nec

Results 1 - 25 of 2537Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Nov 05, 2014
Ask any CEO if they want to better leverage their data assets to drive growth, revenues, and productivity, their answer will most likely be “yes, of course.” Ask many of them what that means or how they will do it and their answers will be as disparate as most enterprise’s data strategies. To successfully control, utilize, analyze, and store the vast amounts of data flowing through organization’s today, an enterprise-wide approach is necessary. The Chief Data Officer (CDO) is the newest member of the executive suite in many organizations worldwide. Their task is to develop and implement the strategies needed to harness the value of an enterprise’s data, while working alongside the CEO, CIO, CTO, and other executives. They are the vital “data” bridge between business and IT. This paper is sponsored by: Paxata and CA Technologies
Tags : 
chief data officer, cdo, data, data management, research paper, dataversity
    
DATAVERSITY
Published By: DATAVERSITY     Published Date: Nov 20, 2015
The competitive advantages realized from a dependable Business Intelligence and Analytics (BI/A) are well documented. Everything from reduced business costs and increased customer retention to better decision making and the ability to forecast opportunities have been observed outcomes in response to such programs. The implementation of such a program remains a necessity for any growing or mature enterprise. The establishment of a comprehensive BI/A program that includes traditional Descriptive Analytics along with next generation categories such as Predictive or Prescriptive Analytics is indispensable for business success.
Tags : 
    
DATAVERSITY
Published By: Access Sciences     Published Date: Sep 07, 2014
Few organizations have fully integrated the role of the Data Steward due to concerns about additional project complexity, time away from other responsibilities or insufficient value in return. The principles of the Agile methodology (whether or not Agile is followed for projects) can offer guidance in making the commitment to designating and empowering the Data Steward role. By placing insightful people in a position to connect innovators, respond to change and spur development aligned with business activities, organizations can expect to see a more efficient and effective use of their information assets.
Tags : 
    
Access Sciences
Published By: Melissa Data     Published Date: Jan 18, 2018
Maintaining high quality data is essential for operational efficiency, meaningful analytics and good long-term customer relationships. But, when dealing with multiple sources of data, data quality becomes complex, so you need to know when you should build a custom data quality tools over canned solutions. To answer this question, it is important to understand the difference between rules-based data quality, where internal subject matter expertise is necessary – and active data quality, where different domain expertise and resources are required.
Tags : 
    
Melissa Data
Published By: Basho     Published Date: Sep 30, 2016
The Internet of Things (IoT) or the Internet of Everything is changing the way companies interact with their customers and manage their data. These connected devices generate high volume time series data that can be created in milliseconds. This fast growth of IoT data and other time series data is producing challenges for enterprise applications where data must be collected, saved, and analyzed in the blink of an eye. Your application needs a database built to uniquely handle time series data to ensure your data is continuously available and accurate.Learn about the only NoSQL database optimized for IoT and Time Series data in this technical overview. Riak TS stores and analyzes massive amounts of data and is designed to be faster than Cassandra.
Tags : 
    
Basho
Published By: AnalytixDS     Published Date: Feb 28, 2015
With future business intelligence solutions clearly evolving from data that comes from highly efficient and well behaved systems, to data that comes from the extended enterprise where data is not necessarily so well structured and behaved - Organizations are forced into a more collaborative mode of operation with their core infrastructure being adapted from the consumer space, and to the extent possible, conformed to their existing repositories. This whitepaper attempts to address various challenges consumers face while managing enormous data sets within the context of this complex scenario. Further, we’ll try to answer the question: Is Big Data Governance really that different from traditional data governance initiatives? Finally, we’ll see how AnalytiX™ Mapping Manager™ can help organizations accelerate the development and deployment of a successful Big Data/ Business Intelligence platform and accelerate delivery of all sorts of data – structured, semi-structured as well as unstruc
Tags : 
big data, big data governance, data governance, analytixds
    
AnalytixDS
Published By: Neo Technology     Published Date: Feb 15, 2018
By itself, data offers finite value. But when connected, its value is infinite. Discover how enterprise organizations such as Airbnb, eBay and Telia used connected data and graph technology in order to create a sustainable competitive advantage. This white paper shows business leaders how to take advantage of data relationships with graph technology.
Tags : 
    
Neo Technology
Published By: Silwood Technology     Published Date: Nov 28, 2016
Business functions in large organizations are usually handled by software application packages. Some of the most well-known of these are from SAP, Oracle, Salesforce and Microsoft. These packages all store their data in a database. Often however it is necessary to use that data with other IT projects. In this instance being able to understand the metadata that defines these databases is critical. The challenge is that their metadata is complex, opaque and difficult to access. This paper describes how the top application packages store and use their own metadata. It explores the importance of understanding that metadata and examines the obstacles in getting at that metadata in a timely and effective manner.
Tags : 
    
Silwood Technology
Published By: Silwood Technology     Published Date: Mar 21, 2017
Business functions in large organizations are usually handled by software application packages. Some of the most well-known of these are from SAP, Oracle, Salesforce and Microsoft. These packages all store their data in a database. Often however it is necessary to use that data with other IT projects. In this instance being able to understand the metadata that defines these databases is critical. The challenge is that their metadata is complex, opaque and difficult to access. This paper describes how the top application packages store and use their own metadata. It explores the importance of understanding that metadata and examines the obstacles in getting at that metadata in a timely and effective manner.
Tags : 
    
Silwood Technology
Published By: Looker     Published Date: Mar 15, 2016
Data centralization merges different data streams into a common source through unified variables. This process can provide context to overly-broad metrics and enable cross-platform analytics to guide better business decisions. Investments in analytics tools are now paying back a 13.01:1 return on investment (ROI), with increased returns when these tools integrate with three or more data sour- ces. While the perks of centralization are obvious in theory, the quantity and variety of data available in today’s landscape make this difficult to achieve. This report provides a roadmap for how to connect systems, data stores, and institutions (both technological and human). Learn: • How data centralization enables better analytics • How to redefine data as a vehicle for change • How the right BI tool eliminates the data analyst bottleneck • How to define single sources of truth for your organization • How to build a data-driven (not just data-rich) organization
Tags : 
    
Looker
Published By: AtomRain     Published Date: Nov 07, 2017
The world is more connected than ever before, and data relationships only continue to multiply. Yet enterprises still operate largely with an incomplete perspective caused by segmented, non-contextual and disconnected data silos. Connected data is the key to surviving, growing and thriving. However, a transformation across the entire enterprise won’t happen overnight, and each step must be measurable from both a business and technical perspective. Organizations need expert guidance to move more swiftly and avoid costly technical pitfalls in the new paradigm. This paper examines the journey to what we call, “The Connected Enterprise”.
Tags : 
    
AtomRain
Published By: TopQuadrant     Published Date: Jul 18, 2016
With information streaming in from more varied sources and at a faster pace than ever before, organizations are having an increasingly difficult time deriving accurate meaning from their data. Data governance systems that were once able to organize and process enterprise information are becoming too slow and limited.   Semantic information management makes it easier to reconcile data from different sources by compiling and organizing information about that data, its metadata. By connecting all kinds of data and metadata in a more accessible way, semantic information systems empower users, data stewards and analysts to unlock and use the true meaning and value of their organization’s data.     Learn more about the challenges in the evolving data landscape and how a semantic approach can help.
Tags : 
    
TopQuadrant
Published By: TopQuadrant     Published Date: Aug 01, 2016
With information streaming in from more varied sources and at a faster pace than ever before, organizations are having an increasingly difficult time deriving accurate meaning from their data. Data governance systems that were once able to organize and process enterprise information are becoming too slow and limited. Semantic information management makes it easier to reconcile data from different sources by compiling and organizing information about that data, its metadata. By connecting all kinds of data and metadata in a more accessible way, semantic information systems empower users, data stewards and analysts to unlock and use the true meaning and value of their organization’s data. Learn more about the challenges in the evolving data landscape and how a semantic approach can help.
Tags : 
    
TopQuadrant
Published By: DATAVERSITY     Published Date: Dec 27, 2013
There are actually many elements of such a vision that are working together. ACID and NoSQL are not the antagonists they were once thought to be; NoSQL works well under a BASE model, but also some of the innovative NoSQL systems fully conform to ACID requirements. Database engineers have puzzled out how to get non-relational systems to work within an environment that demands high availability, scalability, with differing levels of recovery and partition tolerance. BASE is still a leading innovation that is wedded to the NoSQL model, and the evolution of both together is harmonious. But that doesn’t mean they always have to be in partnership; there are several options. So while the opening anecdote is true in many cases, organizations that need more diverse possibilities can move into the commercial arena and get the specific option that works best for them. This paper is sponsored by: MarkLogic.
Tags : 
nosql, database, acid v base, white paper
    
DATAVERSITY
Published By: Cisco EMEA Tier 3 ABM     Published Date: May 15, 2018
Nell'economia globale di oggi, le reti delle piccole imprese devono permettere di ridurre le spese operative. Devono consentire di reagire rapidamente ai cambiamenti del mercato e delle esigenze dei clienti. Devono essere pronte per il futuro. Le tecnologie di routing e switching possono avere un impatto positivo sulle spese. Condividere risorse come stampanti, accesso a Internet, server e servizi permette di risparmiare. Inoltre, una rete affidabile può evolversi con l'azienda, in modo che non sia necessario sostituirla quando le esigenze crescono.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: May 15, 2018
Sicuramente vuoi che la tua azienda cresca, sia redditizia e resti competitiva. Per avere successo è indispensabile avere una rete solida. Cisco è leader tecnologico mondiale. Le nostre soluzioni per le PMI offrono l'infrastruttura IT affidabile, scalabile ed estremamente sicura necessaria per il business. I team IT devono far funzionare l'infrastruttura e allo stesso tempo risolvere le richieste urgenti e implementare nuove tecnologie, spesso con personale limitato. Le nostre soluzioni Cisco® per PMI sono progettate per queste esigenze. Il risultato: le risorse IT hanno più tempo da dedicare a progetti di maggior valore.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: May 15, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location—across time zones or simply across the conference table. And those workplaces are expanding faster than ever, powered by mobile and cloud usage that makes virtual meetings essential. With scalable and secure voice, video, and content sharing, real-time collaboration can happen anywhere. Staying connected can lead to improved productivity and faster decision-making, as well as better customer service. But only if the technology offers a seamless experience and is intuitive enough to drive user adoption. While the need for better meetings is universal, not all conferencing tools are the same. Choosing the wrong tool could actually decrease productivity by wasting valuable meeting time troubleshooting the technology, or by providing a negative experience that will deter users from embracing it. This is especially true in situations where poor meeting quality could impact
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: May 15, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco è imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che più necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: Apr 13, 2018
In The Top Technologies to Cure Mobile Performance, Forrester’s Mark Grannan elaborates on this reality and explains how firms can tackle the device, bandwidth, and location challenges to appeal to a users perception of performance. In this paper, Mark explains: Why a Delivery Tier is Necessary Why Perception of Performance is the Key Metric of Mobile Success How User Context Steers Performance Optimization Whether to Build or Buy Delivery Capabilities Why the Delivery Tier Alone is Not Enough to Improve Performance.
Tags : 
technology, mobile, forrester, performance, optimization, device, bandwidth
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: TigerConnect     Published Date: May 02, 2018
t’s stunning really, that something as basic as communication among your care team members is such a significant factor in your success as a health delivery organization. And yet, it’s proven every day in hospitals and other patient care settings throughout the nation. Every one of these either affects or reflects your ability to complete tasks effectively. At right is a list of metrics that are affected by communications among clinical staff.
Tags : 
    
TigerConnect
Published By: TigerConnect     Published Date: May 02, 2018
Hospitals and other care organizations are turning to clinical communication & collaboration solutions—often referred to as CC&C systems—as a way to improve care-team coordination and to expedite care delivery. But there’s an unexpected challenge with this journey. These clinical communication solutions are changing so rapidly, it’s not easy for IT decision-makers to be confident with their vendor selection. You want to pick the best system for your organization, but there are so many factors to consider. And the factors keep changing. At any moment, you don’t know what you don’t know. This Technical Buyer’s Guide is for you if: • You’re an IT professional in a healthcare organization that provides direct patient care. • Your organization is thinking of purchasing a new system to support clinical communications among your clinical and administrative staff. • You’re looking for technical details that will help you choose the best communication solution for your organization.
Tags : 
    
TigerConnect
Published By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
    
Google
Published By: Google     Published Date: Apr 30, 2018
"Pressure on IT to deliver new functionality continues to drive faster software development cycles. While agility has always been important, today’s IT teams must operate in a hybrid environment where applications take various forms: legacy systems that remain on-prem, existing applications migrated to the cloud, and new applications built with cloud-native approaches. The combination makes for an increasingly complex IT landscape — one in which simply migrating to the cloud falls short. Read this Google Cloud guide and learn how IT leaders can better meet today’s challenges by capitalizing on the historic shift toward open, connected environments."
Tags : 
    
Google
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.