X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 automated data manipulation


Vulnerability Management Buyer’s Checklist
Choosing a solution for vulnerability management (VM) is a critical step toward protecting your organization’s network and data. Without proven, automated

automated data manipulation  the network? The solution's automated mapping capability should discover all live devices on the network. A small footprint scan needs to accurately identify the device operating system and type of device (e.g. router, switch, access point, etc.). Ideally, the discovery process will also report other information such as DNS name, NetBIOS name, and when the device was last scanned. Can the system discover rogue devices? Your discovery map should show any new devices that are approved or rogue.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Business Intelligence (BI)

Business intelligence (BI) and performance management applications enable real-time, interactive access, analysis, and manipulation of mission-critical corporate information. These applications provide users with valuable insights into key operating information to quickly identify business problems and opportunities. Users are able to access and leverage vast amounts of information to analyze relationships and understand trends that ultimately support business decisions. These tools prevent the potential loss of knowledge within the enterprise that results from massive information accumulation that is not readily accessible or in a usable form. It is an umbrella term that ties together other closely related data disciplines including data mining, statistical analysis, forecasting, and decision support. 

Evaluate Now

Documents related to » automated data manipulation

SAP HANA-One Technology to Watch in 2012 (and Beyond)


Did you know that SAP HANA is much more than a high-speed analytic appliance? TEC principal analyst P.J. Jakovljevic reveals how HANA is a universal database that will enable companies to analyze large volumes of operational and transactional information in real time, from virtually any data source, and that will eventually deliver an entirely new class of applications that will change the way people think, work, plan, and operate.

automated data manipulation  and optimization, real-time pricing, automated and optimized customer service, etc., where high-speed data crunching, analysis, search, calculations, etc., are critical As an enterprise software general purpose database platform, an Oracle database killer of sorts The third purpose has already been accomplished by Workday (see related blog post ). HANA is not really an object-oriented (OO) in-memory database, unlike Workday, and both differ in their approaches and design intents for utilizing their Read More

Processing Complex Events (During These, oh well, Complex Times) - Part II


Part I of this blog series introduced the concept of complex event processing (CEP) and possible needs for CEP software applications. One such broad CEP platform, Progress Apama, has been offered by Progress Software Coporation after acquiring the formerly independent Apama LTD in 2005. It is worth analyzing what has happened with the Apama product since being acquired by Progress Software

automated data manipulation  SABRE II (Surveillance and Automated Business Reporting Engine) fraud-detecting initiative was for the regulatory authority to become more dynamic and proactive in detecting market abuse. This proactive approach would be achieved by investigating potential offenders more quickly with relevant evidence, and by identifying trading rings and links between individuals generating illicit market impressions. The idea was to also instantly detect and prosecute “extremely lucky” individuals (e.g., traders Read More

Fischer’s Prio! SecureSync ~ A Solution to Enterprise Directory Chaos


Prio! SecureSync combines the proven technologies of Fischer Systems and Siemens, providing over 18 years of combined directory synchronization and management experience. The flexibility and interoperability of the product have certainly captured the industries attention in bringing order to ‘directory chaos’, thereby allowing an always up to date, synchronized, disparate directory computing environment.

automated data manipulation  Prio! SecureSync, as an automated solution to tie disparate directories together, does not require all data to be initially centralized. Prio! SecureSync will centralize data to the authoritative master following designation. Fischer International is targeting enterprise organizations with multiple disparate operating systems and/or databases that need automated directory and synchronization management. Typically organizations have both a primary database repository containing all user names and Read More

Processing Complex Events (During These, oh well, Complex Times) - Part III


Part I of this blog series introduced the concept of complex event processing (CEP) and possible needs for CEP software applications. One such broad CEP platform, Progress Apama, has been offered by Progress Software Coporation after acquiring formerly independent Apama LTD in 2005. Part II then discussed Apama’s current state of affairs and its real-life deployments at companies outside its

automated data manipulation  a Futures Spreader solution), automated multicore processor scalability, and an enhanced CEP debugger . Progress Apama's blogger Louis Lovas' recent blog entry offers a peek preview of what is ahead for Apama for those who follow CEP and Progress Apama . Given Progress Software’s apparent forays in the realm of on-demand and software as a service (SaaS) , another logical question is whether any such moves are planned for Apama. In fact, the product currently supports a number of hosted deployments. Read More

The Path to Healthy Data Governance through Data Security


Companies today are challenged to maintain their data safe and secure from hackers and others with unauthorized access. In his article, TEC business intelligence (BI) analyst Jorge García looks the risks and issues that companies face with securing their data, the importance and advantages of data security, and outlines a path that companies can follow to achieve data security as part of an overall data governance initiative.

automated data manipulation  Path to Healthy Data Governance through Data Security The appropriate handling of an organization’s data is critically dependent on a number of factors, including data quality, which I covered in one of my earlier posts this year. Another important aspect of data governance regards the managing of data from a security perspective. Now more than ever, securing information is crucial for any organization. This article is devoted to providing insight and outlining the steps that will put you on the path Read More

Data Evolution: Why a Comprehensive Data Management Platform Supersedes the Data Integration Toolbox


Today’s organizations have incredible amounts of information to be managed, and in many cases it is quickly spiraling out of control. To address the emerging issues around managing, governing, and using data, organizations have been acquiring quite a toolbox of data integration tools and technologies. One of the core drivers for these tools and technologies has been the ever-evolving world of the data warehouse.

automated data manipulation  Evolution: Why a Comprehensive Data Management Platform Supersedes the Data Integration Toolbox Today’s organizations have incredible amounts of information to be managed, and in many cases it is quickly spiraling out of control. To address the emerging issues around managing, governing, and using data, organizations have been acquiring quite a toolbox of data integration tools and technologies. One of the core drivers for these tools and technologies has been the ever-evolving world of the data Read More

Addressing the Complexities of Remote Data Protection


As companies expand operations into new markets, the percentage of total corporate data in remote offices is increasing. Remote offices have unique backup and recovery requirements in order to support a wide range of applications, and to protect against a wide range of risk factors. Discover solutions that help organizations protect remote data and offer extensive data protection and recovery solutions for remote offices.

automated data manipulation  products when used in automated and controlled environments such as corporate data centers. But in remote offices, the manual processes used in operating the tape backup system may not be as reliable. Tape backup usually involves a number of manual processes to label, load, unload, tension, ship off-site, reuse and erase tapes, in addition to running backup and restore operations. These processes are often performed by non-technical office personnel who have other responsibilities and who may have little Read More

Data Warehousing in the Big Data Era: Are You BIReady?


Netherlands-based BIReady automates the process of designing, deploying, and maintaining a data warehousing solution, allowing the optimization of all necessary BI and analytics tasks. Read this TEC product note from TEC senior BI and data management analyst Jorge Garcia to learn more about how BIReady is meeting its goal of helping companies become "BI ready."

automated data manipulation  Warehousing in the Big Data Era: Are You BIReady? Netherlands-based BIReady automates the process of designing, deploying, and maintaining a data warehousing solution, allowing the optimization of all necessary BI and analytics tasks. Read this TEC product note from TEC senior BI and data management analyst Jorge Garcia to learn more about how BIReady is meeting its goal of helping companies become BI ready. Read More

Considerations for Owning versus Outsourcing Data Center Physical Infrastructure


When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing; however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash crossover point, deployment timeframe, data center life expectancy, regulatory requirements, and other strategic factors. This paper discusses how to assess these key factors to help make a sound decision.

automated data manipulation  for Owning versus Outsourcing Data Center Physical Infrastructure When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing; however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash crossover point, deployment timeframe, Read More

The Necessity of Data Warehousing


An explanation of the origins of data warehousing and why it is a crucial technology that allows businesses to gain competitive advantage. Issues regarding technology selection and access to historical 'legacy' data are also discussed.

automated data manipulation  Necessity of Data Warehousing The Necessity of Data Warehousing M. Reed - August 2, 2000 Why the market is necessary Data warehousing is an integral part of the information age . Corporations have long known that some of the keys to their future success could be gleaned from their existing data, both current and historical. Until approximately 1990, many factors made it difficult, if not impossible, to extract this data and turn it into useful information. Some examples: Data storage peripherals such Read More

The Path to Healthy Data Governance


Many companies are finally treating their data with all the necessary data quality processes, but they also need to align their data with a more complex corporate view. A framework of policies concerning its management and usage will help exploit the data’s usefulness. TEC research analyst Jorge Garcia explains why for a data governance initiative to be successful, it must be understood as a key business driver, not merely a technological enhancement.

automated data manipulation  Path to Healthy Data Governance This article is based on the presentation, “From Data Quality to Data Governance,” by Jorge García, given at ComputerWorld Technology Insights in Toronto, Canada, on October 4, 2011. Modern organizations recognize that data volumes are increasing. More importantly, they have come to realize that the complexity of processing this data has also grown in exponential ways, and it’s still growing. Many companies are finally treating their data with all the necessary Read More

Big Data: Operationalizing the Buzz


Integrating big data initiatives into the fabric of everyday business operations is growing in importance. The types of projects being implemented overwhelmingly favor operational analytics. Operational analytics workloads are the integration of advanced analytics such as customer segmentation, predictive analytics, and graph analysis into operational workflows to provide real-time enhancements to business processes. Read this report to learn more.

automated data manipulation  Data: Operationalizing the Buzz Integrating big data initiatives into the fabric of everyday business operations is growing in importance. The types of projects being implemented overwhelmingly favor operational analytics. Operational analytics workloads are the integration of advanced analytics such as customer segmentation, predictive analytics, and graph analysis into operational workflows to provide real-time enhancements to business processes. Read this report to learn more. Read More

ESG - Riverbed Whitewater: Optimizing Data Protection to the Cloud


Riverbed Whitewater leverages WAN optimization technology to provide a complete data protection service to the cloud. The appliance-based solution is designed to integrate seamlessly with existing backup technologies and cloud storage provider APIs. Read this ESG Lab report on hands-on testing of the Riverbed Whitewater appliance for ease of use, cost-effective recoverability, data assurance, and performance and scalability.

automated data manipulation  - Riverbed Whitewater: Optimizing Data Protection to the Cloud Riverbed Whitewater leverages WAN optimization technology to provide a complete data protection service to the cloud. The appliance-based solution is designed to integrate seamlessly with existing backup technologies and cloud storage provider APIs. Read this ESG Lab report on hands-on testing of the Riverbed Whitewater appliance for ease of use, cost-effective recoverability, data assurance, and performance and scalability. Read More

Data Quality: A Survival Guide for Marketing


Even with the finest marketing organizations, the success of marketing comes down to the data. Ensuring data quality can be a significant challenge, particularly when you have thousands or even millions of prospect records in your CRM system and you are trying to target the right prospect. Data quality, data integration, and other functions of enterprise information management (EIM) are crucial to this endeavor. Read more.

automated data manipulation  Quality: A Survival Guide for Marketing Even with the finest marketing organizations, the success of marketing comes down to the data. Ensuring data quality can be a significant challenge, particularly when you have thousands or even millions of prospect records in your CRM system and you are trying to target the right prospect. Data quality, data integration, and other functions of enterprise information management (EIM) are crucial to this endeavor. Read more. Read More