Newsletters




Trends and Applications



Emerging as the face of business intelligence (BI), dashboard technology has proven to be an integral component of any enterprise-wide BI strategy. Dashboards allow companies to benefit from a wealth of data and leverage their information assets through visually rich, responsive, and personalized BI indicators. Moreover, through effective BI dashboards, business leaders gain heightened insight into and visibility across the organization, allowing them to detect and solve problems quickly and make informed decisions on the spot.

Posted February 15, 2008

The data explosion driving data warehouse equipment purchases in the last few years has just begun. Equipment proliferation already pressurizes data center energy requirements. Fortunately, a column-based analytics server can help companies with both kinds of green - the environment and money - by offering enormous energy and cost reductions while significantly boosting performance.

Posted February 15, 2008

Efficiently sharing and managing the backup of data are common problems facing every organization, especially those with multiple, geographically-dispersed sites. Providing an adequate solution to both problems can be a vexing challenge. Businesses are under increased pressure from users and from auditors to facilitate secure, reliable, and auditable data transfer with near instantaneous access, data reliability, version coherency, and file security.

Posted January 15, 2008

There is perhaps no area within database administration more time-consuming or fraught with difficulty as the need to accurately shepherd the varied and ongoing vectors of change across an organization's database infrastructure. A typical company has hundreds of databases, each with thousands of database objects, instantiated across multiple environments. The process of database change management touches many different people in the organization, including analysts, architects, modelers, developers, and DBAs; it also invokes common umbrella functions, such as change management, corporate security, data governance and SOA.

Posted January 15, 2008

High-profile Internet security violations are on the evening news every week. Although the publicized computer break-ins seem to command the most attention, a wide range of other Internet violations and computer crimes now populate the IT landscape. An array of stakeholders - ranging from those in the executive suite to customers to regulators - are increasingly coming to view data as one of the most critical assets of the enterprise and the pressure is growing to treat it as such.

Posted January 15, 2008

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31

Sponsors