Get your company's research in the hands of targeted business professionals.
Data Quality refers to the quality of data. Data are of high quality "if they are fit for their intended uses in operations, decision making and planning" (J.M. Juran). Alternatively, the data are deemed of high quality if they correctly represent the real-world construct to which they refer. These two views can often be in disagreement, even about the same set of data used for the same purpose.
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Published By: Attivio
Published Date: Aug 20, 2010
With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.
The client is one of the world's leading insurance companies. In 2007, the client embarked on a journey to transform its actuarial function. The objective was to improve the operational efficiencies and accuracy of actuarial reporting, while meeting tight timelines and reducing operational costs.
Published By: CyrusOne
Published Date: Jul 06, 2016
The "build-or-buy" decision between construction and colocation should be weighed carefully. This executive report will review six key factors that affect that choice, some of which extend beyond a basic TCO analysis.
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Video conferencing has long been thought of as the technology for the other half, something to be used by the Fortune 500 companies and executives in corner offices, the ones handling mergers and acquisitions and the likeónot something that the average business could afford or make use of. In the last few years, however, a series of technological advances have changed that notion, making video conferencing not only a viable technology for businesses of all sizes but a necessity.
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Published By: Dell EMC
Published Date: Aug 03, 2015
The infographic provide leading analyst insights on the all-flash array market and how innovation accelerators are driving the agile data center through high data growth and the need for increased scalability and performance.