Enterprise Information Management

4 Critical Cyber Trends for 2015

CeBIT-2014-Cyber-Security-7357

A new article out of SolPass reports, “Cybersecurity is guaranteed to make big headlines in 2015, according to one computer fraud expert.”by Angela Guess A new article out of SolPass reports, “Cybersecurity is guaranteed to make big headlines in 2015, according to one computer fraud expert. Why? Just look at 2014, says security pro Kent…

Axcient Releases Powerfully Simple Recovery for VMware

ax

by Angela Guess According to a new article out of the company, “Axcient, the leader in cloud-based Recovery-as-a-Service (RaaS), today announced the latest version of the Axcient Business Recovery Cloud, providing significantly faster system replication and recovery for physical and virtual environments, and accelerated file and folder recovery with the addition of drag-and-drop support. The…

Data-Ed Webinar: Data Warehouse Strategies

Data-Ed Thumbnail

This presentation was given in a live webinar on December 9, 2014 Data-Ed Online Presents: Data Warehouse Strategies from DATAVERSITY To view just the slides from this presentation, click HERE>> About the Webinar Integrating data across systems has been a perpetual challenge. Unfortunately, the current technology-focused solutions have not helped IT to improve its dismal…

Data-Ed Slides: Data Warehouse Strategies

Data-Ed Thumbnail

This presentation was given in a live webinar on December 9, 2014 Data-Ed Online Presents: Data Warehouse Strategies from DATAVERSITY To view the On Demand recording of this presentation, click HERE>> About the Webinar Integrating data across systems has been a perpetual challenge. Unfortunately, the current technology-focused solutions have not helped IT to improve its…

2015 Trends for the Internet Of Things

internet of things big data

by Jelani Harper The nearly unparalleled attention surrounding the Internet of Things (IoT) in 2014 was based on a combination of factors: The IoT builds on interest in Big Data: Considered retrospectively, one of the primary purposes of gathering massive amounts of multifaceted data types in real time is to facilitate the degree of interconnectivity…

Synametrics Technologies Announces Synaman, A New Web-Based Remote File Manager Ensuring Data Security

syn

by Angela Guess A new article out of the company reports, “Synametrics Technologies, a New Jersey-based solutions provider for IT professionals and computer systems developers, has unveiled SynaMan, a web-based remote file manager allowing users to upload or download files from any computer or mobile device, anywhere on the Internet. Users can access, transfer and…

Do Use Referential Integrity

Michael Blaha

by Michael Blaha Generally the most pressing problems for software development concern quality, time to market, and cost. If you define referential integrity (RI) in your software you can improve all three of these items. RI improves quality by ensuring that data references truly exist and cannot be dangling. RI also reduces development time and…

Teleopti Partners with Cicero to Deliver Desktop Analytics

cic

by Angela Guess According to a new article out of the company, “Cicero Inc., a leading provider of desktop activity intelligence and improvement software for the back office and contact center, and Teleopti, the global leader in workforce management (WFM) software for contact centers, announced a new partnership to bundle the Cicero Discovery Sensor Suite…

Who Has Ownership of Your Data?

Question mark

by Angela Guess Michael Kassner of Tech Republic recently wrote, “In the beginning, personal data was exchanged for a desired free digital service. Then mission creep led to organizations using their clients’ and or customers’ information even if the service wasn’t free. A recent example would be Verizon’s PrecisionID. Verizon’s cellular service is not free,…