Quantcast
Channel: Exchanges - v3
Browsing latest articles
Browse All 28 View Live

Social business discovery: Optimising decision making

Business intelligence software has long been touted as the route to insight and better business decisions. But powerful business insight comes not just from data, and not just from what one person sees...

View Article



Capitalise on Big Data opportunities

This guide offers an overview of the challenges, opportunities and tools associated with Big Data, shedding light in particular on the real-world use of search technologies (indexing, semantics,...

View Article

Malware defense is a “Big Data” problem”

As the challenges to fighting malware continue to grow, those with deep knowledge of the industry understand that malware defense is clearly a "big data" problem.

View Article

Lowering the hurdles to Exchange 2010

This video provides a snapshot of the progress organisations have made along the migration path. It includes the reactions of those who have already upgraded, and the preparations made by those...

View Article

Eliminating insecure and unreliable file transfer

Is your file transfer system keeping up with growing trading-partner requirements? Can it accommodate multiple platforms and security standards and successfully deliver large files, to the right...

View Article


Planning your exchange server deployment in the AWS cloud

This guide discusses planning topics, architectural considerations, and configuration steps relevant before and after launching the necessary AWS services such as Amazon Elastic Compute Cloud and...

View Article

Creating an enterprise data strategy

This white paper dives into how to create a data strategy that works across your organization and discusses the key elements in managing data as a corporate asset.

View Article

The data modeling resource guide

Len Silverston shares his expertise in this free collection of excerpts from all three volumes of his "Data Model Resources" books. Learn about: 1. Tips and anecdotes on data modeling. 2. Detailed case...

View Article


Threat Report H2 2013: top 10 reported detections

The Threat Report H2 2013 profiles the most common vectors used to deliver malware to a user’s device. It is no surprise that web-based channels are most often used, with a strong emphasis on exploits...

View Article


The data economy

With data multiplying at a bewildering rate, it has never been more important for business leaders to master digital information. This paper explores how data came to be as big as it is now, and why...

View Article
Browsing latest articles
Browse All 28 View Live




Latest Images