Unifying electronic communications for enhanced security - use advanced controls against sophisticated, blended threats
Published: 23rd April 2012 | By: Fran Howarth
Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats.
Cloud-delivered endpoint security - better protection is delivered via the cloud
Published: 10th April 2012 | By: Fran Howarth
Cloud-based endpoint security services are suited for use by any organisation that allows its users to interact and communicate using internet channels.
Big Data Analytics with Hadoop and Sybase IQ
Published: 4th April 2012 | By: Philip Howard
In this paper we will not only discuss what big data is and why you might want to deploy big data analytics but also what sort of facilities you need when combining Hadoop with a traditional warehouse.
Data Quality: more than just master data
Published: 1st April 2012 | By: Philip Howard
This paper is about data quality and master data management and their relationship. They are complementary, but also differ in many ways.
Sybase PowerDesigner for information architecture
Published: 27th March 2012 | By: Philip Howard and David Norfolk
Sybase PowerDesigner is one of the leading modelling tools in the market and the introduction of IA capabilities in version 16 makes it a strong candidate for enabling information architecture.
The business case for Data Quality
Published: 7th March 2012 | By: Philip Howard
It should be clear from the preceding discussions that there is much to be said in favour of a platform-based approach to data quality.
CA Application Quality Management and Testing Tools - 2012 Update
Published: 7th February 2012 | By: David Norfolk
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes.
Data Virtualisation for Agile Data Provisioning
Published: 1st February 2012 | By: Philip Howard
The capabilities of Data Virtualisation meet our requirements for agile data provisioning: to access any data, regardless of its format, in any combination, with minimal latency.
Best practices for cloud security - how security in the cloud can be a better bet than doing it yourself
Published: 30th January 2012 | By: Fran Howarth
Although due diligence is required in the selection of such services, organisations should no longer consider security to be an inhibitor