The Business Analyst's Guide to Hadoop
Rapidly emerging as a transformative technology framework for storing and processing massive amounts of structured and unstructured data, Apache Hadoop plays a central role in ......
March 2013- Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply too great an obstacle. But the adoption of these technologies is inevitable. By deploying memory-based solutions for distributed database monitoring, enterprises will find that it is not only possible to protect sensitive information in these emerging computing models, but that the same architecture also provides both ...
March 2013- A serious data breach brings monetary damage in its many forms: business disruption, bad publicity, stiff ones for noncompliance, and undermined customer confidence. But most damaging of all is the trouble that it creates when it comes to signing up new customers. A tarnished reputation is a big objection for sales and business development to overcome. That's why data security in general and database security in particular are a crucial part of any company's overall ...
March 2013- The Protecting Sensitive Data In and Around an IBM DB2 Database technical white paper provides an overview of the sensitive files in and around the IBM DB2 database that enterprises need to secure to achieve optimal database security.
March 2013- The Protecting Sensitive Data In and Around an Oracle Database technical white paper provides an overview of the sensitive files in and around the Oracle database that enterprises need to secure in order to achieve optimal database security.
March 2013- The Protecting Sensitive Data In and Around a SQL Server Database technical white paper provides an overview of the sensitive files in and around the Microsoft SQL Server database that enterprises need to secure in order to achieve optimal database security.
February 2013- Optimization and consolidation can make a big difference in the business value your data centers deliver. This paper examines the techniques and results of IBM's own internal data center transformation?and how you can apply this learning to your transformation efforts to achieve greater productivity, mobility and responsiveness.
How enterprise-wide master data management helped five financial services firms get a better view of their customers and of their risk.
At many large financial firms, information that is accessible in one application isn't available in the others. Those data 'silos' make the organizations inefficient, prevent them from taking advantage of business opportunities, lead to poor decision making and can complicate compliance. Adopting an enterprise-wide data management solution can lead to more successful ...
Many of the largest IT budget problems can be traced back to five big money drains:
1. Storage expansion
2. System complexity
3. Hardware sprawl
4. The Need for High Availability
5. Over or under-provisioning
If any of this sounds familiar, you're not alone. This e-book, provided by IBM, will introduce you to the five big IT budget killers - and some of the best ways to knock them out.
November 2012- Master data is a collection of data objects defined uniformly across organizational processes, enabling consistency and accuracy by serving as the single source. This document helps you to initially think about how master data plays an important role in your company and what to do to start maximizing its use for business value.
Securing Enterprise Data and Ensuring Compliance In the Face of Multiple Threats, Strategies Must be Comprehensive
Security is an important element of an information integration and governance framework. This research perspective by Ventana Research provides insight to help organizations ensure a centralized, holistic security architecture to prevent breaches and automate compliance.
November 2012- In nearly every industry, executives, managers and employees are increasingly using maps in conjunction with enterprise applications such as business intelligence (BI) and CRM. Companies seek every opportunity to gain an edge, and often it's to be found in the data at their fingertips. Approximately 80% of an organization's data has a location component. By ignoring or underutilizing this data, organizations overlook rich and pervasive information that could help them operate more efficiently and competitively. Savvy ...
Security is one of the top concerns facing an enterprise moving data to the cloud. This case study, published by analyst firm Gartner* details the lessons learned by a financial services early adopter of cloudbursting to Infrastructure-as-a-Service (IaaS).
*Case Study: Securing the Cloud by John Pescatore, Gartner, Inc. May 3, 2012
It should come as no surprise that storage budgets are constantly under pressure from opposing forces: On one hand, economic forces are pushing budgets to either stay flat or, in many cases, shrink as a percentage of a company's revenue.
On the other hand, the infrastructure struggles to keep up with the pace of data growth, pressured by many variables, both social and economic. Businesses have no choice but to acclimate their storage ...
As a federal IT professional, you see the rapid rate at which applications servers are being virtualized. So how can you keep up with the demand and still ensure that the critical data your agency stores in those virtual machines can be easily recovered in the event of a disaster? The answer: A comprehensive backup software that meets five critical requirements.
See what they are in this white paper, 5 Key Attributes Backup Software ...
Client virtualization encapsulates a user's desktop including operating system, applications, data and personalization-and stores it in the data center, rather than on the end-point device.
This has several advantages. The desktop is stored and maintained centrally, so it's much easier to manage, maintain and support. It's not tied to a particular computer, so it can be accessed from different devices. And the end-point device stores neither desktop nor data, so the security danger ...
Business moves fast - which means that software development teams need to move even faster. The emergence of new software development models, such as the agile development process, has given organizations powerful tools for responding to events quickly and has helped organizations evolve through collaboration between self-organizing, cross-functional teams.
To make the most of agile processes, organizations need effective and efficient testing strategies - complete with processes for governing test data. However, many ...
August 2012- It is critical that an organization understands relationships between data, its business value and how to ensure long-term and accurate data access. Every process - defined or otherwise - within the organization creates information as the process is executed. An organization's information can be grouped into many small units of related data, often referred to as the complete business object. This white paper defines the complete business object as it applies to organizations and its ...
August 2012- Organizations are under more pressure than ever to deliver better business outcomes. They need new insights that can help sales and marketing generate more revenue, help the finance department reduce risk and help the entire organization lower costs. This 20 page, interactive eBook uses 5 customer scenarios to show how organizations are tackling real issues using IBM big data, warehousing & analytics solutions. Discover how you can take data and analytics beyond the warehouse, and picture yourself in ...
August 2012- Success of data warehousing projects depends upon having access to reliable, accurate data. In this research brief, Ventana Research details some of the costs of bad data as well as the benefits of delivering trusted information to a data warehouse. The authors also lay out the basic framework for how trusted information is generated and delivered.
August 2012- Information, an essential asset in virtually all organizations, requires careful attention and robust processes to ensure it can reliably support business decision-making. Information arising from multiple sources must be integrated and governed to ensure it is a trusted source and in compliance with internal policies and external regulations and legislature. The process of the integration and governance of information provides a framework that incorporates acquisition, organization, control and use of information to create and enhance ...
August 2012- Through eight in-depth customer interviews, Springboard Research examines DB2 SAP implementations across the Asia Pacific region. Some of the reasons Springboard cites for the customers' migration decisions from Oracle Database to DB2 include the strong IBM/SAP relationship, better query performance provided by DB2, and healthy levels of ROI and TCO when running SAP applications on DB2.
June 2012- Run Oracle Applications on DB2 10 for Linux, UNIX and Windows The SQL product architect for DB2 10 for Linux, UNIX and Windows talks about out-of-the-box support for Oracle's SQL and PL/SQL dialects. This allows many applications written against Oracle to execute against DB2 virtually unchanged. Get a high-level overview of what Oracle compatibility means in DB2.
June 2012- Learn about six reasons to move from Oracle to IBM DB2 - performance, cost savings, usability, scalability, flexibility and reliability - through case studies about Maschinenfabrik Reinhausen, Agrofert, Newell Rubbermaid, Schaeffler KG, Payment Solution Providers and Banco Credito de Peru. See how moving to IBM is a smart decision for companies around the globe.
November 2012- This white paper is a product of the Cloud Standards Customer Council (CSCC) and documents a collection of high priority use cases for both the Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) cloud computing service models. Use cases highlight the benefits of cloud computing and are key to identifying specific technical requirements including the need for open standards that promote portability and interoperability.
June 2012- Read this short brochure to learn what IT industry experts - both analysts and users - are saying in reply to key questions about who can be trusted to deliver viable solutions in today's critical areas of information management including improving efficiency and IT economics, optimizing data-intensive workloads for performance and value, and trusting the right IT vendor for the capabilities, solutions and services your business and clients demand.
June 2012- Many of the largest IT budget problems can be traced back to five big money drains: storage expansion, system complexity, hardware sprawl, the need for high availability and over- or under-provisioning. This e-book introduces these five IT budget killers - and some of the best ways to knock them out.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Social Business, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
More Software Resources
The Business Analyst's Guide to Hadoop