Social business discovery: Optimising decision making
Business intelligence software has long been touted as the route to insight and better business decisions. But powerful business insight comes not just from data, and not just from what one person sees...
View ArticleCapitalise on Big Data opportunities
This guide offers an overview of the challenges, opportunities and tools associated with Big Data, shedding light in particular on the real-world use of search technologies (indexing, semantics,...
View ArticleMalware defense is a “Big Data” problem”
As the challenges to fighting malware continue to grow, those with deep knowledge of the industry understand that malware defense is clearly a "big data" problem.
View ArticleLowering the hurdles to Exchange 2010
This video provides a snapshot of the progress organisations have made along the migration path. It includes the reactions of those who have already upgraded, and the preparations made by those...
View ArticleEliminating insecure and unreliable file transfer
Is your file transfer system keeping up with growing trading-partner requirements? Can it accommodate multiple platforms and security standards and successfully deliver large files, to the right...
View ArticlePlanning your exchange server deployment in the AWS cloud
This guide discusses planning topics, architectural considerations, and configuration steps relevant before and after launching the necessary AWS services such as Amazon Elastic Compute Cloud and...
View ArticleCreating an enterprise data strategy
This white paper dives into how to create a data strategy that works across your organization and discusses the key elements in managing data as a corporate asset.
View ArticleThe data modeling resource guide
Len Silverston shares his expertise in this free collection of excerpts from all three volumes of his "Data Model Resources" books. Learn about: 1. Tips and anecdotes on data modeling. 2. Detailed case...
View ArticleThreat Report H2 2013: top 10 reported detections
The Threat Report H2 2013 profiles the most common vectors used to deliver malware to a user’s device. It is no surprise that web-based channels are most often used, with a strong emphasis on exploits...
View ArticleThe data economy
With data multiplying at a bewildering rate, it has never been more important for business leaders to master digital information. This paper explores how data came to be as big as it is now, and why...
View Article
More Pages to Explore .....