Domain

IT Operations Knowledge Archive – Page 48

The Promise of Big Data

The authors – leading researchers – paint a picture of great gains from big data adoption but warn the reader of the challenges that must be overcome to get to that pot of gold. A good discussion on big data: What it will take to implement big data? What technical

The Opportunities and Challenges of Big Data

This paper presents the opportunities and challenges presented by big data in the field of development. The analysis presented here can be adapted for other big data adventures. So, use this as an example of creating a vision for big data, identifying challenges it raises, and learning how to apply

Cloud Analytics Reference Architecture

This analysis provides key insights into maximizing the capabilities of big data and cloud computing, focusing on innovative approaches like the Cloud Analytics Reference Architecture.

Business Application of Cloud Computing

This presentation discusses cloud computing concepts, demonstrates cloud capabilities, introduces big data concepts and underlying technologies, and explores real world business application and issues with cloud computing to give the reader a flavor for the application of cloud to business.

Executive’s Primer on Big Data

This report answers the key question surrounding big data: What exactly is Big Data? How does it differ from existing data classification? How can one assess the transformative potential of Big Data? What is the current situation with regard to adoption and planning?

File Sharing and Collaboration in the Enterprise – Mitigating the Security Risks

This paper discusses that to prevent data breaches, enterprises should first conduct a thorough audit of their file sharing practices. It contends that to ensure data security and compliance for the organization, one needs to know all data security risks and how to mitigate them. It is important to implement best practices for secure file sharing, so employees can continue to collaborate with internal and external parties. It concludes that implementing a secure file sharing solution minimizes the risk of data breaches and helps ensure compliance with internal policies and industry regulations.

CIO Portal