information technology

Results 1 - 25 of 464Sort Results By: Published Date | Title | Company Name
Published By: TD Bank Group     Published Date: Aug 10, 2018
This paper examines whether blockchain distributed ledger technology could improve the management of trusted information, specifically considering data quality. Improvement was determined by considering the impact of a distributed ledger as an authoritative source in TD Bank Group's Enterprise Data Quality Management Process versus the use of standard authoritative sources such as databases and files. Distributed ledger technology is not expected, or proven, to result in a change in the Data Quality Management process. Our analysis focused on execution advantages possible due to distributed ledger properties that make it an attractive resource for data quality management (DQM).
Tags : 
    
TD Bank Group
Published By: Alation     Published Date: Jan 06, 2017
90% of the time that is spent creating new reports is recreating information that already exists. Without a way to effectively share prior work and identify verified data sources, analysts and other data consumers lack shared context on how to apply data to analytic inquiries and business decision making. Time is wasted tracking down subject matter experts and trying to unearth tribal knowledge. Leading analytic organizations in retail, healthcare, financial services and technology are using data catalogs to help their analysts find, understand and use data appropriately. What are the 5 critical capabilities of a data catalog? Learn more here:
Tags : 
    
Alation
Published By: Alation     Published Date: Jan 06, 2017
90% of the time that is spent creating new reports is recreating information that already exists. Without a way to effectively share prior work and identify verified data sources, analysts and other data consumers lack shared context on how to apply data to analytic inquiries and business decision making. Time is wasted tracking down subject matter experts and trying to unearth tribal knowledge. Leading analytic organizations in retail, healthcare, financial services and technology are using data catalogs to help their analysts find, understand and use data appropriately. What are the 5 critical capabilities of a data catalog? Learn more here:
Tags : 
    
Alation
Published By: Expert System     Published Date: Mar 19, 2015
Establishing context and knowledge capture In today’s knowledge-infused world, it is vitally important for organizations of any size to deploy an intuitive knowledge platform that enables delivery of the right information at the right time, in a way that is useful and helpful. Semantic technology processes content for meaning, allowing for the ability to understand words in context: it allows for better content processing and interpretation, therefore enabling content organization and navigation, which in turn increases findability.
Tags : 
enterprise data management, unstructured data, semantic technology, expert system
    
Expert System
Published By: Trillium Software     Published Date: Mar 29, 2016
We are living in a new age in which your business success depends on access to trusted data across more systems and more users faster than ever before. However, your business information is often incomplete, filled with errors, and beyond the reach of people who need it. Whether you’re responsible for technology or information strategy, you need to enable your business to have real-time access to reliable information. Otherwise, your company will be left behind. Download Trillium’s whitepaper, “How to Succeed in the New Age of Data Quality”, to learn how you can create a successful data quality strategy.
Tags : 
    
Trillium Software
Published By: Silwood Technology     Published Date: Mar 02, 2016
Ever since organisations started to implement packaged software solutions to solve business problems and streamline their processes there has been a need to access their data for the purposes of reporting and analytics, integration, governance, master data and more. Information Management projects such as these rely on data professionals being able to understand the underlying data models for these packages in order to be able to answer the critical question “Where’s the data?”. Without this knowledge it is impossible to ensure accuracy of data or timely delivery of projects. In addition the lack of discovery tools designed to meet this challenge has meant that performing this task has commonly been frustrating, time-consuming and fraught with risk. This white paper offers insight into why the traditional methods are not effective and how an innovative software product from Silwood Technology provides a faster and more effective approach to solving the problem.
Tags : 
    
Silwood Technology
Published By: Cambridge Semantics     Published Date: Apr 03, 2014
A new approach to rapid, high-quality data integration, data services, and data governance.
Tags : 
white paper, data, data mangement, enterprise information management, cambridge semantics, semantic technology
    
Cambridge Semantics
Published By: Ted Hills     Published Date: Mar 29, 2016
NoSQL database management systems give us the opportunity to store our data according to more than one data storage model, but our entity-relationship data modeling notations are stuck in SQL land. Is there any need to model schema-less databases, and is it even possible? In this short white paper, Ted Hills examines these questions in light of a recent paper from MarkLogic on the hybrid data model. Ted Hills has been active in the Information Technology industry since 1975. At LexisNexis, Ted co-leads the work of establishing enterprise data architecture standards and governance processes, working with data models and business and data definitions for both structured and unstructured data. His book, NoSQL and SQL Data Modeling, was recently released by Technics Publications (http://technicspub.com).
Tags : 
    
Ted Hills
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Cisco Meraki offers a comprehensive portfolio of cloud-managed IT solutions designed to work together to help deliver a modern network that is powerful, reliable, and easy to manage. This whitepaper discusses modern IT trends and explores how the Cisco Meraki portfolio of IT solutions work together to help deliver reliable, pervasive connectivity for the modern business.
Tags : 
    
Cisco EMEA
Published By: VMware     Published Date: Dec 10, 2018
Healthcare IT is in the midst of a revolution. Far from its leaky-ceiling basement beginnings, healthcare information technology (HIT) is now a strategic business differentiator with a key to the executive washroom. Challenged to innovate new patient and provider application services while maintaining traditional client-server applications, HIT teams are seeking ways to ensure investments in the management and maintenance of traditional systems don’t prevent the delivery of new digital experiences now and into the future. To find out more download this eBook today.
Tags : 
    
VMware
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced
    
Coyote Point Systems
Published By: MuleSoft     Published Date: Nov 27, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability and shared service models as a means towards increasing IT delivery capacity. But those approaches are easier talked about than executed. As agencies embark on legacy modernization, it becomes imperative to open up the existing technology so that new innovations can be delivered as needed in a secure way. In this guide, produced in partnership with Govloop, we will discuss A five-play roadmap to help those in government get a better sense of where to start on modernization projects. An overview of the Information Technology Modernization Fund (ITMF). Featured government success stories highlighting their modernization projects. The IT Modernization Lifecycle, based on the recent report by the American Council for Technology-Industry Advisory Council.
Tags : 
    
MuleSoft
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, database security
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, analytical applications, business intelligence, service oriented architecture
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, analytical applications, business intelligence, database development
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 09, 2009
Improved business productivity often requires more efficient IT and more efficient IT cannot be achieved without a better understanding of the way business services are run and delivered. Configuration Management Databases (CMDBs) have emerged as a central component for Information Technology Infrastructure Library (ITIL) and business service management (BSM).
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, analytical applications
    
ASG Software Solutions
Published By: Comcast Business     Published Date: Dec 04, 2018
The quick-service restaurant industry continues to be a favorite among consumers who look to the sector for a wide variety of food served quickly and at a low price. The speed and efficiency of QSRs, which include the emergent “fast casual” restaurants, match today’s on-the-go lifestyle of consumers across all ages who often are too busy to cook at home. That said, consumers expect their dining experience at a QSR to be comfortable with conveniences ranging from WiFi connectivity to ordering kiosks and dining area entertainment on large screens or even tableside tablets. They expect the information on menu boards to be accurate and up-to-date and their meal orders to be fulfilled quickly and accurately. Technology is a major enabler in meeting consumers’ expectations while simultaneously helping QSR locations increase operational efficiencies and quality of service.
Tags : 
    
Comcast Business
Published By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
Cylance
Published By: SAS     Published Date: Oct 03, 2018
Because terrorists and other criminals are already using technology to carry out their missions, intelligence professionals need to access all available, appropriate information, to extract important elements and process, analyze and disseminate it quickly to keep ahead of potential threats. The scale, complexity and changing nature of intelligence data can make it impossible to stay in front without the aid of technology to collect, process and analyze big data. This paper describes a solution for how this information can be quickly and safely shared with access based on a user's organizational responsibilities and need to know.
Tags : 
    
SAS
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Big data and analytics is a rapidly expanding field of information technology. Big data incorporates technologies and practices designed to support the collection, storage, and management of a wide variety of data types that are produced at ever increasing rates. Analytics combine statistics, machine learning, and data preprocessing in order to extract valuable information and insights from big data.
Tags : 
big data, analytics, virtualization, cloudera, ibm, sas, sap, splunk
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Dec 13, 2017
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Salesforce’s© Customer Relationship Management (CRM) cloud product for example is now widely used by businesses for its significantly lower cost and overhead when compared to on-premise predecessors. The cloud is driving an insatiable demand for faster, more reliable network access, and for IT organizations the pressure is on.
Tags : 
connectivity, network, management, configuration, security, reliability, meraki
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Salesforce’s© Customer Relationship Management (CRM) cloud product for example is now widely used by businesses for its significantly lower cost and overhead when compared to on-premise predecessors. The cloud is driving an insatiable demand for faster, more reliable network access, and for IT organizations the pressure is on.
Tags : 
management, scalability, business, enterprise, technology
    
Cisco EMEA
Published By: SAP     Published Date: May 18, 2014
In-memory technology—in which entire datasets are pre-loaded into a computer’s random access memory, alleviating the need for shuttling data between memory and disk storage every time a query is initiated—has actually been around for a number of years. However, with the onset of big data, as well as an insatiable thirst for analytics, the industry is taking a second look at this promising approach to speeding up data processing.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, analytical applications
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Business and information technology (IT) are moving faster than ever. Success favors companies that can invent and reinvent at warp speeds. These companies rely on IT to fuel new customer experiences as well as to deliver and pay for products and services. Download this how-to guide to learn about transforming to the right mix of hybrid infrastructure.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.