Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset. Continued…
Quote of the Day
“Information governance strategies are critical to risk management. Effective information governance helps deliver the objective, authoritative data that risk management requires to be effective.” – Jeffrey Ritter
Examining the top data governance tools on the market
By examining the top data governance tools and the key criteria presented here, you can select the product that best fits your organization’s needs.
New risk management needs challenge information governance processes
Information governance is complicated by businesses’ risk abatement needs, but data management expert Jeffrey Ritter says they could be mutually beneficial with the right approach.
Protecting and managing your company’s proprietary information
In this excerpt of Information Governance and Security, authors John G. Iannarelli and Michael O’Shaughnessy offer tips for establishing guidelines for all departments or sectors of a business.
Can aligning compliance and information governance create new revenue?
Aligning companies’ compliance and information governance processes produces several business benefits, including potential new sources of revenue.
Merge big data governance with data validation to create new revenue
Learn how big data governance and data validation can be used to generate revenue for businesses, explained by information governance expert Jeffrey Ritter.
A quant (quantitative analyst) is a financial industry professional whose qualifications also include advanced mathematics and computer skills. Continued…
Quote of the Day
“Technology shifts have made it a lot simpler to harvest the value of data. Quants are being replaced by a new population: the data scientists.” – Yves de Montcheuil
Data Scientist: the New Quant
Today, the IT industry is only scratching the surface of the potential of big data. Data scientists hold the keys to that potential and are the new statisticians, or quants.
Case study: Hedge fund AHL Man Group uses MongoDB to feed quants with data
Hedge fund AHL Man Group has replaced a range of disparate relational databases with a single data platform built on NoSQL database MongoDB for financial market data.
Tom Davenport on using analytics to influence business decision-makers
Analytics guru Tom Davenport gives a peek into his latest book, ‘Keeping Up with the Quants: Your Guide to Understanding and Using Analytics.
Understanding big data analytics
Big data analytics is an emerging term in the storage industry. We identify the characteristics common to the technologies identified with big data analytics and explore the four major developmental segments that underline the diversity found within Big Data analytics.
Building data science teams takes skills mix, business focus
Analytics managers offered advice on building data science teams as part of a Strata + Hadoop World 2016 panel discussion on finding and retaining data scientists.
A Hadoop cluster is a special type of computational cluster designed specifically for storing and analyzing huge amounts of unstructured data in a distributed computing environment. Continued…
Quote of the Day
“A Hadoop cluster based on commodity hardware is better positioned to scale incrementally, and the required investment in a few more compute nodes and storage devices should be relatively small.” – David Loshin
Get your analytics architecture right to support scalable tools
Analytics teams can’t overlook the importance of setting up a scalable analytics architecture before deploying data tools and models to lines of business.
New tools offer a better view into managing Hadoop clusters
When Hadoop clusters move from pilots to production, big data management tools from LinkedIn, BlueData and Hortonworks may help ease the transition.
Make the right choice between Hadoop clusters and a data warehouse
A comparison of specific criteria and variables can help organizations decide whether their data processing needs are best met by Hadoop clusters or an enterprise data warehouse.
Managing Hadoop projects: What you need to know to succeed
Many companies are implementing Hadoop projects to manage pools of big data. This guide offers different perspectives on the Hadoop framework, explaining what Hadoop can and can’t do.
How big data and Hadoop will change storage management
Big data analytics creates some challenges for storage managers, but effective integration of big data and Hadoop into a storage environment can make them less daunting.
Sharding is a type of database partitioning that separates very large databases the into smaller, faster, more easily managed parts called data shards. The word shard means a small part of a whole. Continued…
Quote of the Day
“Database sharding isn’t anything like clustering database servers, virtualizing datastores or partitioning tables. It goes far beyond all of that.” – Jason Tee
Shards of Oracle: Distributed performance improved in Oracle 12c Release 2
Oracle sharding takes a page from playbooks of Amazon and others. With Oracle 12c Release 2, it joins Real Application Clusters in the company’s toolkit.
RAID systems yield to erasure coding for data protection
RAID systems have been the pre-eminent data protection choice for decades, but data growth and high-capacity systems have led to a rise in popularity of erasure coding.
Sharding in the Cloud
I/O reads to non-virtualized datastores can be one of the biggest bottlenecks in applications that have been deployed to the cloud. One of the easiest ways to avoid this problem is to simply shard your database.
Like Americanos? Then you’ll love distributed storage
Read replication, sharding and consistent hashing made simple. The Data Mill reports.
Sharding relational databases in the cloud
Discover why best practices in relational database sharding for Big Data in cloud computing databases are an essential part of the data management process.
Social media analytics is the practice of gathering data from blogs and social media websites and analyzing that data to make business decisions. The most common use of social media analytics is to mine customer sentiment in order to support marketing and customer service activities. Continued…
Quote of the Day
“Social media analytics also differs from traditional analytics in its complete reliance on online data as its data source.” – Reda Chouffani
How social media and analytics have redefined politics
Social media and analytics have had a major effect on electoral politics, as well as enterprise operations.
Tapping the potential of social media analytics tools
Social media analytics tools can help companies find and make sense of valuable customer data. This guide examines the potential and the challenges that come with social media analytics.
Social media monitoring tools rarely used to full potential
Social media monitoring tools give companies the data they need to build targeted marketing strategies, if they successfully analyze social data.
Social media monitoring tools: What they can and can’t do
Social media analytics has the potential to give companies valuable insight into customer data in new ways. Test your understanding of social media monitoring tools by taking this quiz.
Five key questions about social media monitoring and analytics
For enterprises looking to derive business value from social media monitoring and analytics, our expert has answers.
Noisy neighbor is a phrase used to describe a cloud computing infrastructure co-tenant that monopolizes bandwidth, disk I/O, CPU and other resources, and can negatively affect other users’ cloud performance. The noisy neighbor effect causes other virtual machines and applications that share the infrastructure to suffer from uneven cloud network performance. Continued…
Quote of the Day
“In general, noisy neighbor is a potential issue with any public cloud service provider, so customers of all sizes need to understand their options for detecting and mitigating problems with cloud bandwidth.” – Dan Sullivan
Navigate noisy neighbor challenges in cloud vs. colocation
When it comes to cloud versus colocation, the multi-tenant challenges can differ. Find the right provider that won’t let noisy neighbors come knocking.
How to restore cloud bandwidth within shared resources
Shared resources on a server can result in a problem called ‘noisy neighbor,’ in which cloud bandwidth is limited. AWS users can avoid the issue.
AWS fends off ‘bouncy’ cloud computing performance perception
Amazon Web Services officials last week looked to dispel the notion that variations in cloud computing performance on EC2 are due to ‘noisy neighbors’ on shared hardware.
Hypervisors complicate storage I/O with blender effect
In this video, expert Howard Marks describes what he calls the I/O blender and noisy neighbor effects of hypervisors and explains why they can be detrimental to storage I/O.
Cloud storage providers moving to all-flash platform
Find out why cloud storage providers are shifting toward an all-flash platform and how to reduce costs by bursting workloads into an all-flash cloud.
Application performance monitoring (APM) is an area of information technology (IT) that focuses on making sure software application programs perform as expected. The goal of performance monitoring is to provide end users with a quality end-user experience. Continued…
Quote of the Day
“With APM tools available to us, it is now possible to redefine what “broke” means and switch from the reactive break-fix mode to being proactive, timely, intervention mode.” – Kevin Parker
What to expect from application performance monitoring tools
Without application performance monitoring tools, IT teams waste valuable time firefighting, and business users and customers will struggle with unresponsive apps at vital times.
Integrating application performance and ALM tools
In today’s application lifecycle management (ALM), uptime and availability are no longer the focus, according to ALM expert Kevin Parker. In this response, he explains how we have the option to integrate application performance monitoring (APM) tools with the capabilities of ALM tools, and how we should do this.
Application performance management tutorial: Pulling it all together
Learn how to use systems management tools for application performance management. This guide includes the latest trends, case studies and advice from SearchDataCenter.com.
What you need to know about application performance monitoring tools
Using application performance monitoring tools is an objective for many IT network managers who want to keep users satisfied with their apps and give them a positive experience.
Seven must-have cloud computing tools for admins
Cloud application monitoring tools are the key to a positive end-user experience. Be proactive and stop issues before they even start.
Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS), which was known as or Terminal Services prior to Windows Server 2008 R2. RDSH servers host Windows applications or desktops that are accessed by remote users over a network connection. Continued…
Quote of the Day
“In the case of RDSH, its biggest advantage is that it has existed for a long time and really hasn’t changed that much over the years. RDSH is stable, reliable and very well documented and supported.” – Brien Posey
Microsoft Remote Desktop Services vs. Remote Desktop Session Host
Learn about Microsoft Remote Desktop Services and Remote Session Host, the company’s two approaches for delivering virtual desktops and applications.
VDI vs. RDSH doesn’t matter if users don’t need full Windows desktops
Microsoft’s Remote Desktop Session Host can help you deliver applications and desktop sessions to users. Most employees don’t need full Windows desktops, so why count RDSH out?
Complete guide to RDS management and RDSH
Remote desktop services (RDS) and Remote Desktop Session Host (RDSH) are alternatives to full-fledged VDI. Find out about RDS management, issues with the technology and more.
Navigate the complexities of remote desktop printer redirection
Remote desktop printer redirection is often riddled with issues, whether users are printing through the network or locally. Printer drivers can also cause hiccups.
Compare top tools for deploying virtualized applications
Finding the right platform to deploy and manage virtualized applications is a challenge. Explore offerings from Citrix, VMware and Microsoft.
WebRTC (Web Real-Time Communications) is an open source project that seeks to embed real-time voice, text and video communications capabilities in Web browsers. Continued…
Quote of the Day
“WebRTC doesn’t really mean you no longer need servers to negotiate and connect a call. It just means, in many cases, you’ll be able to communicate directly between browsers.” – Tsahi Levent-Levi
How has the WebRTC codec clash affected adoption?
WebRTC expert Tsahi Levent-Levi examines the effect of the WebRTC codec clash on vendor and business adoption of the technology.
What WebRTC applications will and won’t do for enterprises
UC analysts and vendors discuss what emerging WebRTC applications will offer enterprises, as well as misconceptions around the pre-standardized protocol for ubiquitous voice and video conferencing.
What is a WebRTC server and how does it connect calls?
A WebRTC server is actually a collection of back-end servers, including signaling and media servers, which negotiate Web-based calls.
What are best practices for managing WebRTC services?
WebRTC expert Tsahi Levent-Levi discusses best practices to manage WebRTC services, like WebRTC voice and video, to maintain a consistent user experience.
Understand WebRTC basics to maximize deployment and adoption
Learn about the WebRTC basics in this essential guide, including the technology’s features, security concerns and use cases.
HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. Continued…
Quote of the Day
“Installing a digital certificate and providing users with the ability to make HTTPS connections to your Web server is one of the simplest ways you can add security to your website and build user confidence in conducting transactions with you over the Web.” – Mike Chapple
Google to tweak Chrome browser security in 2017, flag HTTP as insecure
Google plans to level up Chrome browser security by flagging unencrypted HTTP payment or login pages as insecure, starting in 2017.
Google boosts HTTPS, Certificate Transparency to encrypt Web
Google pushes HTTPS, Certificate Transparency log viewer and more support for Web encryption, as other tech firms eye expanding strong encryption.
HSTS: How HTTP Strict Transport Security enhances application security
Application security expert Michael Cobb reveals whether HTTP Strict Transport Security (HSTS) truly offers better application security than HTTPS.
What HTTP/2 means to the data center and its security
HTTP/2 responds to the need for less latency and higher performance when retrieving and exposing richer Web content. See what improvements come in the upgrade.
How can an HTTP referer header help maintain user Web privacy?
Learn the pros and cons of an HTTP referer header and discover why one can be critical to ensuring user Web privacy.