Big Data in the Enterprise: An Introduction

Show More

Related videos

Big Data: Good for the Customer Not Just the Business
An important lesson learned about Big Data is that collecting and storing data may be the easier part of the job, analyzing and utilizing the data, well, that's the challenging task. It's become abundantly clear, that today's organizations need to work through the challenges and come full circle with their…
Enterprise Automation: What You Need to Know
Cloud Computing, Big Data, the Mobile Workforce and Social Networking have all been a part of a watershed of recent technology developments that have been the drivers of unprecedented and far reaching socio-economic change. In this report, Jonathan Crane, Chief Commercial officer at IP Soft, discusses what is forecast to…
Data Analytics
Episode 36 of Redefining Reality
Today's networked culture is a dream come true for researchers in fields from marketing to sociology to epidemiology. Learn how big data puts potentially everyone and everything under the microscope of analysis, creating a comprehensive view of the intricate reality in which we are all mere atoms.
Designing and Implementing Enterprise Mobile Strategies
There is no question that businesses are going toward more mobile computing. Mobile solutions enable the enterprise to respond quickly to customer and market demands, increase productivity and improve internal collaboration. In order to maximize the benefits and minimize the risks with mobile solutions, organizations need to plan and implement…
Effective Data Management
How much data do we create every day? Well, experts estimate that a massive 2.5 quintillion bytes of data is amassed on a daily basis and that 90% of the world's global data glut is the product of only the last 2 years! In order for this accumulated data to…
Mobile Application Management: An Introduction
The widespread adoption of mobile devices coupled with an insatiable appetite for new applications by workers, has forced organizations to broaden the scope of their mobile policies and strategies. Today, IT and business leaders must look beyond simply managing mobile devices and include the management of mobile applications. In this…
The Five Big Bang Theory of the Internet
In this WatchIT On the Horizon program, The "Five Big Bang" Theory of the Internet, Peter Vogel, a technology expert and attorney from the firm of Gardere Wynne Sewell LLP, based in Dallas, Texas explores the evolution of the Internet and provides interesting insights about its history and where it…
Social Networking: Legal Update 
Rapidly growing, constantly changing, and providing everyone - and anyone - the power to instantaneously broadcast information to the world, social media is potentially as risky as it is revolutionary. Peter Vogel, a partner at Gardere Wynne Sewell, reminds you why your company cannot afford to fall behind in this…
Perspectives on Business Continuity & Disaster Recovery Planning 
Business Continuity & Disaster Recovery planning, also known by the acronym, BC/DR plans, are top of mind issues for IT and business professionals today. Smart organizations routinely evaluate and review their plans, make changes were needed and then always test for effectiveness. In this report, guest expert Seth Miller, of…
Supply Chain: Understanding the Risk Factors
Where would our global economy be without supply chains? Going nowhere fast, would be a quick but accurate response. Let's face it, no matter if your firm is a manufacturer, retailer or financial organization you are undoubtedly tethered to, and reliant on, a supply chain. In this program expert, Joe…
Cloud Computing: Trends, Strategies and Best Practices
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern day computing, plus guidelines for effective implementation of Cloud Computing.…
Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to…