Search Results | Data and data management
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...434 NEXT
Sort by:  Most Relevant  |  Date
Creating value from joined-up IoT data

Blog  Look around an airport, a city or a factory and you will see many opportunities for IoT applications. Look deeper and you'll see numerous clusters of data, some well used and many others underexploited. Taking the case of a city, one cluster corresponds to open data. These are published data sets t...

Last updated: Mar 16, 2018   4:23 PM GMT  |  Blog: IoT Agenda   |      Collaboration, Data, data exchange
Monetizing customer usage data

Blog  The internet of things provides businesses with an incredible opportunity when it comes to analyzing customer data. With the right technological infrastructures, businesses can now capture customer usage data at levels previously unimaginable, helping to inform new market strategies and product inno...

Last updated: Oct 7, 2016   2:48 PM GMT  |  Blog: IoT Agenda   |      Customer data, Data, Internet of Things
Wearables: The next wave of enterprise IoT?

Blog  As the internet of things evolves and grows more advanced, global organizations are increasingly turning to wearable devices for real-time data feedback and a competitive edge over their peers. By 2020, there could be as many as 600 million wearable devices connected to the internet (not to mention ...

Last updated: Feb 1, 2018   6:55 PM GMT  |  Blog: IoT Agenda   |      Boeing, customer, Data
Plethora Of Enterprise Data Without Leveraging Technology

Blog  If you are heading technology in an enterprise you must read this. Enterprise Data is a futuristic deal. What you enter today may not reap fruits tomorrow but later. Especially in case of analytics. There has to be a substantial data in place if you want to drive business decisions leveraging techno...

Last updated: Feb 7, 2018   8:38 AM GMT  |  Blog: Quality Assurance and Project Management   |      Data, Enterprise
Demystifying machine learning: How do machines really learn?

Blog  It seems that everybody is talking about artificial intelligence and machine learning these days. But machine learning is not a new concept -- it's actually been around since the late 1950s. So why all the hype? Why do businesses feel like now is the time to adopt? Before businesses start to develop...

Last updated: Jan 30, 2018   3:13 PM GMT  |  Blog: IoT Agenda   |      ai, Algorithms, Artificial intelligence
How data is gaining value

Blog  Historically, much of the value that vendors associated with software was in the algorithms and the code. Well, that and the lock-in created by the dominant market share of proprietary software products and their proprietary formats. Sure, many companies build proprietary technologies on top of open...

Last updated: Jul 27, 2017   3:37 PM GMT  |  Blog: IoT Agenda   |      Data, Data Analytics, Google
Handling "complex" web sites, it's complicated

Blog  While a good chunk of application development is aligning towards mobile apps that are in many cases initially scaled back (as updates follow) and/or even disposable -- somewhere, in the cloud data centre and on the web, things are getting more complex. But what makes a complex web site anyway? Is...

Last updated: Dec 6, 2011   5:13 AM GMT  |  Blog: CW Developer Network   |      cloud, Data, Developers
Want Money from the Gov't? Get a Death Certificate.

Blog  It's odd. When most of my posts are about keeping things secure, this piece of news jumped out and reminded me that log and access management are still vital pieces to data and facilities security. A primer for those who just read the security corner for fun. Log management is the careful examina...

Last updated: Jun 20, 2015   1:40 AM GMT  |  Blog: Security Corner   |      Access, Data, Facilities
Dynamic File Management Should Cater To Four Key Functions

Blog  Dynamic File Management system comes into picture where flexibility is in demand. In fact, it is every enterprise's requirement. But think of an environment of an auditing firm or an investigating firm where the access and authorizations change on a regular basis depending on customers and the execu...

Last updated: Oct 20, 2017   7:11 AM GMT  |  Blog: Quality Assurance and Project Management   |      Data, Data sharing
Reporters Say Trump is Deleting Data

Blog  As you may recall, no sooner was Donald Trump elected President than people began saving copies of government data that they feared he might delete, such as years of data about the environment. Now here we are, four months later, and it turns out there did indeed appear to be some cause for worry: W...

Last updated: May 26, 2017   4:15 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      Data, government, Security
Technology-driven business strategies; next big thing in data curation

Blog  Are you prepared for a shift from a business-driven technology strategy to a technology-driven business strategy? It's happening now, and happening fast. Read what a CIO of a multibillion insurance company believes are the five drivers behind this shift to technology-driven business strategies and w...

Last updated: Oct 31, 2014   6:32 PM GMT  |  Blog: CIO Symmetry   |      API, CIO, Compliance
Sharing files - is the cloud secure enough?

Blog   When talking to end users about cloud computing, security still raises its ugly head on a very regular basis.  It makes no odds if the basic platform is in reality pretty secure, the perception is that it is not, making organisations hesitant to allow use and work in the cloud as a result. In ...

Last updated: Oct 25, 2013   9:04 AM GMT  |  Blog: Quocirca Insights   |      "Computer file", Cloud Computing, Cloud storage
Splunk University: big data skills training from the ninjas

Blog  Alongside Splunks annual event Splunk.conf runs the software firms learning and certification course, Splunk University, where in 2017 I spent a day learning how to use Splunk to deep dive data and improve my big data skills. As is common with third party software deployments, firms usually ...

Last updated: Oct 12, 2017   4:11 PM GMT  |  Blog: Inspect-a-Gadget   |      Big Data, Big Data analytics, Data
What Samsung's Smart TV is really saying about you

Blog  The recent publicity about Samsung's Smart TV listening in on private conversations has received a lot of public attention, but this latest privacy issue is nothing new to the technology community. The Internet of Things (IoT)--and the implications resulting from millions of Internet-enabled device...

Last updated: Feb 12, 2015   2:28 PM GMT  |  Blog: The Network Hub   |      Data, Data privacy, Internet of Things
Soldiers nail data for agile offensive on $6bn cock-up

Blog   The US Army has started pinning wayward data down to prevent a new payroll system joining a gargantuan pile up of military IT disasters.The effort is part of an emergency reform of IT projects using agile methods, on orders issued by the Department Defense last year after 11 major computer systems ...

Last updated: Jun 19, 2012   9:09 AM GMT  |  Blog: Public Sector IT   |      "Business Capability Lifecycle", "chief management officer of the US Navy", "Committee On Armed Services"
The desert island procedural set-based thinking challenge

Blog  The below text is contributed content to the Computer Weekly Developer Blog written by Michael Vessey, senior consultant with software quality specialist SQS. One of the biggest challenges for modern day developers is dealing with the number of platforms thrown at them by technology providers. Depe...

Last updated: Dec 12, 2011   3:08 AM GMT  |  Blog: CW Developer Network   |      Data, Database, methodology
The World's Most Important Data

Blog   If you havent heard by now, you are officially behind the curve! The group which holds a dear place in my heart at HP released the latest generation of mission-critical infrastructure this week. Why does this group hold such a dear place in my heart and what in the heck does mission-...

Last updated: Apr 30, 2010   11:51 PM GMT  |  Blog: You're using your OS for what?   |      Converged Infrastructure, Data, HP
What to expect - the Keys to Jeff Cutler's Keys to Security

Blog  I'm not sure I ever did a 'welcome' to the blog post when I first started working for Tech Target and putting my columns on security, data breaches, log management and more out into the ether. This post serves that purpose. I want to say hi, introduce myself a bit more, ask you some questions and th...

Last updated: Jun 18, 2014   2:33 PM GMT  |  Blog: Jeff Cutler's Keys to Security   |      Blog, Data, IT
What do vendors mean by "scalability"?

Blog  There is so much talk of big data and cloud these days that you can barely read a single tech story without hitting a slew of descriptive adjectives usually featuring the terms 'scalability' and 'flexibility'. If you're not scalable today, then you're not going forward. But the cloud is all about f...

Last updated: Oct 3, 2012   0:01 AM GMT  |  Blog: Open Source Insider   |      Data, Database, Hardware
NFL Security Measures

Blog  Its nearly the end of the football season and I finally made it to an actual game instead of watching it on TV. The stadium was cold and rowdy fans were everywhere. Though I managed not to get beer spilled on me, I was surprised by how tight security has gotten at these facilities. Not unlike th...

Last updated: Dec 15, 2014   5:05 PM GMT  |  Blog: Security Corner   |      Access, Data, football
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...434 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: