Understanding Data
Published: 19th April 2010 | By: Philip Howard
There are lots of approaches that you can take to legacy migrations and to new application development. We don't know any, apart from REVER, that allow you to do both.
10 Rules: Embedding a Database for High Performance Reporting and Analytics
Published: 28th March 2010 | By: Philip Howard
There are certain rules that all suppliers of embedded database products to OEMs and ISVs must follow.
Practical Steps to Ensure GCSX Code of Connection Compliance and Beyond
Published: 28th March 2010 | By: Nigel Stanley
This paper discusses the importance of the GCSX Code of Connection and then addresses the larger issue of compliance management.
Spreadsheet Governance - with Spreadsheet Workbench
Published: 17th March 2010 | By: Philip Howard
Spreadsheet Workbench is a leading enterprise spreadsheet management solution.
Security challenges in financial services
Published: 1st March 2010 | By: Fran Howarth
Data security is a key risk for financial institutions because they collect, process and store large amounts of sensitive information.
Security challenges in telecommunications
Published: 1st March 2010 | By: Fran Howarth
Telecommunications concerns must transform themselves from just transporting traffic and basic connectivity services to managed telecom service providers.
Security challenges in government
Published: 1st March 2010 | By: Fran Howarth
By fostering a culture of security within their operations, governments will be better positioned to provide information and services.
Security: from reactive to proactive - taking a risk-based approach to security
Published: 1st March 2010 | By: Fran Howarth
Organisations face an increasing amount of regulation that enforces, among other things, higher standards of corporate governance.
Log and Event Management
Published: 26th February 2010 | By: Philip Howard
We discuss what events and logs are, when and why you should care, and the features you need in a solution.
Why web security is best served in the cloud - Move protection to where the threats are
Published: 26th February 2010 | By: Fran Howarth
With the web becoming the prime method of attack as other vectors are closed through security solutions, organisations are increasingly looking to beef up their security controls for web threats. But for many resource-strapped organisations looking to do more with…