Subscribe to the 5 Minute Briefing Information Management email newsletter

Five Minute Briefing - Information Management
February 28, 2012

Five Minute Briefing - Information Management: February 28, 2012. A concise weekly report with key product news, market research and insight for data management professionals and IT executives.

News Flashes

In a partnership announced today, Tableau Software and Attivio will combine Attivio's Active Intelligence Engine (AIE) with Tableau's visualization and rapid-fire BI solutions to enable unified information access for customers. Attivio and Tableau have completed joint product testing and certification enabling their mutual customers to build new Tableau analytic dashboards based on the AIE platform.

InterSystems Corporation, a provider of software for connected care, announced that LOGICARE Corp. has migrated its top-tier patient instruction software system to the InterSystems Ensemble rapid integration and development platform. The transition is the first phase of a corporate strategy to cut costs and provide seamless connectivity by using Ensemble to handle HL7 messaging for all customer deployments.

The Teradata Data Warehouse Appliance 2690 is now generally available. The new release is designed to deliver double the performance with up to triple the data capacity of its predecessor. "The Teradata Data Warehouse Appliance 2690 is our fifth generation appliance that provides a faster, easier, and greener analytic engine for a wide variety of demanding business intelligence tasks, which has contributed to its rapid customer adoption," says Ed White, general manager, Teradata Appliances, Teradata Corporation.

Varonis Systems Inc., a provider of data governance solutions and metadata framework technology, is set to release a solution with Varonis DatAdvantage, DataPrivilege and IDU Classification Framework and HP IBRIX X9000 Storage Systems in March. The pairing of the Varonis solution with HP IBRIX X9000 will allow for greater visibility into permissions, safe removal of excessive permissions, detailed audit trails of files, data ownership identification, actionable intelligence on the location of sensitive data, and sensitive content analysis.