enterprises

Results 1 - 25 of 1068Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Jul 06, 2015
The growth of NoSQL data storage solutions have revolutionized the way enterprises are dealing with their data. The older, relational platforms are still being utilized by most organizations, while the implementation of varying NoSQL platforms including Key-Value, Wide Column, Document, Graph, and Hybrid data stores are increasing at faster rates than ever seen before. Such implementations are causing enterprises to revise their Data Management procedures across-the-board from governance to analytics, metadata management to software development, data modeling to regulation and compliance. The time-honored techniques for data modeling are being rewritten, reworked, and modified in a multitude of different ways, often wholly dependent on the NoSQL platform under development. The research report analyzes a 2015 DATAVERSITY® survey titled “Modeling NoSQL.” The survey examined a number of crucial issues within the NoSQL world today, with focus on data modeling in particular.
Tags : 
    
DATAVERSITY
Published By: Innovative Systems     Published Date: Oct 26, 2017
Even after investing significant time and resources implementing a data quality solution, many enterprises find that their data does not effectively support their goals. This white paper shows how to get the most out of your data quality solution by tailoring it to support your business goals.
Tags : 
    
Innovative Systems
Published By: AtomRain     Published Date: Nov 07, 2017
The world is more connected than ever before, and data relationships only continue to multiply. Yet enterprises still operate largely with an incomplete perspective caused by segmented, non-contextual and disconnected data silos. Connected data is the key to surviving, growing and thriving. However, a transformation across the entire enterprise won’t happen overnight, and each step must be measurable from both a business and technical perspective. Organizations need expert guidance to move more swiftly and avoid costly technical pitfalls in the new paradigm. This paper examines the journey to what we call, “The Connected Enterprise”.
Tags : 
    
AtomRain
Published By: Trillium Software     Published Date: Oct 26, 2015
Acting Quickly – Or Not at All The pace of business is accelerating. Enterprises must do more things, do them more quickly – and then adjust to market and competitive forces and do them differently. They must adapt in order to remain differentiated, and with that differentiation, hopefully build and sustain competitive advantage.
Tags : 
    
Trillium Software
Published By: MarkLogic     Published Date: Jun 17, 2015
Modern enterprises face increasing pressure to deliver business value through technological innovation that leverages all available data. At the same time, those enterprises need to reduce expenses to stay competitive, deliver results faster to respond to market demands, use real-time analytics so users can make informed decisions, and develop new applications with enhanced developer productivity. All of these factors put big data at the top of the agenda. Unfortunately, the promise of big data has often failed to deliver. With the growing volumes of unstructured and multi-structured data flooding into our data centers, the relational databases that enterprises have relied on for the last 40-years are now too limiting and inflexible. New-generation NoSQL (“Not Only SQL”) databases have gained popularity because they are ideally suited to deal with the volume, velocity, and variety of data that businesses and governments handle today.
Tags : 
data, data management, databse, marklogic, column store, wide column store, nosql
    
MarkLogic
Published By: TopQuadrant     Published Date: Mar 21, 2015
Data management is becoming more and more central to the business model of enterprises. The time when data was looked at as little more than the byproduct of automation is long gone, and today we see enterprises vigorously engaged in trying to unlock maximum value from their data, even to the extent of directly monetizing it. Yet, many of these efforts are hampered by immature data governance and management practices stemming from a legacy that did not pay much attention to data. Part of this problem is a failure to understand that there are different types of data, and each type of data has its own special characteristics, challenges and concerns. Reference data is a special type of data. It is essentially codes whose basic job is to turn other data into meaningful business information and to provide an informational context for the wider world in which the enterprise functions. This paper discusses the challenges associated with implementing a reference data management solution and the essential components of any vision for the governance and management of reference data. It covers the following topics in some detail: · What is reference data? · Why is reference data management important? · What are the challenges of reference data management? · What are some best practices for the governance and management of reference data? · What capabilities should you look for in a reference data solution?
Tags : 
data management, data, reference data, reference data management, top quadrant, malcolm chisholm
    
TopQuadrant
Published By: TopQuadrant     Published Date: Jun 01, 2017
This paper presents a practitioner informed roadmap intended to assist enterprises in maturing their Enterprise Information Management (EIM) practices, with a specific focus on improving Reference Data Management (RDM). Reference data is found in every application used by an enterprise including back-end systems, front-end commerce applications, data exchange formats, and in outsourced, hosted systems, big data platforms, and data warehouses. It can easily be 20–50% of the tables in a data store. And the values are used throughout the transactional and mastered data sets to make the system internally consistent.
Tags : 
    
TopQuadrant
Published By: CA Technologies     Published Date: Apr 24, 2013
Using ERwin Data Modeler & Microsoft SQL Azure to Move Data to the Cloud within the DaaS Lifecycle by Nuccio Piscopo Cloud computing is one of the major growth areas in the world of IT. This article provides an analysis of how to apply the DaaS (Database as a Service) lifecycle working with ERwin and the SQL Azure platform. It should help enterprises to obtain the benefits of DaaS and take advantage of its potential for improvement and transformation of data models in the Cloud. The use case introduced identifies key actions, requirements and practices that can support activities to help formulate a plan for successfully moving data to the Cloud.
Tags : 
    
CA Technologies
Published By: AT&T     Published Date: Sep 11, 2014
The age of Big Data is upon us. Storage costs are going down, and data analytics is becoming more capable and more user-friendly. Even your auto mechanic will be storing a petabyte of data soon. Big Data will give businesses new insights and help improve operations. With these new tools come questions about how to use them. But your mechanic knows more about fixing a transmission than developing a Hadoop cluster, and similar concerns hold true for larger enterprises. Businesses everywhere are looking for guidance.
Tags : 
    
AT&T
Published By: iCEDQ     Published Date: Feb 05, 2015
The demand for using data as an asset has grown to a level where data-centric applications are now the norm in enterprises. Yet data-centric applications fall short of user expectations at a high rate. Part of this is due to inadequate quality assurance. This in turn arises from trying to develop data-centric projects using the old paradigm of the SDLC, which came into existence during an age of process automation. SDLC does not fit with data-centric projects and cannot address the QA needs of these projects. Instead, a new approach is needed where analysts develop business rules to test atomic items of data quality. These rules have to be run in an automated fashion in a business rules engine. Additionally, QA has to be carried past the point of application implementation and support the running of the production environment.
Tags : 
data, data management, data warehousing, data quality, etl testing, malcolm chisholm
    
iCEDQ
Published By: Reltio     Published Date: Jan 20, 2017
If you invested in master data management (MDM), you are part of an elite association of those who have been able to afford the time, effort and resources to deploy what has characteristically been a tool, and discipline reserved for only the largest enterprises. Feedback from top industry analysts and companies that transitioned from legacy MDM to modern data management platforms, led to the compilation of a list of 10 warning signs you can use as a handy guide. If one or more of these signs get your attention, it warrants a serious conversation with your current provider about these issues, and how they compare to modern offerings available today.
Tags : 
    
Reltio
Published By: MapR Technologies     Published Date: Jul 26, 2013
Enterprises are faced with new requirements for data. We now have big data that is different from the structured, cleansed corporate data repositories of the past.Before, we had to plan out structured queries. In the Hadoop world, we don’t have to sort data according to a predetermined schema when we collect it. We can store data as it arrives and decide what to do with it later. Today, there are different ways to analyze data collected in Hadoop—but which one is the best way forward?
Tags : 
white paper, hadoop, nosql, mapr, mapr technologies
    
MapR Technologies
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 15, 2017
A new Harvard Business Review Analytic Services global study of more than 300 midsize to large enterprises finds that many executives believe current collaboration tools fall short on supporting the depth, pace, and style of teamwork now required to keep up with today’s most important business imperatives.
Tags : 
collaboration, collaboration tools, harvard business review, team work, teams
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
Midsized firms operate in the same hypercompetitive, digital environment as large enterprises—but with fewer technical and budget resources to draw from. That’s why it is essential for IT leaders to leverage best-practice processes and models that can help them support strategic business goals such as agility, innovation, speed-tomarket, and always-on business operations. A hybrid IT implementation can provide the infrastructure flexibility to support the next generation of high-performance, data-intensive applications. A hybrid foundation can also facilitate new, collaborative processes that bring together IT and business stakeholders.
Tags : 
digital environment, hyper competitive, business goals, hybrid it, technology, hpe
    
Hewlett Packard Enterprise
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Cisco     Published Date: Dec 27, 2017
Today all businesses battle with unprecedented competitive pressures. In order to succeed—or even survive— they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. The very factors driving digital transformation in businesses are also pressuring IT organizations to transform. Customer expectations have increased. Companies live and die by the applications they provide to their customers and employees. A smartphone is the modern bank branch. The palm of your hand is replacing traditional brick-and-mortar stores. Access without delay or interruption, 24/7, is the new normal. If they can’t get what they want, when they want it, customers go elsewhere.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
The market for communications is shifting to one in which multi-modal interactions will become the norm. Voice, video, and messaging Communications and Collaboration will drive the future of this market. As messaging becomes a larger part of the Communications landscape, Mobile Collaboration is poised to take on a larger enterprise role, by way of shifting email to more of a confirmation tool. Moreover, the convergence of content types under UCC will be greatly enhanced by a categorized and dynamic ontology-driven knowledge framework that goes beyond search. Once the framework supports are in place, UCC will accelerate its momentum at an even greater rate than it already is today. This Research Note identifies the new elements of UCC and how enterprises can plan for the shift to multi-modal communications.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: Lookout     Published Date: Aug 28, 2017
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
mobile risk, mobile threat, mobile vulnerabilities, enterprise device, enterprise device security
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.