> Technology > Data Management > Data Quality
 

Data Quality

Data Quality refers to the quality of data. Data are of high quality "if they are fit for their intended uses in operations, decision making and planning" (J.M. Juran). Alternatively, the data are deemed of high quality if they correctly represent the real-world construct to which they refer. These two views can often be in disagreement, even about the same set of data used for the same purpose.
Results 1 - 25 of 297Sort Results By: Published Date | Title | Company Name

Evaluating Cloud-based Mobile Device Management

Webinar Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane
    
Virtela Communications, Inc.

Beyond the Data Warehouse: A Unified Information Store for Data and Content

White Paper Published By: Attivio     Published Date: Aug 20, 2010
With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.
Tags : 
attivio, data warehouse, unified information, data, content
    
Attivio

A Leading Insurer Improves Operational Efficiencies and Accuracy of Actuarial Reporting

White Paper Published By: WNS     Published Date: Apr 05, 2017
The client is one of the world's leading insurance companies. In 2007, the client embarked on a journey to transform its actuarial function. The objective was to improve the operational efficiencies and accuracy of actuarial reporting, while meeting tight timelines and reducing operational costs.
Tags : 
insurance, reporting, wns, wns solution, data
    
WNS

The Data Center Build-or-Buy Decision: 6 Key Factors You Should Consider

White Paper Published By: CyrusOne     Published Date: Jul 06, 2016
The "build-or-buy" decision between construction and colocation should be weighed carefully. This executive report will review six key factors that affect that choice, some of which extend beyond a basic TCO analysis.
Tags : 
cyrusone, colocation, hosting, data center, storage
    
CyrusOne

TechWiseTV How To Benefit Factory Plant Network - IoT

Webinar Published By: Cisco     Published Date: Mar 07, 2016
Find out how the Internet of Things (IoT) is changing manufacturing.
Tags : 
iot, plant networks, connected factory, reducing costs, quality management
    
Cisco

The Fight for Storage: Who do you want in your corner?

White Paper Published By: Dell EMC     Published Date: Nov 03, 2015
View the infographic to see why head to head against the competition, Isilon wins every time.
Tags : 
emc, data storage, unstructured data, isilon, nas
    
Dell EMC

Combat The Latest Security Attacks With Global Threat Intelligence

White Paper Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security
    
IBM

Strengthening Networks And Endpoints With Behavior-Based Protection

White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection
    
IBM

Safeguard Your Data, Productivity And Reputation

Webinar Published By: IBM     Published Date: Oct 06, 2015
Learn how IBM can help you proactively safeguard your data, productivity, and reputation.
Tags : 
ibm, data protection, security, data security, ibm solutions
    
IBM

Security Essentials for CIOs: Securing the Extended Enterprise

White Paper Published By: IBM     Published Date: Sep 30, 2015
Diverse and proliferating data relationships are a source of growing security concern.
Tags : 
enterprise, security organization, compliance, internet security, intrusion prevention
    
IBM

Generation D: What it means to be data-rich and analytically driven

White Paper Published By: IBM     Published Date: Sep 30, 2015
Itís one thing to buy into the current belief that data and analytics can transform business. Itís another thing to live it.
Tags : 
cloud, engagement, customer retention, digital channel, data
    
IBM

Navigating New ways to Work: Collaboration and Communication

Webinar Published By: IBM     Published Date: Sep 29, 2015
What kinds of tools do you need to navigate successfully?
Tags : 
collaboration, tools, communication, millennial, analytics
    
IBM

How is Modern Technology Helping CFOs Drive Strategic Value?

White Paper Published By: Oracle     Published Date: Sep 09, 2015
1,275 finance executives survey shows adopting emerging technologies drives insights and value to their businesses.
Tags : 
cloud based system, social, mobile, oracle, data quality
    
Oracle

Ten things to consider before you invest in video conferencing

White Paper Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Video conferencing has long been thought of as the technology for the other half, something to be used by the Fortune 500 companies and executives in corner offices, the ones handling mergers and acquisitions and the likeónot something that the average business could afford or make use of. In the last few years, however, a series of technological advances have changed that notion, making video conferencing not only a viable technology for businesses of all sizes but a necessity.
Tags : 
business processes, compatibility, costs, quality, network management
    
LifeSize, a division of Logitech

TWTV: The Technical Reality of the Internet of Things

Webinar Published By: Cisco     Published Date: Aug 27, 2015
See how factories, utility companies, railroads, and other organizations are taking advantage of Internet of Things technology.
Tags : 
connected factory, internet of things, iot solutions, data management, convergence
    
Cisco

On Demand: Taming the Beast: Extracting Value from Hadoop

Webinar Published By: Enterprise Management Associates     Published Date: Aug 25, 2015
This webinar talks about various issues organization's deal with on a daily basis and how Hadoop can offer solutions.
Tags : 
ema, hadoop, big data analytics, predictive insights, data lake architecture
    
Enterprise Management Associates

Extreme mail makeover: Re-imagined for the future of work

Webinar Published By: IBM     Published Date: Aug 20, 2015
Every day, emails flood our inbox: tasks are left undone, messages go unanswered, and meetings overwhelm us. Why does work have to be such hard work? The truth is, it doesnít have to be.
Tags : 
mail, clarity, collaboration, innovation, network
    
IBM

Backup to the Cloud for Dummies Book

White Paper Published By: NetApp     Published Date: Aug 14, 2015
Data backup and recovery is a critical priority.
Tags : 
data quality, cloud computing, infrastructure, infrastructure management
    
NetApp

Customer Profile: Vidant Health Systems

Case Study Published By: Dell EMC     Published Date: Aug 04, 2015
Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO
Tags : 
vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation
    
Dell EMC

Dyre malware games the test

White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox
    
Vectra Networks

The Carbanak Advanced Persistent Threat - Redefining banking malware

White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Tags : 
threat, data, security, it management, malware
    
Vectra Networks

IDC Infographic: Accelerating Industry Innovation Ė Flash

White Paper Published By: Dell EMC     Published Date: Aug 03, 2015
The infographic provide leading analyst insights on the all-flash array market and how innovation accelerators are driving the agile data center through high data growth and the need for increased scalability and performance.
Tags : 
innovation, industry, data center, data growth, scalability
    
Dell EMC

Smart Paper: A Growth Engine for Healthcare: How Cloud Computing Helps the Industry Navigate Change

White Paper Published By: IBM     Published Date: Jul 22, 2015
Driving transformation in the healthcare industry as it navigates technological, regulatory, legislative and cultural changes.
Tags : 
it healthcare, cloud computing, cloud security, hybrid cloud, regulatory compliance
    
IBM

IBM Financial Transaction Manager Speeds introduction of new transaction services

White Paper Published By: IBM     Published Date: Jul 22, 2015
By using FTM, financial institutions can gain visibility into message processing, balance financial risk and facilitate effective performance management.
Tags : 
financial transaction manager, ftm, financial risk management, business applications, enterprise
    
IBM

Assuring Application Performance at Scale

White Paper Published By: VMTurbo     Published Date: Jul 08, 2015
This paper explores the benefits of incorporating network traffic to topology information in VM placement decisions, as well as the integration between VMTrubo and Arista Networks.
Tags : 
application assurance, application quality, integration, application management, virtualization
    
VMTurbo
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.