dati

Results 1 - 25 of 1709Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Oct 11, 2018
The foundation of this report is a survey conducted by DATAVERSITY® that included a range of different question types and topics on the current state of Data Governance and Data Stewardship. The report evaluates the topic through a discussion and analysis of each presented survey question, as well as a deeper examination of the present and future trends.
Tags : 
    
DATAVERSITY
Published By: Ted Hills     Published Date: Mar 08, 2017
Much has been written and debated about the use of SQL NULLs to represent unknown values, and the possible use of three-valued logic. However, there has never been a systematic application of any three-valued logic to use in the logical expressions of computer programs. This paper lays the foundation for a systematic application of three-valued logic to one of the two problems inadequately addressed by SQL NULLs.
Tags : 
    
Ted Hills
Published By: Syncsort     Published Date: Oct 30, 2018
In today’s digital business world, accurate address and geolocation data is invaluable. But, address capture is something that is often overlooked from a user and business perspective. Clean address capture can enhance user experience, not only while entering an address, but also during the entire customer journey. Download this eBook to learn how global address validation tools can help: • Simplify address capture on web-based forms • Accurately pinpoint customer locations • Improve efficiencies in shipping and logistics • Define sales and marketing territories and enrich address information
Tags : 
    
Syncsort
Published By: Attunity     Published Date: Oct 19, 2018
Change data capture (CDC) technology can modernize your data and analytics environment with scalable, efficient and real-time data replication that does not impact production systems. To realize these benefits, enterprises need to understand how this critical technology works, why it’s needed, and what their Fortune 500 peers have learned from their CDC implementations. This book serves as a practical guide for enterprise architects, data managers and CIOs as they enable modern data lake, streaming and cloud architectures with CDC. Read this book to understand: ? The rise of data lake, streaming and cloud platforms ? How CDC works and enables these architectures ? Case studies of leading-edge enterprises ? Planning and implementation approaches
Tags : 
    
Attunity
Published By: DATAVERSITY     Published Date: Oct 12, 2017
The foundation of this report is a survey conducted by DATAVERSITY® that included a range of different question types and topics on the current state of Data Architecture. The report evaluates the topic through a discussion and analysis of each presented survey question, as well as a deeper examination of the present and future trends.
Tags : 
data architecture, data, data management
    
DATAVERSITY
Published By: TopQuadrant     Published Date: Jun 11, 2018
Data governance is a lifecycle-centric asset management activity. To understand and realize the value of data assets, it is necessary to capture information about them (their metadata) in the connected way. Capturing the meaning and context of diverse enterprise data in connection to all assets in the enterprise ecosystem is foundational to effective data governance. Therefore, a data governance environment must represent assets and their role in the enterprise using an open, extensible and “smart” approach. Knowledge graphs are the most viable and powerful way to do this. This short paper outlines how knowledge graphs are flexible, evolvable, semantic and intelligent. It is these characteristics that enable them to: • capture the description of data as an interconnected set of information that meaningfully bridges enterprise metadata silos. • deliver integrated data governance by addressing all three aspects of data governance — Executive Governance, Representative Governance, and App
Tags : 
    
TopQuadrant
Published By: MapR Technologies     Published Date: Mar 29, 2016
Add Big Data Technologies to Get More Value from Your Stack Taking advantage of big data starts with understanding how to optimize and augment your existing infrastructure. Relational databases have endured for a reason – they fit well with the types of data that organizations use to run their business. These types of data in business applications such as ERP, CRM, EPM, etc., are not fundamentally changing, which suggests that relational databases will continue to play a foundational role in enterprise architectures for the foreseeable future. One area where emerging technologies can complement relational database technologies is big data. With the rapidly growing volumes of data, along with the many new sources of data, organizations look for ways to relieve pressure from their existing systems. That’s where Hadoop and NoSQL come in.
Tags : 
    
MapR Technologies
Published By: Snowflake Computing     Published Date: Apr 19, 2016
Data warehouse as a service brings scalability and flexibility to organizations seeking to deliver data to all users and systems that need to analyze it. The ability to access and analyze data is the critical foundational element for competing in new and old industries alike. Yet, a recent survey of IT executives finds that most are still struggling— and frustrated — with widely used data analytics tools. Find out what your peers are saying, and see how your data analytics environment compares.
Tags : 
    
Snowflake Computing
Published By: Attivio     Published Date: Mar 14, 2018
Did you ever consider all of the examples of machine learning in your personal life? Google’s page ranking system, photo tagging on Facebook, and customized product recommendations from Amazon are all driven by machine learning under the hood. How do these same techniques improve productivity for your business? Search is the new data and content curation. Improved relevance translates to faster search results and better business outcomes across the line. Download the Five-Minute Guide to Machine Learning to find out how self-learning technologies drive increasingly relevant answers and better context for cognitive search.
Tags : 
    
Attivio
Published By: Io-Tahoe     Published Date: May 14, 2018
The “silver lining” in GDPR compliance efforts is a creation of transparency and trust with customers, many of whom have layers of concern and trepidation over how all companies they do business with are handling their data. GDPR compliance efforts offer a chance to clear this air, between organizations and their customers, in a way that’s beneficial to both sides. In Io-Tahoe’s eBook, we explore the obligatory components of GDPR compliance, and the mindset most appropriate to achieving it. We also investigate opportunistic facets of establishing comprehensive protection policy around personal or sensitive data. We look at the prospect of GDPR compliance through the exploration of several “mandates”. Download the e-book to find out more on the eight mandates and the dividends beyond.
Tags : 
    
Io-Tahoe
Published By: Erwin     Published Date: Jun 12, 2018
A strong data governance foundation underpins data security and privacy. Find out how to connect the dots across the data trinity – governance, security and privacy – and to act accordingly.
Tags : 
    
Erwin
Published By: graphgrid     Published Date: Oct 02, 2018
Whether it’s for a specific application, optimizing your existing operations, or innovating new customer services, graph databases are a powerful technology that turn accessing and analyzing your data into a competitive advantage. Graph databases resolve the Big Data limitations and free up data architects and developers to build amazing solutions that predict behaviors, enable data driven decisions and make insightful recommendations. Yet just as cars aren’t functional with only engines, graph databases require surrounding capabilities including ingesting multi-source data, building data models that are unique to your business needs, ease of data interaction and visualization, seamless co-existence with legacy systems, high performance search capabilities, and integration of data analysis applications. Collectively, this comprehensive data platform turns graph capabilities into tangible insights that drive your business forward.
Tags : 
    
graphgrid
Published By: graphgrid     Published Date: Oct 02, 2018
Whether it’s for a specific application, optimizing your existing operations, or innovating new customer services, graph databases are a powerful technology that turn accessing and analyzing your data into a competitive advantage. Graph databases resolve the Big Data limitations and free up data architects and developers to build amazing solutions that predict behaviors, enable data driven decisions and make insightful recommendations. Yet just as cars aren’t functional with only engines, graph databases require surrounding capabilities including ingesting multi-source data, building data models that are unique to your business needs, ease of data interaction and visualization, seamless co-existence with legacy systems, high performance search capabilities, and integration of data analysis applications. Collectively, this comprehensive data platform turns graph capabilities into tangible insights that drive your business forward.
Tags : 
    
graphgrid
Published By: MarkLogic     Published Date: Apr 01, 2013
Data virtualization solves the problem of consolidating critical data scattered across silos, providing a comprehensive, actionable view of data assets. Learn how MarkLogic presents a unified view of multi-structured data across organizational silos.
Tags : 
data management
    
MarkLogic
Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Published By: Dell EMC Storage     Published Date: Dec 18, 2018
Oggi il concetto di IT Transformation è accolto dalle aziende ancora di più che 12 mesi fa. Somiglia a un altro termine corrente: "Digital Transformation". Ma di fatto, una Digital Transformation efficace è impossibile senza l'IT Transformation. Un'azienda che intraprende la trasformazione dell'infrastruttura IT non deve più avvalersi di tecnologie rigide, manuali, in silos e legacy. Riscontra un aumento della velocità operativa, dell'efficienza, della scalabilità e della convenienza economica dell'IT: le attività sono automatizzate, i processi sono semplificati e vengono svincolate risorse. Tali miglioramenti a livello di IT alimentano una Digital Transformation su più larga scala, consentendo all'azienda di crescere nell'odierna economia digitale. L'azienda è in grado di superare la concorrenza in termini di innovazione, pensiero e velocità: in ultima analisi, riesce a guidare il cambiamento, anziché subirne gli effetti. Scopri di più sulle soluzioni Dell in collaborazione con Inte
Tags : 
    
Dell EMC Storage
Published By: Workday UK     Published Date: Sep 18, 2018
In this Argyle Executive Forum webinar replay, leading HR executives across industries provide expert insight and recommendations for building an analytics strategy and putting a data foundation in place.
Tags : 
    
Workday UK
Published By: Gigamon     Published Date: Dec 13, 2018
Download the Gigamon white paper, "Addressing the Threat Within: Rethinking Network Security Deployment," to learn how evolving cybersecurity threat conditions are changing the trust model for security. See how a structured and architectural approach to network security gives security solutions better access to network traffic while enabling them to scale cost effectively. Learn how a security delivery platform can be the foundational building block for deploying adaptable security solutions. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Read "Understanding the State of Network Security Today" to learn why ESG recommends consolidating security tools through a structured, platform-based approach. Data, analytics and reports from multiple tools can be aggregated and consumed in one control panel, reducing network vulnerabilities. Learn more about challenges, changes and best practices for today’s network security operations and tools. Read now.
Tags : 
    
Gigamon
Published By: Sparton Corporation     Published Date: Jan 08, 2019
With the cost of manufacturing in China escalating, companies are increasingly looking to Southeast Asia for an alternative to meet their outsource manufacturing needs. Emerging as the leading alternative to China, Vietnam is now a destination choice for outsource manufacturing due to the unique financial advantages it can provide companies, including those in high-tech segments such as medical and commercial aerospace. In addition to lowering total costs, Vietnam offers companies a larger labor force, strong IP protection, and reliable quality in the manufacturing process, among other benefits. Moving their contract manufacturing to Vietnam can provide companies an excellent foundation for long-term profits and sustained growth.
Tags : 
china, vietnam, southeast asia, manufacturing, cost, outsource, high-tech, commercial aerospace, medical, labor, skilled, foreign, investment, market, supply chain, intellectual property, shipping, logistics
    
Sparton Corporation
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Forcepoint     Published Date: Jan 03, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
next generation firewall, ngfw, firewall, network security, branch security, distributed offices, data security, network security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
next generation firewall, ngfw, firewall, network security, branch security, distributed offices, data security, network security
    
Forcepoint
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Big data projects often entail moving data between multiple cloud and legacy on-premise environments. A typical scenario involves moving data from a cloud-based source to a cloud-based normalization application, to an on-premise system for consolidation with other data, and then through various cloud and on-premise applications that analyze the data. Processing and analysis turn the disparate data into business insights delivered though dashboards, reports, and data warehouses - often using cloud-based apps. The workflows that take data from ingestion to delivery are highly complex and have numerous dependencies along the way. Speed, reliability, and scalability are crucial. So, although data scientists and engineers may do things manually during proof of concept, manual processes don't scale.
Tags : 
    
BMC ASEAN
Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : 
virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network, cos mapping, network consolidation
    
Virtela Communications, Inc.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept