- Secure Cloud Networking
- Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
- Prevent Data Breaches with Stronger Email Security
- Hybrid Will Be the New Normal for Next Generation Enterprise WAN
- Operational Intelligence from Wire Data to Run Electronic Trading Systems in the Now
October 2014- This paper introduces you to Node capabilities and tools for enterprise-critical concerns like scaling, testing, and debugging, and more. It also discusses application deployment best practices and how to gain exceptional visibility into application performance once you go live.
August 2014- Semantics provides a universal framework to describe and link different data so that it can be better understood and searched holistically, allowing both people and computers to see and discover relationships in the data. MarkLogic gives you the power to store and query linked data, including a native RDF Triple Store that can be queried with SPARQL--all right inside MarkLogic.
May 2014- A paradigm shift in database technology is occurring in which organizations are rethinking what they can do with their most important asset: data. MarkLogic is at the forefront of this shift, having the only NoSQL database that is truly enterprise ready. With MarkLogic, organizations are making the world more secure, providing access to valuable information, creating new revenue streams, and reducing expenses.
October 2014- The Federal Aviation Administration (FAA) uses the Emergency Operations Network (EON) real-time application for monitoring and tracking severe weather and emergencies to keep passengers, flights and airports safe. As an agency of the United States Department of Transportation, the FAA has authority to regulate and oversee all aspects of civil aviation in the U.S. It is tasked to provide the safest, most efficient aerospace system in the world.
October 2014- Warrior Gateway and MarkLogic partner to build the country's largest, most reliable information exchange database for the military community: the G.I. Network
October 2014- Fairfax County, Virginia is modernizing with next-generation technology. It is increasing efficiency in its public services, promoting open government, and streamlining operations - all by using MarkLogic's Enterprise NoSQL database.
October 2014- Following the approval of the Affordable Care Act of 2010, the US Department of Health and Human Services (HHS) Centers for Medicare and Medicaid Services (CMS) needed to design, build, and implement a technology platform capable of enrolling millions of Americans in new healthcare plans. CMS's driving vision was to enable better access to healthcare for all Americans through smart and efficient tools and systems that would also help reduce costs.
October 2014- MarkLogic handles the volume, velocity, and variety of data like no other NoSQL solutions and built, tested, and deployed the enterprise features necessary to run at the heart of your organization.
October 2014- MarkLogic is the only Enterprise NoSQL database. It is scalable and elastic, and has enterprise security and ACID transactions. It is a new generation database that addresses today's problems with complex ever-changing data and content-providing better access to your data and enabling faster development of mission-critical applications without sacrificing reliability or security.
October 2014- The U.S National Archives' Founders Online Project Increases Concurrent User Capacity by 50x
October 2014- Partnership gives the public 10x faster access to geospatial databuilt customer-facing application
October 2014- For most enterprises, data storage and analytics are remarkably fragmented. From master data management basics to infrastructure, security, governance, and advanced analytics, here's how to get your data under control and working for the business.
June 2014- What scares IT security more than hackers? This Ponemon Institute Research report answers that question and then some. In a survey of more than 1,500 IT practitioners from around the world, they reveal what's worrying the people tasked with protecting the enterprise's most sensitive data. With the rise of the data-centric enterprise, there is a necessary and parallel development of the security architecture meant to protect it. But in the time it's taken for data security ...
September 2014- Read this report from the Compliance, Governance and Oversight Council (CGOC) to learn how to reduce costs and increase performance by disposing digital debris.
September 2014- In this real world application of Internet of Things, Shaspa partnered with IBM to leverage IBM Informix, for an end-to-end solution and service delivery platform for a range of market sectors, starting with a residential gateway platform. The connected environment is smart buildings that use a variety of sensor-based and other data to improve efficiencies, operations and consumer experience.
August 2014- This Gartner's Magic Quadrant offer insight into the part of the packaged MDM solution market that focuses on how organizations master and share a "single version" of customer data.
August 2014- To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM InfoSphere Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions ...
Gaining a more complete, trusted view of customers is a strategic goal of most organizations. The challenge is that information about customers is typically managed and stored in many different applications, management systems and data silos. And this challenge is often compounded by a lack of consistency from one application to the next.
The combination of IBM InfoSphere Data Explorer and IBM InfoSphere Master Data Management addresses these challenges by creating a single, ...
July 2014- Big data is enabling businesses to discover actionable market opportunities and to pinpoint problems such as waste and fraud. These five proven practices for maximizing big data ROI, based on the experiences of early adopters, will set your big data initiatives on the path to success.
July 2014- Few organizations have the money to rip out their existing infrastructure to replace it with one that can handle the new load. This solution guide explores how to tackle these challenges, while keeping up with the need for increasingly complex analytics.
July 2014- Big data promises valuable insights that are enticing organizations to invest in analytics and BI tools. Yet many overlook the need for a DBMS that can stand up to the strain big data places on the underlying infrastructure.
April 2014- Read this Osterman Research report to learn more about why good email recovery and governance is a necessity for your organization, and how to address problems in your email environment. Having these capabilities makes your migrations safer, and allows you to recover from email system problems faster. It also helps you with eDiscovery requests and to comply with regulatory requirements, legal obligations and corporate-best practices.
May 2014- A policy-driven, on-demand masking approach enables organizations to proactively protect data privacy and support compliance. This approach is especially important in the current era of computing, where data is everywhere and is continuously growing in volume, variety and velocity. The end goal is to provide aggregated sensitive data to an analytics platforms, data warehouses and test databases while protecting privacy. Policy-driven, on-demand data masking should be built into an overall information integration and governance platform. ...
April 2014- Enterprises can learn valuable lessons about data-driven marketing and demand forecasting from watching what's happening in movie, television, and digital content promotions, engagement and other campaigns.
Virtualization, cloud computing, and the consumerization of IT continue to drive fundamental shifts in data center management priorities. Many organizations are implementing multi-hypervisor architectures and hybrid public and private cloud strategies. Converged systems integrate servers, storage, networks, and software to optimize the performance of specific workloads and simplify system deployment and operations. Yet, traditional data center architectures continue to support many mission-critical business applications.
This Technology Spotlight examines how advanced automation and orchestration ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services