nec

Results 1 - 25 of 2272Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Nov 05, 2014
Ask any CEO if they want to better leverage their data assets to drive growth, revenues, and productivity, their answer will most likely be “yes, of course.” Ask many of them what that means or how they will do it and their answers will be as disparate as most enterprise’s data strategies. To successfully control, utilize, analyze, and store the vast amounts of data flowing through organization’s today, an enterprise-wide approach is necessary. The Chief Data Officer (CDO) is the newest member of the executive suite in many organizations worldwide. Their task is to develop and implement the strategies needed to harness the value of an enterprise’s data, while working alongside the CEO, CIO, CTO, and other executives. They are the vital “data” bridge between business and IT. This paper is sponsored by: Paxata and CA Technologies
Tags : 
chief data officer, cdo, data, data management, research paper, dataversity
    
DATAVERSITY
Published By: DATAVERSITY     Published Date: Nov 20, 2015
The competitive advantages realized from a dependable Business Intelligence and Analytics (BI/A) are well documented. Everything from reduced business costs and increased customer retention to better decision making and the ability to forecast opportunities have been observed outcomes in response to such programs. The implementation of such a program remains a necessity for any growing or mature enterprise. The establishment of a comprehensive BI/A program that includes traditional Descriptive Analytics along with next generation categories such as Predictive or Prescriptive Analytics is indispensable for business success.
Tags : 
    
DATAVERSITY
Published By: AtomRain     Published Date: Nov 07, 2017
The world is more connected than ever before, and data relationships only continue to multiply. Yet enterprises still operate largely with an incomplete perspective caused by segmented, non-contextual and disconnected data silos. Connected data is the key to surviving, growing and thriving. However, a transformation across the entire enterprise won’t happen overnight, and each step must be measurable from both a business and technical perspective. Organizations need expert guidance to move more swiftly and avoid costly technical pitfalls in the new paradigm. This paper examines the journey to what we call, “The Connected Enterprise”.
Tags : 
    
AtomRain
Published By: Access Sciences     Published Date: Sep 07, 2014
Few organizations have fully integrated the role of the Data Steward due to concerns about additional project complexity, time away from other responsibilities or insufficient value in return. The principles of the Agile methodology (whether or not Agile is followed for projects) can offer guidance in making the commitment to designating and empowering the Data Steward role. By placing insightful people in a position to connect innovators, respond to change and spur development aligned with business activities, organizations can expect to see a more efficient and effective use of their information assets.
Tags : 
    
Access Sciences
Published By: Basho     Published Date: Sep 30, 2016
The Internet of Things (IoT) or the Internet of Everything is changing the way companies interact with their customers and manage their data. These connected devices generate high volume time series data that can be created in milliseconds. This fast growth of IoT data and other time series data is producing challenges for enterprise applications where data must be collected, saved, and analyzed in the blink of an eye. Your application needs a database built to uniquely handle time series data to ensure your data is continuously available and accurate.Learn about the only NoSQL database optimized for IoT and Time Series data in this technical overview. Riak TS stores and analyzes massive amounts of data and is designed to be faster than Cassandra.
Tags : 
    
Basho
Published By: AnalytixDS     Published Date: Feb 28, 2015
With future business intelligence solutions clearly evolving from data that comes from highly efficient and well behaved systems, to data that comes from the extended enterprise where data is not necessarily so well structured and behaved - Organizations are forced into a more collaborative mode of operation with their core infrastructure being adapted from the consumer space, and to the extent possible, conformed to their existing repositories. This whitepaper attempts to address various challenges consumers face while managing enormous data sets within the context of this complex scenario. Further, we’ll try to answer the question: Is Big Data Governance really that different from traditional data governance initiatives? Finally, we’ll see how AnalytiX™ Mapping Manager™ can help organizations accelerate the development and deployment of a successful Big Data/ Business Intelligence platform and accelerate delivery of all sorts of data – structured, semi-structured as well as unstruc
Tags : 
big data, big data governance, data governance, analytixds
    
AnalytixDS
Published By: Silwood Technology     Published Date: Nov 28, 2016
Business functions in large organizations are usually handled by software application packages. Some of the most well-known of these are from SAP, Oracle, Salesforce and Microsoft. These packages all store their data in a database. Often however it is necessary to use that data with other IT projects. In this instance being able to understand the metadata that defines these databases is critical. The challenge is that their metadata is complex, opaque and difficult to access. This paper describes how the top application packages store and use their own metadata. It explores the importance of understanding that metadata and examines the obstacles in getting at that metadata in a timely and effective manner.
Tags : 
    
Silwood Technology
Published By: Silwood Technology     Published Date: Mar 21, 2017
Business functions in large organizations are usually handled by software application packages. Some of the most well-known of these are from SAP, Oracle, Salesforce and Microsoft. These packages all store their data in a database. Often however it is necessary to use that data with other IT projects. In this instance being able to understand the metadata that defines these databases is critical. The challenge is that their metadata is complex, opaque and difficult to access. This paper describes how the top application packages store and use their own metadata. It explores the importance of understanding that metadata and examines the obstacles in getting at that metadata in a timely and effective manner.
Tags : 
    
Silwood Technology
Published By: Looker     Published Date: Mar 15, 2016
Data centralization merges different data streams into a common source through unified variables. This process can provide context to overly-broad metrics and enable cross-platform analytics to guide better business decisions. Investments in analytics tools are now paying back a 13.01:1 return on investment (ROI), with increased returns when these tools integrate with three or more data sour- ces. While the perks of centralization are obvious in theory, the quantity and variety of data available in today’s landscape make this difficult to achieve. This report provides a roadmap for how to connect systems, data stores, and institutions (both technological and human). Learn: • How data centralization enables better analytics • How to redefine data as a vehicle for change • How the right BI tool eliminates the data analyst bottleneck • How to define single sources of truth for your organization • How to build a data-driven (not just data-rich) organization
Tags : 
    
Looker
Published By: TopQuadrant     Published Date: Jul 18, 2016
With information streaming in from more varied sources and at a faster pace than ever before, organizations are having an increasingly difficult time deriving accurate meaning from their data. Data governance systems that were once able to organize and process enterprise information are becoming too slow and limited.   Semantic information management makes it easier to reconcile data from different sources by compiling and organizing information about that data, its metadata. By connecting all kinds of data and metadata in a more accessible way, semantic information systems empower users, data stewards and analysts to unlock and use the true meaning and value of their organization’s data.     Learn more about the challenges in the evolving data landscape and how a semantic approach can help.
Tags : 
    
TopQuadrant
Published By: TopQuadrant     Published Date: Aug 01, 2016
With information streaming in from more varied sources and at a faster pace than ever before, organizations are having an increasingly difficult time deriving accurate meaning from their data. Data governance systems that were once able to organize and process enterprise information are becoming too slow and limited. Semantic information management makes it easier to reconcile data from different sources by compiling and organizing information about that data, its metadata. By connecting all kinds of data and metadata in a more accessible way, semantic information systems empower users, data stewards and analysts to unlock and use the true meaning and value of their organization’s data. Learn more about the challenges in the evolving data landscape and how a semantic approach can help.
Tags : 
    
TopQuadrant
Published By: DATAVERSITY     Published Date: Dec 27, 2013
There are actually many elements of such a vision that are working together. ACID and NoSQL are not the antagonists they were once thought to be; NoSQL works well under a BASE model, but also some of the innovative NoSQL systems fully conform to ACID requirements. Database engineers have puzzled out how to get non-relational systems to work within an environment that demands high availability, scalability, with differing levels of recovery and partition tolerance. BASE is still a leading innovation that is wedded to the NoSQL model, and the evolution of both together is harmonious. But that doesn’t mean they always have to be in partnership; there are several options. So while the opening anecdote is true in many cases, organizations that need more diverse possibilities can move into the commercial arena and get the specific option that works best for them. This paper is sponsored by: MarkLogic.
Tags : 
nosql, database, acid v base, white paper
    
DATAVERSITY
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the internet. As a global market leader in our industry, we help our customers connect, digitize, and thrive. Together, we change the way the world works, lives, plays and learns.
Tags : 
ransomware, threat landscape, operations, risks, enforcement, defend, firewalls, network
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Dec 13, 2017
Cisco Meraki MS switches are 100% cloud-managed and can be fully configured from any Internet-accessible location before ever being powered on. Simply add the switch serial number (or order number for large deployments) to your network using the Meraki web-based dashboard. Once added, the switch is fully configurable. When the switch is first powered on and connected to the Internet, it will pull its settings from the cloud.
Tags : 
configuration, zero touch, deployment, ports, bandwidth, wire security, trends
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Dec 13, 2017
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Salesforce’s© Customer Relationship Management (CRM) cloud product for example is now widely used by businesses for its significantly lower cost and overhead when compared to on-premise predecessors. The cloud is driving an insatiable demand for faster, more reliable network access, and for IT organizations the pressure is on.
Tags : 
connectivity, network, management, configuration, security, reliability, meraki
    
Cisco EMEA Tier 3 ABM
Published By: Dell     Published Date: Dec 12, 2017
Fast-moving employees demand access to people, programs and data from anywhere. Power up their productivity with greater portability and connectivity. Begin by downloading “On the go Professional,” a brief by Dell that uncovers the key needs around convenience, connectivity and access required by mobile professionals. The brief also covers technology recommendations for you to consider, such as the robust line of Dell Latitude and Venue devices powered by Intel®, to meet the preferences of your users. Take advantage of the solutions that maximize enterprise productivity and employee satisfaction today. Download the brief now!
Tags : 
    
Dell
Published By: Schneider Electric     Published Date: Jan 02, 2018
If not, you are increasing the risk for costly, unplanned downtime. However, despite the importance of having a reliable flow of electricity, over half of building owners rely on reactive maintenance programs to care for their equipment. This means they wait until equipment fails completely before initiating corrective action, which is typically 3-4 times more costly than taking preventive measures. A good first step to go from being reactive to proactive is having a power system assessment performed. While often deemed expensive or unnecessary, the truth is power system assessments reveal opportunities to modernize, imiprove performance and help protect employees. To learn more, download our checklist, ""Ten Ways a Power System Assessment Can Save You Money"
Tags : 
electrical engineering services, electrical reliability, electrical risk assessment, power system assessment, risk assessment, mps assessment
    
Schneider Electric
Published By: Oracle     Published Date: Nov 08, 2017
I progressi nel campo digitale rivoluzionano in profondità il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilità senza precedenti. Questi cambiamenti sono grandi opportunità, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessità di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Cisco     Published Date: Dec 27, 2017
Today all businesses battle with unprecedented competitive pressures. In order to succeed—or even survive— they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. The very factors driving digital transformation in businesses are also pressuring IT organizations to transform. Customer expectations have increased. Companies live and die by the applications they provide to their customers and employees. A smartphone is the modern bank branch. The palm of your hand is replacing traditional brick-and-mortar stores. Access without delay or interruption, 24/7, is the new normal. If they can’t get what they want, when they want it, customers go elsewhere.
Tags : 
    
Cisco
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Before Bad Things Happen – Be Prepared Providing a great user experience is always the goal, and the best way to achieve that is by having a well-thought-out digital business continuity strategy. You can’t always know what type of disruption you’ll face next, but you can be sure that there will be one. It may come in the form of a broken connection but, even more likely, the availability of the application or host. DNS active failover ensures real-time failover to healthy endpoints, allowing you to extend your business continuity solution to the user edge.
Tags : 
dns, digital, business, geographically, server, online, retailers
    
Oracle Dyn
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.