This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
This collection of data governance resources will get you up to speed on the basics and best practices. Whether you’re just getting started with data governance or you have previous experience, you’ll find something useful on this list of data governance resources. The items on this list were curated by O’Reilly’s editorial experts. Continue reading Learn about data governance with these books, videos, and tutorials.
Looking to transform your data into a valuable, customer-facing data product? From concept to design and launch, we've worked with dozens of companies to create successful data products. Our checklist provides seven evaluation criteria to see if your data product has what it takes to succeed. Does your data product. Solve a distinct problem? Meet users where they work?
The devastating impact of natural disasters can be measured in human suffering, loss of life and economic impact. It is estimated that 2.5 million people have been directly affected by natural disasters since 2000. Additionally, natural disasters have had an economic impact of $1.3 trillion since 2003. Even though natural events such as floods, earthquakes or hurricanes are inevitable, I believe that their impact can be mitigated through the application of data and analytics.
The worst thing about an inside job is that once it’s detected, it’s usually too late. Early detection is critical to prevent considerable damage arising out of insider threats to the business. But that’s easier said than done! Whether it’s a rogue trader in a bank or brokerage or someone illegally sharing company intellectual property or intelligence, illegal insider actions put enterprises at risk of losing millions.
Sales and marketing leaders have reached a tipping point when it comes to using intent data — and they’re not looking back. More than half of all B2B marketers are already using intent data to increase sales, and Gartner predicts this figure will grow to 70 percent. The reason is clear: intent can provide you with massive amounts of data that reveal sales opportunities earlier than ever before.
Imagine a searchable data management system that would enable you to review crowdsourced, categorized and classified data. Consider that this system would apply to all types of data — structured and unstructured — and become more robust as more users analyze it.
I’m managing an Agile team project using Microsoft Teams – the new project management platform integrated with Office 365. Teams is a simple and useful project management tool but it’s new and light on features. Using Power BI, we want to show the hourly task burn-down for each two-week sprint.
Nutanix recently announced that Nutanix Enterprise Cloud OS running on the native AHV hypervisor is the first hyperconverged infrastructure to be certified to run production SAP HANA.
Nutanix recently announced that Nutanix Enterprise Cloud OS running on the native AHV hypervisor is the first hyperconverged infrastructure to be certified to run production SAP HANA.
While the Internet of Things (IoT) represents a significant opportunity, IoT architectures are often rigid, complex to implement, costly, and create a multitude of challenges for organizations. First of all, in order to effectively pull together an end-to-end architecture for IoT, organizations must manage multiple vendor solutions, validate that they work together, integrate them to ensure the right functionality, and provide for future enhancement compatibility.
The General Data Protection Regulation (GDPR), in force since May 25, strengthens and unifies data protection laws for individuals within the European Union (EU), making personal data privacy a fundamental right for all. Traditionally, while companies have relied on time-consuming manual processes to achieve compliance, Accenture and Cloudera are harnessing advances in technology to simplify the compliance.
In developing and improving Db2 on Cloud, we have been laser focused on providing the simplest, most convenient experience possible for users, and it’s heartening to see that those efforts are paying off.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
In the coming weeks, you have three great opportunities — two in the U.S., one in Europe — to network with your industry peers as you meet and learn from IBMers who are reinventing analytics for organizations large and small.
This is the third installment in a 3 part series. The first installment provides a short background on anti-money laundering. The second installment examines common AML problems faced by financial institutions today. In this installment, we introduce an approach that carries AML well into the future. Part III: The future is now. Given what we know about current anti-money laundering systems, if we wanted to build one from scratch today, we might come up with the following requirements.
This is the second installment in a 3 part series. The first installment provides a short background on anti-money laundering. In this installment, we examine common AML problems faced by financial institutions today. The third installment introduces an approach that carries AML into the future. Part II: Current Challenges in AML. There are several key areas in the field of anti-money laundering (AML) that rely heavily on technology.
Nutanix continues its journey to develop world-class software solutions that empower our customers to develop, run and scale any application in the cloud of their choice – public or private.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
This is the first installment in a 3 part series. It provides a short background on anti-money laundering for the layperson. AML professionals may wish to skip this installment and go directly to the second and third parts. The second installment examines common AML problems faced by financial institutions today. The third installment introduces an approach that carries AML into the future.
We organize all of the trending information in your field so you don't have to. Join 42,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content