Home
 > search for

Featured Documents related to »  automated data manipulation


Vulnerability Management Buyer’s Checklist
Choosing a solution for vulnerability management (VM) is a critical step toward protecting your organization’s network and data. Without proven, automated

automated data manipulation  the network? The solution's automated mapping capability should discover all live devices on the network. A small footprint scan needs to accurately identify the device operating system and type of device (e.g. router, switch, access point, etc.). Ideally, the discovery process will also report other information such as DNS name, NetBIOS name, and when the device was last scanned. Can the system discover rogue devices? Your discovery map should show any new devices that are approved or rogue. Read More

Business Intelligence (BI)
Business intelligence (BI) and performance management applications enable real-time, interactive access, analysis, and manipulation of mission-critical corporate information. These applications pro...
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » automated data manipulation


SAP HANA-One Technology to Watch in 2012 (and Beyond)
Did you know that SAP HANA is much more than a high-speed analytic appliance? TEC principal analyst P.J. Jakovljevic reveals how HANA is a universal database

automated data manipulation  and optimization, real-time pricing, automated and optimized customer service, etc., where high-speed data crunching, analysis, search, calculations, etc., are critical As an enterprise software general purpose database platform, an Oracle database killer of sorts The third purpose has already been accomplished by Workday (see related blog post ). HANA is not really an object-oriented (OO) in-memory database, unlike Workday, and both differ in their approaches and design intents for utilizing their Read More
Processing Complex Events (During These, oh well, Complex Times) - Part II
Part I of this blog series introduced the concept of complex event processing (CEP) and possible needs for CEP software applications. One such broad CEP

automated data manipulation  SABRE II (Surveillance and Automated Business Reporting Engine) fraud-detecting initiative was for the regulatory authority to become more dynamic and proactive in detecting market abuse. This proactive approach would be achieved by investigating potential offenders more quickly with relevant evidence, and by identifying trading rings and links between individuals generating illicit market impressions. The idea was to also instantly detect and prosecute “extremely lucky” individuals (e.g., traders Read More
Fischer’s Prio! SecureSync ~ A Solution to Enterprise Directory Chaos
Prio! SecureSync combines the proven technologies of Fischer Systems and Siemens, providing over 18 years of combined directory synchronization and management

automated data manipulation  Prio! SecureSync, as an automated solution to tie disparate directories together, does not require all data to be initially centralized. Prio! SecureSync will centralize data to the authoritative master following designation. Fischer International is targeting enterprise organizations with multiple disparate operating systems and/or databases that need automated directory and synchronization management. Typically organizations have both a primary database repository containing all user names and Read More
Processing Complex Events (During These, oh well, Complex Times) - Part III
Part I of this blog series introduced the concept of complex event processing (CEP) and possible needs for CEP software applications. One such broad CEP

automated data manipulation  a Futures Spreader solution), automated multicore processor scalability, and an enhanced CEP debugger . Progress Apama's blogger Louis Lovas' recent blog entry offers a peek preview of what is ahead for Apama for those who follow CEP and Progress Apama . Given Progress Software’s apparent forays in the realm of on-demand and software as a service (SaaS) , another logical question is whether any such moves are planned for Apama. In fact, the product currently supports a number of hosted deployments. Read More
The Path to Healthy Data Governance through Data Security
Companies today are challenged to maintain their data safe and secure from hackers and others with unauthorized access. In his article, TEC business

automated data manipulation  Path to Healthy Data Governance through Data Security The appropriate handling of an organization’s data is critically dependent on a number of factors, including data quality, which I covered in one of my earlier posts this year. Another important aspect of data governance regards the managing of data from a security perspective. Now more than ever, securing information is crucial for any organization. This article is devoted to providing insight and outlining the steps that will put you on the path Read More
Data Evolution: Why a Comprehensive Data Management Platform Supersedes the Data Integration Toolbox
Today’s organizations have incredible amounts of information to be managed, and in many cases it is quickly spiraling out of control. To address the emerging

automated data manipulation  Evolution: Why a Comprehensive Data Management Platform Supersedes the Data Integration Toolbox Today’s organizations have incredible amounts of information to be managed, and in many cases it is quickly spiraling out of control. To address the emerging issues around managing, governing, and using data, organizations have been acquiring quite a toolbox of data integration tools and technologies. One of the core drivers for these tools and technologies has been the ever-evolving world of the data Read More
Addressing the Complexities of Remote Data Protection
As companies expand operations into new markets, the percentage of total corporate data in remote offices is increasing. Remote offices have unique backup and

automated data manipulation  products when used in automated and controlled environments such as corporate data centers. But in remote offices, the manual processes used in operating the tape backup system may not be as reliable. Tape backup usually involves a number of manual processes to label, load, unload, tension, ship off-site, reuse and erase tapes, in addition to running backup and restore operations. These processes are often performed by non-technical office personnel who have other responsibilities and who may have little Read More
Data Warehousing in the Big Data Era: Are You BIReady?
Netherlands-based BIReady automates the process of designing, deploying, and maintaining a data warehousing solution, allowing the optimization of all necessary

automated data manipulation  Warehousing in the Big Data Era: Are You BIReady? Netherlands-based BIReady automates the process of designing, deploying, and maintaining a data warehousing solution, allowing the optimization of all necessary BI and analytics tasks. Read this TEC product note from TEC senior BI and data management analyst Jorge Garcia to learn more about how BIReady is meeting its goal of helping companies become BI ready. Read More
Considerations for Owning versus Outsourcing Data Center Physical Infrastructure
When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both

automated data manipulation  for Owning versus Outsourcing Data Center Physical Infrastructure When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing; however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash crossover point, deployment timeframe, Read More
The Necessity of Data Warehousing
An explanation of the origins of data warehousing and why it is a crucial technology that allows businesses to gain competitive advantage. Issues regarding

automated data manipulation  Necessity of Data Warehousing The Necessity of Data Warehousing M. Reed - August 2, 2000 Why the market is necessary Data warehousing is an integral part of the information age . Corporations have long known that some of the keys to their future success could be gleaned from their existing data, both current and historical. Until approximately 1990, many factors made it difficult, if not impossible, to extract this data and turn it into useful information. Some examples: Data storage peripherals such Read More
The Path to Healthy Data Governance
Many companies are finally treating their data with all the necessary data quality processes, but they also need to align their data with a more complex

automated data manipulation  Path to Healthy Data Governance This article is based on the presentation, “From Data Quality to Data Governance,” by Jorge García, given at ComputerWorld Technology Insights in Toronto, Canada, on October 4, 2011. Modern organizations recognize that data volumes are increasing. More importantly, they have come to realize that the complexity of processing this data has also grown in exponential ways, and it’s still growing. Many companies are finally treating their data with all the necessary Read More
Big Data: Operationalizing the Buzz
Integrating big data initiatives into the fabric of everyday business operations is growing in importance. The types of projects being implemented

automated data manipulation  Data: Operationalizing the Buzz Integrating big data initiatives into the fabric of everyday business operations is growing in importance. The types of projects being implemented overwhelmingly favor operational analytics. Operational analytics workloads are the integration of advanced analytics such as customer segmentation, predictive analytics, and graph analysis into operational workflows to provide real-time enhancements to business processes. Read this report to learn more. Read More
ESG - Riverbed Whitewater: Optimizing Data Protection to the Cloud
Riverbed Whitewater leverages WAN optimization technology to provide a complete data protection service to the cloud. The appliance-based solution is designed

automated data manipulation  - Riverbed Whitewater: Optimizing Data Protection to the Cloud Riverbed Whitewater leverages WAN optimization technology to provide a complete data protection service to the cloud. The appliance-based solution is designed to integrate seamlessly with existing backup technologies and cloud storage provider APIs. Read this ESG Lab report on hands-on testing of the Riverbed Whitewater appliance for ease of use, cost-effective recoverability, data assurance, and performance and scalability. Read More
Data Quality: A Survival Guide for Marketing
Even with the finest marketing organizations, the success of marketing comes down to the data. Ensuring data quality can be a significant challenge

automated data manipulation  Quality: A Survival Guide for Marketing Even with the finest marketing organizations, the success of marketing comes down to the data. Ensuring data quality can be a significant challenge, particularly when you have thousands or even millions of prospect records in your CRM system and you are trying to target the right prospect. Data quality, data integration, and other functions of enterprise information management (EIM) are crucial to this endeavor. Read more. Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others