skip to Main Content
Cover for Understanding Data

Understanding Data
Published: 19th April 2010 | By:
There are lots of approaches that you can take to legacy migrations and to new application development. We don't know any, apart from REVER, that allow you to do both.

Cover for 10 Rules: Embedding a Database for High Performance Reporting and Analytics

10 Rules: Embedding a Database for High Performance Reporting and Analytics
Published: 28th March 2010 | By:
There are certain rules that all suppliers of embedded database products to OEMs and ISVs must follow.

Cover for Practical Steps to Ensure GCSX Code of Connection Compliance and Beyond

Practical Steps to Ensure GCSX Code of Connection Compliance and Beyond
Published: 28th March 2010 | By:
This paper discusses the importance of the GCSX Code of Connection and then addresses the larger issue of compliance management.

Cover for Spreadsheet Governance - with Spreadsheet Workbench

Spreadsheet Governance - with Spreadsheet Workbench
Published: 17th March 2010 | By:
Spreadsheet Workbench is a leading enterprise spreadsheet management solution.

Cover for Security challenges in financial services

Security challenges in financial services
Published: 1st March 2010 | By:
Data security is a key risk for financial institutions because they collect, process and store large amounts of sensitive information.

Cover for Security challenges in telecommunications

Security challenges in telecommunications
Published: 1st March 2010 | By:
Telecommunications concerns must transform themselves from just transporting traffic and basic connectivity services to managed telecom service providers.

Cover for Security challenges in government

Security challenges in government
Published: 1st March 2010 | By:
By fostering a culture of security within their operations, governments will be better positioned to provide information and services.

Cover for Security: from reactive to proactive - taking a risk-based approach to security

Security: from reactive to proactive - taking a risk-based approach to security
Published: 1st March 2010 | By:
Organisations face an increasing amount of regulation that enforces, among other things, higher standards of corporate governance.

Cover for Log and Event Management

Log and Event Management
Published: 26th February 2010 | By:
We discuss what events and logs are, when and why you should care, and the features you need in a solution.

Cover for Why web security is best served in the cloud - Move protection to where the threats are

Why web security is best served in the cloud - Move protection to where the threats are
Published: 26th February 2010 | By:
With the web becoming the prime method of attack as other vectors are closed through security solutions, organisations are increasingly looking to beef up their security controls for web threats. But for many resource-strapped organisations looking to do more with…

Back To Top