RSS feed Get our RSS feed

News by Topic

discovery

Results 76 - 100 of 318Sort Results By: Published Date | Title | Company Name
By: Qlik     Published Date: Aug 12, 2015
This Research Report examines the analytical strategies of organisations currently using data discovery tools and highlights their superior performance in user engagement.
Tags : data discovery, data, data discovery tools, analytics, benefits of using data discovery, data collaboration, data proliferation, data engagement
     Qlik
By: SAS     Published Date: Mar 06, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics, and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. With the right end-user tools, a data lake can enable the self-service data practices that both technical and business users need. These practices wring business value from big data, other new data sources, and burgeoning enterprise da
Tags : 
     SAS
By: SAS     Published Date: Aug 28, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
     SAS
By: McAfee     Published Date: Nov 12, 2014
This white paper outlines the best practices for better data loss prevention for healthcare organizations—from data discovery to classification to protection.
Tags : data loss prevention, dlp, healthcare, dlp best practices
     McAfee
By: Discovery Corps, Inc     Published Date: Jan 11, 2011
Article on how to handle missing values in a dataset during a data mining project
Tags : data mining, missing values, techniques, diagnosis, tips, missing data
     Discovery Corps, Inc
By: IBM     Published Date: Aug 05, 2014
Watson Explorer provides organizations with a combined, trusted 360-degree view of both structured and unstructured data. The solution indexes information from unstructured data sources (PDFs, Microsoft SharePoint, flat files, social media, blogs and so on) as well as structured sources for search and discovery. Organizations can leverage their data in place, respecting existing security models when creating this virtual access point to all information. Watson Explorer requires trusted master data to ensure that links are accurate and reliable, so the end user can confidently leverage a holistic view of a customer or product.
Tags : ibm, data, customer, watson explorer, master data, structured
     IBM
By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
     IBM Corporation
By: Symantec.cloud     Published Date: Feb 03, 2010
Here are five common problems that occur when corporate employees use PST files and the advantages of email archiving.
Tags : messagelabs, symantec hosted services, pst file, personal storage table, email archiving, storage and backup, disaster recovery, compliance
     Symantec.cloud
By: Okta     Published Date: Aug 03, 2016
Within 6 months of purchasing Okta, the average customer connects 10 applications, and once up and running, the number increases quickly. But, the average customer could be using twice as many provisioning integrations than they are. Using Okta for single sign-on and a centralized view of your cloud apps isn’t nearly enough. Watch this webinar for a live demo of Okta’s new Access Request Workflow and Access Discovery Report features and learn how Okta Provisioning can bring sanity to your IT processes. Learn about: • Provisioning Workflows • Role & Rule-based Access Control • Security-focused Compliance Reporting
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: Dell EMC     Published Date: Nov 09, 2015
Download this whitepaper and learn how the Dell Genomic Data Analysis Platform can accelerate discovery and insights through optimized infrastructure and support.
Tags : 
     Dell EMC
By: IBM Corporation     Published Date: Jun 30, 2011
IBM Tivoli Application Dependency Discovery Manager supports the alignment of IT and business with robust and automated application mapping and discovery that helps organizations understand the impact of change and meet compliance needs with detailed reporting and auditing.
Tags : energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc
     IBM Corporation
By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence, security
     McAfee
By: Savvis     Published Date: Jul 07, 2010
Savvis delivers a complex, fully managed infrastructure for Discovery to support its real-time advertising deliverables, ad sales, scheduling, and programming for all its international operations.
Tags : savvis, saas, deliverability, managed infrastructure, outsourcing
     Savvis
By: IBM     Published Date: Feb 05, 2015
Discovery Health ... Predictive analytics used to craft preventive programs that keep members healthier and costs lower.
Tags : predictive analytics, preventive programs, predictive risk management, clinical risk models, web analytics, business intelligence, market research, usability
     IBM
By: IBM     Published Date: Feb 05, 2014
Companies increasingly rely on IT discovery to provide a complete picture of the infrastructure for IT optimization and migration initiatives. But current methods are costly, and they can take too long to deliver results. ALDM (analytics for logical dependency mapping), a new service from IBM Research, is changing all of that. In this interview, Larry Thompson, IBM offering development executive, explains how ALDM reengineers IT discovery with analytics, automation and cloud computing technologies and delivers a more complete and accurate view of your IT environment. Listen to the full 8-minute podcast interview or read the two-page encapsulated version to learn how ALDM is lowering the cost of IT discovery while speeding results.
Tags : 
     IBM
By: IBM     Published Date: Oct 10, 2013
Mini paper and podcast on ALDM with SME Larry Thompson.
Tags : cost and time, excess costs, dissatisfied with cost, business metrics, it management, it spending, business activity, over spending
     IBM
By: IBM     Published Date: Nov 19, 2014
According to a recent survey by the Compliance, Governance and Oversight Council, almost 70% of the electronic content and information organizations retain has no business or legal value. It’s simply digital detritus, retained because 1) we think we might need it sometime, 2) we forget about it, or 3) we don’t have policies and software in place to get rid of it. Ultimately, though, this unnecessary accumulation of content can create real problems in terms of e-discovery, regulation, management and cost. Watch this video white paper to learn more about: - How to get started on an information management strategy - The right combination of software and policy for successful information governance - The business case for proactive management of an organization’s digital footprint
Tags : compliance, governance, oversight, digital debris, data cleanup, legacy data cleanup, information management, information management strategy
     IBM
By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
     ProofSpace
By: IBM     Published Date: Jan 27, 2017
The report argues top-down and bottom-up BI are flip sides of same coin that needs an harmony. This also describes the rise of data discovery tools as a bottom-up reaction to heavy handed BI and have crushed the top-down camp's monopoly of BI, that has unleashed a bevy of data silos.
Tags : ibm, analytics, business intelligence, data, data discovery
     IBM
By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics incorporates many governed discovery features, with which business users can easily expose the underlying data modelling of existing reports and modify it to an individual or departmental requirements
Tags : ibm, ibm cognos analytics, analytics, business intelligence, business analytics
     IBM
By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information
     Symantec.cloud
By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance
     BMC Software
By: Computhink     Published Date: Nov 30, 2007
The Auburn-Washburn School District provides public education to approximately 5,300 Kindergarten through 12th graders in Topeka, KS. It consists of 128 square miles of rural and suburban areas. Descriptive terms like academically challenging, progressive, small classes, high-achievement, modern and excellent are all used to describe the district.
Tags : frcp, search and retrieval, email management, email archiving, email archive, viewwise, computhink, school
     Computhink
By: Computhink     Published Date: Jan 31, 2008
Lisa Morgan, Director Channel Programs, and Vince Smolek, Technical Services Manager at Computhink discuss the benefits of ViewWise, an email archive service.
Tags : email archiving, email archive, archive, archiving, storage, computhink, video
     Computhink
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics