational hierarchy and resources. Finding the right people to assign to data governance requires an understanding of both the functional and the political role of governance within your organization. This paper highlights some best practices in putting the right resources behind the required roles.
Tags : 
data governance, data governance resources, data governance organization
    
First San Francisco Partners
Published By: First San Francisco Partners     Published Date: Jun 01, 2016
A Data Governance Organization and its structure should be defined to align with your company’s organizational hierarchy and resources. Finding the right people to assign to data governance requires an understanding of both the functional and the political role of governance within your organization. This paper highlights some best practices in putting the right resources behind the required roles.
Tags : 
    
First San Francisco Partners
Published By: TopQuadrant     Published Date: Mar 21, 2015
Data management is becoming more and more central to the business model of enterprises. The time when data was looked at as little more than the byproduct of automation is long gone, and today we see enterprises vigorously engaged in trying to unlock maximum value from their data, even to the extent of directly monetizing it. Yet, many of these efforts are hampered by immature data governance and management practices stemming from a legacy that did not pay much attention to data. Part of this problem is a failure to understand that there are different types of data, and each type of data has its own special characteristics, challenges and concerns. Reference data is a special type of data. It is essentially codes whose basic job is to turn other data into meaningful business information and to provide an informational context for the wider world in which the enterprise functions. This paper discusses the challenges associated with implementing a reference data management solution and the essential components of any vision for the governance and management of reference data. It covers the following topics in some detail: · What is reference data? · Why is reference data management important? · What are the challenges of reference data management? · What are some best practices for the governance and management of reference data? · What capabilities should you look for in a reference data solution?
Tags : 
data management, data, reference data, reference data management, top quadrant, malcolm chisholm
    
TopQuadrant
Published By: CMMI Institute     Published Date: Sep 03, 2014
To drive strategic insights that lead to competitive advantage, businesses must make the best and smartest use of today’s vast amount of data. To accomplish this, organizations need to apply a collaborative approach to optimizing their data assets. For organizations that seek to evaluate and improve their data management practices, CMMI® Institute has developed the Data Management Maturity (DMM)? model to bridge the perspective gap between business and IT. Download the white paper Why is Measurement of Data Management Maturity Important? to enable you to: - Empower your executives to make better and faster decisions using a strategic view of their data. - Achieve the elusive alignment and agreement between the business and IT - Create a clear path to increasing capabilities
Tags : 
white paper, enterprise data management, data model, data modeling, data maturity model, cmmi institute
    
CMMI Institute
Published By: CMMI Institute     Published Date: Mar 21, 2016
CMMI Institute®’s Data Management Maturity (DMM)SM framework enables organizations to improve data management practices across the full spectrum of their business. It is a unique, comprehensive reference model that provides organizations with a standard set of best practices to assess their capabilities, strengthen their data management program, and develop a custom roadmap for improvements that align with their business goals.
Tags : 
    
CMMI Institute
Published By: AnalytixDS     Published Date: May 09, 2016
This paper seeks to provide insight into how AnalytiX Data Services can address many of the data related issues that come with combining disparate source data as is often the case in mergers and acquisitions. It will cover some of the best features and functionality offered by AnalytiX Data Services’ flagship product AnalytiX Mapping Manager, which have specific capabilities that are of high value in this scenario.
Tags : 
    
AnalytixDS
Published By: Alation     Published Date: Mar 15, 2016
curation (noun): The act of organizing and maintaining a collection (such as artworks, artifacts, or data). Data curation is emerging as a technique to support data governance, especially in data-driven organizations. As self-service data visualization tools have taken off, sharing the nuances and best practices of how to use data becomes ever more critical. Analysts at companies from eBay to Safeway and Square are scaling their data knowledge through curation techniques. What are the 4 steps to successful data curation? Find out here:
Tags : 
data stewardship, self-service analytics, data curation, data governance
    
Alation
Published By: Alation     Published Date: Mar 26, 2018
When analysts and data scientists have access to data governance policies and best practices directly within the flow of their analysis, the result is both more consistent compliance and more broadly adopted best practices. With the combination of Tableau and Alation, organizations can not only balance the demands of agility and governance, they can actually optimize for both at the same time. We call this Governance for Insight. Learn more about how Tableau users can have the best of worlds - agility and governance. Read Enabling Governance for Insight: Trust in Data with Tableau and Alation’s Data Catalogs. Register on the right to access a complimentary copy of this joint white paper from Tableau and Alation.
Tags : 
    
Alation
Published By: Amazon Web Services     Published Date: Apr 04, 2016
Amazon DynamoDB is a fully managed, NoSQL database service. Many workloads implemented using a traditional Relational Database Management System (RDBMS) are good candidates for a NoSQL database such as DynamoDB. This whitepaper details the process for identifying these candidate workloads and planning and executing a migration to DynamoDB.
Tags : 
    
Amazon Web Services
Published By: Converseon     Published Date: Apr 02, 2018
Separating signals from noisy social listening data has long been a problem for data scientists. Poor precision due to slag, sarcasm and implicit meaning has often made it too challenging to effectively model. Today, however, new approaches that leverage active machine learning are rapidly over taking aging rules-based techniques and opening up use of this data in new and important ways. This paper provides some detail on the evolution of text analysis including current best practices and how AI can be used by data scientists to use this data for meaningful analysis.
Tags : 
    
Converseon
Published By: SAP     Published Date: Jan 23, 2013
This paper examines the root causes of data centralization failure and then reviews straightforward best practices that can help avoid such failures but are typically ignored when systems are designed in an ad hoc, organic manner.
Tags : 
data, data management, data governance, big data, cloud, business intelligence, semantic technology, nosql, information quality, data quality, metadata, enterprise information management, master data management, mdm, analytics, database
    
SAP
Published By: SAS     Published Date: Apr 02, 2014
Featuring use cases of various big data strategies, this paper explores several approaches and techniques that could be right for your enterprise, including using emerging big data platforms and creating new technology for problems not addressed by current big data platforms. It also covers moving more computation to traditional databases and implementing data virtualization.
Tags : 
data, data management, big data, white paper, sas
    
SAS
Published By: Gigamon     Published Date: Dec 13, 2018
Read "Understanding the State of Network Security Today" to learn why ESG recommends consolidating security tools through a structured, platform-based approach. Data, analytics and reports from multiple tools can be aggregated and consumed in one control panel, reducing network vulnerabilities. Learn more about challenges, changes and best practices for today’s network security operations and tools. Read now.
Tags : 
    
Gigamon
Published By: Lookout     Published Date: Dec 13, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Spredfast     Published Date: Nov 15, 2018
How Top Brands Automate Social Service Practices Today’s conversational commerce requires brands to provide immediate answers to their customers’ questions. Chatbots and artificial intelligence are fast becoming critical tools for customer service, bringing speed and scale that ensures a superior experience. But what are the best practices that marketers need to know to tackle the challenges of customer service automation? ?Learn from experts from General Motors, Booking.com and Spredfast about how to bring automation into your CX workflows and bolster your social service strategies. You’ll find out: How to think about automation for your business? How chatbots enhance your agent workflows?? ??How Booking.com and GM are using AI to drive inspiration and customer? service efficiencies??
Tags : 
    
Spredfast
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system
    
Bell Micro
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: MuleSoft     Published Date: Nov 27, 2018
IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: The bank’s legacy modernization strategy, and how they used Anypoint Platform Best practices for modernizing legacy SOA web services How to think about re-architecting monolithic applications into microservices The role that APIs play in driving an effective legacy modernization strategy
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
In the wake of recent legislative pressures and the formation of the Digital Transformation Agency, Australian state and federal government agencies face an imperative to deliver superior digital services to employees and citizens without a corresponding increase in budget. As a result, many agencies have turned to IT modernisation as a means of driving more cost-effective digital transformation. The key to successful execution of digital transformation initiatives depends on a new approach to integration and API strategy called API-led connectivity. In this whitepaper, you will learn: Why Australian government agencies must change how they deliver IT projects, and the role integration and an API strategy play in supporting the modernisation of government IT How to build out an API-led architecture within a government agency to realise 2-5x increases in IT productivity How best practice from initiatives like Service NSW provide a model for government agencies to pursue digital trans
Tags : 
    
MuleSoft
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept