mobile

Results 1 - 25 of 3920Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Jun 14, 2013
This report analyzes many challenges faced when beginning a new Data Governance program, and outlines many crucial elements in successfully executing such a program. “Data Governance” is a term fraught with nuance, misunderstanding, myriad opinions, and fear. It is often enough to keep Data Stewards and senior executives awake late into the night. The modern enterprise needs reliable and sustainable control over its technological systems, business processes, and data assets. Such control is tantamount to competitive success in an ever-changing marketplace driven by the exponential growth of data, mobile computing, social networking, the need for real-time analytics and reporting mechanisms, and increasing regulatory compliance requirements. Data Governance can enhance and buttress (or resuscitate, if needed) the strategic and tactical business drivers every enterprise needs for market success. This paper is sponsored by: ASG, DGPO and DebTech International.
Tags : 
data, data management, data governance, data steward, dataversity, research paper
    
DATAVERSITY
Published By: Couchbase     Published Date: Dec 04, 2014
Interactive applications have changed dramatically over the last 15 years. In the late ‘90s, large web companies emerged with dramatic increases in scale on many dimensions: · The number of concurrent users skyrocketed as applications increasingly became accessible · via the web (and later on mobile devices). · The amount of data collected and processed soared as it became easier and increasingly · valuable to capture all kinds of data. · The amount of unstructured or semi-structured data exploded and its use became integral · to the value and richness of applications. Dealing with these issues was more and more difficult using relational database technology. The key reason is that relational databases are essentially architected to run a single machine and use a rigid, schema-based approach to modeling data. Google, Amazon, Facebook, and LinkedIn were among the first companies to discover the serious limitations of relational database technology for supporting these new application requirements. Commercial alternatives didn’t exist, so they invented new data management approaches themselves. Their pioneering work generated tremendous interest because a growing number of companies faced similar problems. Open source NoSQL database projects formed to leverage the work of the pioneers, and commercial companies associated with these projects soon followed. Today, the use of NoSQL technology is rising rapidly among Internet companies and the enterprise. It’s increasingly considered a viable alternative to relational databases, especially as more organizations recognize that operating at scale is more effectively achieved running on clusters of standard, commodity servers, and a schema-less data model is often a better approach for handling the variety and type of data most often captured and processed today.
Tags : 
database, nosql, data, data management, white paper, why nosql, couchbase
    
Couchbase
Published By: Cloudant - an IBM Company     Published Date: Aug 01, 2015
The database you pick for your next web or mobile application matters now more than ever. Today’s applications are expected to run non-stop and must efficiently manage continuously growing amounts of transactional and multi-structured data in order to do so. This has caused NoSQL to grow from a buzzword to a serious consideration for every database, from small shops to the enterprise. Read this whitepaper to learn why NoSQL databases have become such a popular option, explore the various types available, and assess whether you should consider implementing a NoSQL solution for your next application.
Tags : 
    
Cloudant - an IBM Company
Published By: VoltDB     Published Date: Feb 12, 2016
The need for fast data applications is growing rapidly, driven by the IoT, the surge in machine-to-machine (M2M) data, global mobile device proliferation, and the monetization of SaaS platforms. So how do you combine real-time, streaming analytics with real-time decisions in an architecture that’s reliable, scalable, and simple? In this report, Ryan Betts and John Hugg from VoltDB examine ways to develop apps for fast data, using pre-defined patterns. These patterns are general enough to suit both the do-it-yourself, hybrid batch/streaming approach, as well as the simpler, proven in-memory approach available with certain fast database offerings.
Tags : 
    
VoltDB
Published By: Couchbase     Published Date: Jan 28, 2013
Interactive software has changed in fundamental ways over the last 35 years. But until recently, database technology has not advanced to keep pace. The “online” systems of the 1970s have evolved into today’s web and mobile applications.
Tags : 
big data, white paper, analytics, data management
    
Couchbase
Published By: Couchbase     Published Date: Jan 29, 2013
Interactive software has changed in fundamental ways over the last 35 years. But until recently, database technology has not advanced to keep pace. The “online” systems of the 1970s have evolved into today’s web and mobile applications.
Tags : 
data management
    
Couchbase
Published By: DATAVERSITY     Published Date: Jun 17, 2013
This report analyzes many challenges faced when beginning a new Data Governance program, and outlines many crucial elements in successfully executing such a program. “Data Governance” is a term fraught with nuance, misunderstanding, myriad opinions, and fear. It is often enough to keep Data Stewards and senior executives awake late into the night. The modern enterprise needs reliable and sustainable control over its technological systems, business processes, and data assets. Such control is tantamount to competitive success in an ever-changing marketplace driven by the exponential growth of data, mobile computing, social networking, the need for real-time analytics and reporting mechanisms, and increasing regulatory compliance requirements. Data Governance can enhance and buttress (or resuscitate,if needed) the strategic and tactical business drivers every enterprise needs for market success.
Tags : 
research paper, data, data management, data governance, data steward
    
DATAVERSITY
Published By: Couchbase     Published Date: Jan 24, 2013
Interactive software has changed in fundamental ways over the last 35 years. But until recently, database technology has not advanced to keep pace. The “online” systems of the 1970s have evolved into today’s web and mobile applications.
Tags : 
white paper, nosql, database, data, data managemet, couchbase, dataversity, data management
    
Couchbase
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Dell EMC     Published Date: Aug 17, 2018
Your mobile workforce needs devices that are both versatile and allow for higher productivity. Increasingly, that’s 2-in-1 devices, such as convertible notebooks or detachable tablets. IDC research shows that using Dell 2-in-1 devices, powered by Intel® processors, made people more productive while being less physically demanding and requiring less effort. Download the executive summary for highlights of the IDC study and to find out why people prefer using 2-in-1 devices over traditional laptops. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management. As we receive inquiry on this area increasingly, it makes sense to assess this market.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The use of SaaS applications within an organization is the new normal. In fact, there's a good chance that just your marketing department alone is using over 10 SaaS products. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double to $67.2 billion by 2019. Integration needs are changing, with SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels all new integration points that will need to be captured in your business processes. Read “Five Principles for Integrating Software as a Service Applications” to learn: Key principles for successful hybrid integrations New integration use cases to grow your business upward and outward The why and how of integration as both an enabler and a differentiator Benefits of the TIBCO integration platform and its various offerings
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
    
TIBCO Software APAC
Published By: CyberSource     Published Date: Aug 31, 2018
Gain a bird's-eye view of how online fraud affects the airline industry Fraud continues to be a major source of revenue loss for the global airline industry. With airlines pushing for more direct bookings and the accelerating use of mobile as a booking platform, incidence of fraud is rising, albeit only slightly. Despite these factors, many airlines are not devoting the necessary resources and tracking the required metrics to measure and control fraud. CyberSource partnered with Phocuswright to benchmark global metrics and trends in fraud management and protection among airlines. The study also explores airline awareness of various fraud-related issues and examines their approaches to and implementation of fraud management tools and services. To learn more, download the study today
Tags : 
    
CyberSource
Published By: Intel     Published Date: Sep 14, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel
Published By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Apr 18, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.