IBM InfoSphere Streams: An Open Platform

Developing streaming applications is quick and simple with IBM InfoSphere Streams. Streams is an open platform that blends the best elements of shareware, open source software and open standards with powerful vendor-developed technology for stream processing.

View IBM's privacy policy here

Get Whitepaper

Product Development Strategies for Systems Engineers

The “smarter” and more complex modern systems get, the more complicated the process required to build them becomes. Systems engineering teams working in regulated industries, such as semiconductors, aerospace, defense and medical device manufacturing—as well as highly disruptive industries focused on embedded systems—suffer an unfair share of the pain of product and systems development and management. In such industries, the margins of operation have always been tight, with little to no room for error, and maintaining product integrity is difficult.
Get Whitepaper

Traceability Best Practices

As products get smarter, building them right becomes a matter of managing complexity. Products have more requirements and companies have globally distributed teams and more products in their portfolios. But when a single new product, version or variant has thousands of requirements and interdependencies, the process of defining, engineering and managing them grows exponentially more complicated. Traceability becomes more challenging.
Get Whitepaper

Tableau Metadata Model

The first layer of abstraction is the Connection. The Connection stores information about how to access the data and what data to make available to Tableau. The connection attributes for the database, the tables, views and columns to use, and any joins or custom SQL used to access the data. To support true ad hoc analysis, Tableau does not require that all fields, tables or joins be included in the initial connection. This allows users to get started with a simple connection and change it as needed to include more fields or tables.
Get Whitepaper

Meilleures pratiques en matière d’analyse visuelle

Vous avez créé une visualisation ! Félicitations : vous faites partie d’un groupe en constante croissance qui tire profit de la puissance de la visualisation. Toutefois, il faut du temps, de la patience et un souci du détail pour transformer des visualisations simplement exactes en visualisations particulièrement performantes. Pour vous aider, nous avons établi une liste, courte mais importante, des techniques qui vous permettront de commencer. Bonne visualisation !
Get Whitepaper

Google BigQuery & Tableau: Best Practices

Tableau helps people to see and understand data. Our software products put the power of data into the hands of everyday people. This allows a broad population of users to engage with their data, ask questions, solve problems, and create value. Based on technology developed at Stanford University, our product reduces the complexity, inflexibility, and expense associated with traditional business intelligence applications. Anyone who is comfortable with Excel can leverage Tableau Desktop to create rich, interactive visualizations and powerful dashboards using a drag-and-drop user interface, as well as share them securely across organizations using Tableau Server or Tableau Online.
Get Whitepaper

Trust Online is at the Breaking Point

Most alarming threat to security professional in 2015 is a Cryptoapocalypse: a discovered cryptographic weakness that becomes the ultimate weapon, allowing websites, payment transactions, stock trades, and government to be spoofed or surveilled (term was coined by researches presenting their findings at Black Hat 2013).
Get Whitepaper

When Trust Online Breaks, Businesses Lose Customers

This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Get Whitepaper

Managed File Transfer Survival Guide – Implement a Successful MFT Strategy

More than a third of all business-critical processes involve managed file transfer but many people underestimate the effort it takes to be successful with the strategy. MFT is not a simple install-and-go solution. In this final installment of our MFT Survival Guide series, we walk the phases of incremental MFT implementation to ensure a smooth transition to the world of high-end managed file transfer.

In this white paper, you will learn:

•How to build a solid business case for a Managed File Transfer project

•How to create and execute a project blueprint

•Why testing MFT processes is important and how to do it

•How to support your MFT solution and plan for future functionality

Get Whitepaper

Unfettered Mobility: Driving the International Extended Enterprise

Organisations are increasingly international in both their outlook and their operations. Despite these developments, international workers continue to be impeded by their organisations' approaches to mobility.

IDC research highlights that when working internationally, employees make a distinct change in their communication preferences, becoming less available and less collaborative. This impacts both productivity and job satisfaction.

This whitepaper outlines the learnings that can be implemented in mobile policies by senior decision makers who are responsible for managing telecommunications across the globe.

Get Whitepaper

Unfettered Mobility: Research Highlights

Organisations are increasingly international in both their outlook and their operations. This is being driven by developments in the global economy and the search for new partners, as well as access to travel and communications. As a result, businesses are making greater use of a global network of customers, suppliers and partners. IDC refers to this network as the International Extended Enterprise.
Get Whitepaper

Eliminate Blind Spots in SSL Encrypted Traffic

Many security systems now perform high speed SSL/TLS decryption. But these systems cannot decrypt traffic if they don’t have access to keys and certificates. To eliminate blind spots in encrypted traffic, you need to secure your keys and certificates. Otherwise, your other security controls become less effective and leave the door open to cybercriminals.
Get Whitepaper