mba

Results 1 - 25 of 320Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Nov 11, 2013
This report investigates the level of Information Architecture (IA) implementation and usage at the enterprise level. The primary support for the report is an analysis of a 2013 DATAVERSITY™ survey on Data and Information Architecture. This paper is sponsored by: HP, Vertica, Denodo, Embarcadero and CA Technologies.
Tags : 
information architecture, data architecture, white paper, mdm, master data management, data, data management, enterprise information management, enterprise data management, data virtualization, metadata, data modeling, research paper, survey, data integration
    
DATAVERSITY
Published By: Embarcadero     Published Date: Oct 21, 2014
Metadata defines the structure of data in files and databases, providing detailed information about entities and objects. In this white paper, Dr. Robin Bloor and Rebecca Jowiak of The Bloor Group discuss the value of metadata and the importance of organizing it well, which enables you to: - Collaborate on metadata across your organization - Manage disparate data sources and definitions - Establish an enterprise glossary of business definitions and data elements - Improve communication between teams
Tags : 
data, data management, enterprise data management, enterprise information management, metadata, robin bloor, rebecca jozwiak, embarcadero
    
Embarcadero
Published By: Embarcadero     Published Date: Jan 23, 2015
There are multiple considerations for collaborating on metadata within an organization, and you need a good metadata strategy to define and manage the right processes for a successful implementation. In this white paper, David Loshin describes how to enhance enterprise knowledge sharing by using collaborative metadata for structure, content, and semantics.
Tags : 
data, data management, metadata, enterprise information management, data modeling, embarcadero
    
Embarcadero
Published By: Embarcadero     Published Date: Apr 29, 2015
Everything about data has changed, but that only means that data models are even more essential to understanding that data so that businesses can know what it means. As development methodologies change to incorporate Agile workflows, data architects must adapt to ensure models stay relevant and accurate. This whitepaper describes key requirements for Agile data modeling and shows how ER/Studio supports this methodology.
Tags : 
data, data management, data modeling, agile, agile data modeling, it management
    
Embarcadero
Published By: Embarcadero     Published Date: Jul 23, 2015
Whether you’re working with relational data, schema-less (NoSQL) data, or model metadata, you need a data architecture that can actively leverage information assets for business value. The most valuable data has high quality, business context, and visibility across the organization. Check out this must-read eBook for essential insights on important data architecture topics.
Tags : 
    
Embarcadero
Published By: T4G     Published Date: Mar 15, 2017
About to embark on an advanced analytics project? Or have already started and things aren’t going as planned? This white paper will share our approach to ensure you set up for success. We will discuss aspects of data strategy and data stewardship, and why they are so important. We will outline the benefits of having a solid data strategy and how to start the data strategy conversation within your organization. We will then outline how a project’s entry point (the initial impetus for the project) impacts the scope and approach for the project. And will show you how to avoid missteps and gaps that can lead to less than stellar results or wasted effort. The white paper will touch on the importance of understanding your business drivers and how to use them as your guide to get the most out of your data driven decision making projects. Our proven approach will help ensure a successful start on your advanced analytics journey.
Tags : 
    
T4G
Published By: Embarcadero     Published Date: Feb 28, 2013
A recent Data Governance Benchmarking Survey reported that only 23% of organizations have a reasonable command of data compliance. A shockingly low number. We as data professionals cannot solve the problem alone.
Tags : 
white paper, dataversity, data governance, karen lopez, embarcadero, data management
    
Embarcadero
Published By: Embarcadero     Published Date: Apr 02, 2014
IT professionals in organizations developing an enterprise data modeling program may feel overwhelmed at the scope and complexity of initiating new methods, tools, and techniques. Whether their organization is just starting out or experienced in enterprise data modeling efforts, there are certain pitfalls that can become obstacles to success. This paper looks at the benefits of an effective enterprise data modeling effort and discusses seven common mistakes that organizations can make in developing enterprise data models.
Tags : 
    
Embarcadero
Published By: Embarcadero     Published Date: Apr 23, 2015
Everything about data has changed, but that only means that data models are even more essential to understanding that data so that businesses can know what it means. As development methodologies change to incorporate Agile workflows, data architects must adapt to ensure models stay relevant and accurate. This whitepaper describes key requirements for Agile data modeling and shows how ER/Studio supports this methodology.
Tags : 
data, data management, data modeling, agile, agile data modeling, it management
    
Embarcadero
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
De un solo vistazo Los trabajadores de hoy en día están acostumbrados a usar tecnologías personales que facilitan la comunicación y que simplifican sus vidas. Sin embargo, muchas herramientas empresariales no han podido seguir el ritmo. La mayoría de soluciones de gestión de carteras y productos actuales no logran proporcionar formas sencillas de realizar las tareas diarias. No facilitan una comunicación en contexto que ayude a solucionar los problemas y no cuentan con funcionalidades básicas, como la capacidad de estrechar el foco sobre los datos relevantes, de clasificar información adicional, de realizar previsiones financieras eficaces y de modelar los resultados.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
El auge de la interfaz de programación de aplicaciones (API por sus siglas en inglés) representa una oportunidad de negocio y supone un reto técnico. Para los líderes empresariales, las API representan una oportunidad para abrir nuevos flujos de ingresos y maximizar el valor ofrecido al cliente. Sin embargo, los arquitectos empresariales son los encargados de crear las API que posibilitan la reutilización de sistemas back-end en las nuevas aplicaciones web y móviles. Resulta esencial que todos los implicados comprendan que los objetivos de negocio y los retos técnicos de un programa de API están estrechamente relacionados. Los gestores de los programas deben responsabilizarse de comunicar con claridad los objetivos de negocio clave de una API propuesta a los arquitectos que deberán construir la interfaz.
Tags : 
    
CA Technologies EMEA
Published By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : 
logrhythm, sans, cloudai, ueba
    
LogRhythm
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : 
data, gdpr, global, nationally, cybercriminals
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? Perhaps you went with something you had used at a previous job. Maybe you even went so far as to read a few product reviews and third-party test results or evaluations. But, did you test the anti-malware solution yourself? In this book, we explain how artificial intelligence (AI) can help your enterprise combat malware threats in a more preventative, proactive, and radically better way than legacy anti-malware products. We explain why you shouldn't just believe a vendor's marketing. Instead, you should test different solutions for yourself, just as you would with any other major security investment. Read more in this eBook.
Tags : 
anti, malware, testing, generation, data, security
    
Cylance
Published By: Cisco     Published Date: Jan 04, 2016
Sin embargo, los costes operativos se dispararon, ya que se necesitó una serie de procesos complejos y laboriosos. Con el tiempo, estos costes se controlaron gracias a una mayor integración de los servidores y la infraestructura de la red, así como a capacidades de software más avanzadas.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, data center
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
We have conditioned patients not only to expect opioids for pain relief, but to utilize more and more of them, and the addiction is both psychological and physical. To remedy the situation, a lot of policies and practices and behaviors must change around how the health care system approaches pain. But we do not yet have the data and analytics we need to determine what specifically to do at the patient level or the policy level. Download this whitepaper to learn more about the resources available and how we can fix this issue.
Tags : 
    
SAS
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, cloud computing
    
CA Technologies
Published By: Dell EMC     Published Date: Feb 07, 2018
Technology is quickly moving to the forefront of business priorities as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users leverage applications and data in new ways. Organizations in all industries must better align with changing customer preferences to avoid being disrupted by a new crop of nimble competitors. Technology will increasingly determine how businesses define and distinguish themselves in the market. IDC has noted that most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on an IT transformation initiative to modernize and automate their legacy infrastructure to prime themselves to achieve their digital business goals and initiatives. Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. a
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2018
Modern businesses are increasingly embracing digital transformation — leveraging new technologies to reinvent core processes, business models, product offerings, and the customer experience. As businesses embark on the digital transformation journey, they need to modernize their underlying technology infrastructure to enable a more agile, customerfocused, flexible, and innovative digital workplace to drive greater human and operational efficiencies. Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor
Tags : 
    
Dell EMC
Published By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : 
lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless, classroom, media-rich apps, school
    
Ruckus Wireless
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.