Subscribe to the 5 Minute Briefing Information Management email newsletter

Five Minute Briefing - Information Management
March 11, 2014

Five Minute Briefing - Information Management: March 11, 2014. A concise weekly report with key product news, market research and insight for data management professionals and IT executives.

News Flashes

Azul Systems has introduced a new technology that, the company says, solves the "warm-up" problem prevalent in many Java applications. The technology, ReadyNow!, is included in the latest version of Azul's Zing runtime for Java, version 5.9. According to the company, ReadyNow! is particularly well-suited for use in the financial markets, where a warm-up period can have serious consequences, resulting in lost trading opportunities, lost liquidity, lost revenue, lost market and risk data, and ultimately a loss of customers.

Data Summit will take place at the New York Hilton Midtown, from May 12 to May 14. The advance program is now available and registration is open with a special early bird registration rate when you register before April 11, 2014.

To help its readers learn about the key technologies and approaches that are helping organizations overcome the cost and agility challenges of database high availability, NuoDB and TransLattice discuss the top database availability trends for 2014 in a webcast hosted by DBTA.

Delphix has released the Delphix Modernization Engine, a new product aimed at addressing the challenges that it says too many modernization projects face - taking too much time and costing too much. Because of this, Delphix contends, many of them fail, either ending over budget, behind schedule, or reduced in scope, limiting the effectiveness of the investment.

KnowBe4 has announced the latest release of KnowBe4 Compliance Manager, a cloud-based audit and compliance workflow automation tool which now includes self-assessment capabilities.

Think About It

Much of the information contained in databases is sensitive and can be sold for cash or, such as in cases of theft by a disgruntled employee or by a hacker with political motivations, to cause the organization loss of business or reputation, especially if the organization is found to be in breach of regulations or industry standards that demand high levels of data security. However, there are 5 key steps that can be taken to ensure database security.