control

Results 1 - 25 of 2067Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Nov 05, 2014
Ask any CEO if they want to better leverage their data assets to drive growth, revenues, and productivity, their answer will most likely be “yes, of course.” Ask many of them what that means or how they will do it and their answers will be as disparate as most enterprise’s data strategies. To successfully control, utilize, analyze, and store the vast amounts of data flowing through organization’s today, an enterprise-wide approach is necessary. The Chief Data Officer (CDO) is the newest member of the executive suite in many organizations worldwide. Their task is to develop and implement the strategies needed to harness the value of an enterprise’s data, while working alongside the CEO, CIO, CTO, and other executives. They are the vital “data” bridge between business and IT. This paper is sponsored by: Paxata and CA Technologies
Tags : 
chief data officer, cdo, data, data management, research paper, dataversity
    
DATAVERSITY
Published By: DATAVERSITY     Published Date: Jun 14, 2013
This report analyzes many challenges faced when beginning a new Data Governance program, and outlines many crucial elements in successfully executing such a program. “Data Governance” is a term fraught with nuance, misunderstanding, myriad opinions, and fear. It is often enough to keep Data Stewards and senior executives awake late into the night. The modern enterprise needs reliable and sustainable control over its technological systems, business processes, and data assets. Such control is tantamount to competitive success in an ever-changing marketplace driven by the exponential growth of data, mobile computing, social networking, the need for real-time analytics and reporting mechanisms, and increasing regulatory compliance requirements. Data Governance can enhance and buttress (or resuscitate, if needed) the strategic and tactical business drivers every enterprise needs for market success. This paper is sponsored by: ASG, DGPO and DebTech International.
Tags : 
data, data management, data governance, data steward, dataversity, research paper
    
DATAVERSITY
Published By: SAP     Published Date: May 19, 2016
SAP® solutions for enterprise information management (EIM) support the critical abilities to architect, integrate, improve, manage, associate, and archive all information. By effectively managing enterprise information, your organization can improve its business outcomes. You can better understand and retain customers, work better with suppliers, achieve compliance while controlling risk, and provide internal transparency to drive operational and strategic decisions.
Tags : 
    
SAP
Published By: ASG     Published Date: Apr 02, 2014
This Case Study focuses on a highly successful data lineage project between ASG Software Solutions and a major global financial institution. The initial project which began in 2011 with the primary goal of achieving greater control, awareness, and ownership over the institution’s data assets due to new regulatory and federal audit controls. As the project progressed and the positive relationship between ASG and the Bank deepened, all stakeholders involved began to see much broader potential for the entire project than originally envisioned.
Tags : 
metadata, data, data management, white paper, case study
    
ASG
Published By: CapTech     Published Date: May 26, 2015
Big Data is the future of business. According to CloudTweaks.com, as much as 2.5 quintillion bytes of data are produced each day, with most of this data being captured by Big Data. With its ability to transfer all data sources all into one centralized place, Big Data provides opportunities, clearer visions, customer conversations and transactions. However, with the dazzling big promise of Big Data comes a potentially huge letdown. If this vast pool of information resources is not accessible or usable, it becomes useless. This paper examines strategies for building the most value into your Big Data system by enabling process controls to effectively mine, access and secure Big Data.
Tags : 
big data, captech, data, data management, nosql
    
CapTech
Published By: WhereScape     Published Date: Oct 20, 2017
Put IT on Automatic: Cloud Data Warehousing Has Arrived by Eric Kavanagh of The Bloor Group Download this white paper to better understand the value the cloud offers IT teams developing data infrastructure, and how automation can be used to not only accelerate time to value, but to tackle quality control, compliance and developer productivity. Sponsored by WhereScape. To learn more about WhereScape automation, visitwww.wherescape.com"
Tags : 
    
WhereScape
Published By: Octopai     Published Date: Sep 01, 2018
For many BI professionals, every task can feel like MISSION IMPOSSIBLE. All the manual mapping required to sort out inconsistencies in data and the lack of tools to simplify and shorten the process of finding and understanding data leaves BI groups frustrated and slows down the business. This whitepaper examines the revolutionary impact of automation on the cumbersome manual processes that have been dragging BI down for so long. • Data correction vs process correction • Root-cause analysis with data lineage: reverse-tracing the data flow • Data quality rules and data controls • Automated data lineage mapping
Tags : 
    
Octopai
Published By: Datawatch     Published Date: Apr 06, 2018
Enterprises are focusing on becoming ever more data-driven, meaning that it is simply unacceptable to allow data to go to waste. Yet, as the amount of data businesses collect and control continues to increase exponentially, many organizations are failing to derive enough business value from their data. Companies are feeling the pressure to extract maximum value from all of their data, both defensive and offensive. Defensive analytics are the “plumbing aspects” of data management that must be captured to mitigate risk and establish a basic understanding of business performance. Offensive analytics build on defensive analytics and support overarching business objectives, strategic initiatives and long-term goals using predictive models. In this whitepaper, you will learn how to address many challenges, including streamlining operational reporting, delivering insight and providing a single, unified platform for everyone.
Tags : 
    
Datawatch
Published By: DATAVERSITY     Published Date: Jan 23, 2013
No business likes to throw money out the window, or in the case of the modern day enterprise, down the electronic data stream. But, that is exactly what businesses all over the world are doing every day if they don’t have control of their data. This paper is sponsored by: ASG.
Tags : 
white paper, dataversity, asg, metadata, business management, data, data management
    
DATAVERSITY
Published By: ASG     Published Date: Feb 05, 2013
No business likes to throw money out the window, or in the case of the modern day enterprise, down the electronic data stream. But, that is exactly what businesses all over the world are doing every day if they don’t have control of their data.
Tags : 
white paper, dataversity, asg, metadata, business management, data, data management
    
ASG
Published By: DATAVERSITY     Published Date: Jun 17, 2013
This report analyzes many challenges faced when beginning a new Data Governance program, and outlines many crucial elements in successfully executing such a program. “Data Governance” is a term fraught with nuance, misunderstanding, myriad opinions, and fear. It is often enough to keep Data Stewards and senior executives awake late into the night. The modern enterprise needs reliable and sustainable control over its technological systems, business processes, and data assets. Such control is tantamount to competitive success in an ever-changing marketplace driven by the exponential growth of data, mobile computing, social networking, the need for real-time analytics and reporting mechanisms, and increasing regulatory compliance requirements. Data Governance can enhance and buttress (or resuscitate,if needed) the strategic and tactical business drivers every enterprise needs for market success.
Tags : 
research paper, data, data management, data governance, data steward
    
DATAVERSITY
Published By: Dell     Published Date: Nov 12, 2018
Today, IT leaders address the PC lifecycle across a continuum from control to transformation. Control is geared to optimization, while transformation focuses on the business impact of technology. Though the two approaches differ, they are not in opposition. They strive for the same goals and face similar challenges. As IT leaders provide their workforce with the tools to carry out the corporate mission, they should develop a PC lifecycle strategy that encompasses the key organizational needs of systems management, end-user productivity, business innovation and data-centric security. Read this Dell whitepaper to learn more about the findings of a recent Forrester Consulting study, “Digital Transformers Innovate, Digital Controllers Optimize”. This paper will help clarify the PC lifecycle continuum, from the basics of control to the advanced levels of transformation, so you will be better equipped to determine the needs of your organization on that spectrum.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 12, 2018
In December 2017, Dell commissioned Forrester Consulting to conduct a study refresh to determine how enterprise organizations are structured from an IT departmental perspective. The study explored two types of IT: digital controllers and digital transformers; and the trends and challenges seen in PC provisioning. Digital controllers are often associated with top-down approach, linear structure, and emphasize security and accuracy. In contrast, digital transformers focus on innovation, employee-and customer-centricity, and prioritize speed and flexibility. By understanding the two groups, enterprises can overcome challenges that arise from PC life-cycle management. By investing in existing PC management tools and partnering with a company that specializes in PC deployment and management, firms can empower employees to better serve customers. Download this Forrester report to learn more about the approach and strategy differences in how these two groups address the dynamic digital demand
Tags : 
    
Dell
Published By: Workday Nordics     Published Date: Sep 19, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
workday, workday technology, digital strategy, financial auditing
    
Workday Nordics
Published By: Workday UK     Published Date: Sep 18, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
    
Workday UK
Published By: Monetate     Published Date: Oct 22, 2018
Monetate Intelligent Recommendations automates recommendations at scale without sacrificing any of the control you require. Our proprietary algorithms know what to serve each individual shopper to maximise brand value, while still allowing the control of an unlimited number of business guardrails defined by you.
Tags : 
monetate, intelligent, recommendations, business, individual, automation
    
Monetate
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users don’t get the protection of your traditional security stack. Not only are more offices connecting directly to the internet — it’s estimated that 70% of branch offices already have some direct internet access — but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
    
Cisco Umbrella EMEA
Published By: Lookout     Published Date: Dec 03, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The General Data Protection Regulation (GDPR) framework seeks to create a harmonized data protection framework across the European Union, and aims to give back EU citizens control of their personal data by imposing stricter requirements for those hosting and processing this data, anywhere in the world. IBM is committed to putting data responsibility first and providing solutions that are secure to the core for all customers. As such, IBM Cloud has fully adopted the EU Data Protection Code of Conduct for Cloud Service providers – meaning we agree to meet the entirety of its stringent requirements.
Tags : 
    
Group M_IBM Q418
Published By: Workday     Published Date: Aug 07, 2018
Meet the complex needs of your healthcare organization with a single cloud-based system that combines analytics, planning, finance, and HR for more comprehensive supply chain management. Read the datasheet to learn how you can: Reduce supply chain costs while improving inventory control, gain deep insight into the cost, quantity, and utilization of your supplies, and identify purchasing trends and standardize opportunities.
Tags : 
    
Workday
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking, knowledge management, enterprise applications, business technology
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
Sangoma has introduced the most cost-effective, easiest to provision and easiest to manage line of enterprise SBCs on the market. The four available options deliver maximum flexibility when selecting a solution -- Learn how they can help you.
Tags : 
sangoma session border controllers, sbc series, carriers, enterprise, cost effective, easy to manage, sbc, networking, knowledge management, enterprise applications, business technology
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of Session Border Controllers on the market. Sangoma’s Vega Enterprise SBC VM/Hybrid provides full-featured protection and easy interconnection.
Tags : 
vega sbc, enterprise, vm hybrid, data sheet, easy to use, cost effective, sbc solution, networking, knowledge management, enterprise applications, business technology
    
Sangoma
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.