Spotlights


This page shows a subsection of our research library, filtered by papers in the Spotlight category.

Cover image for Foundation issues for the Chief Data Officer

Foundation issues for the Chief Data Officer
By:

Discovering and understanding your data landscape is a necessary condition for meeting the functional requirements of a CDO

Cover image for The data management implications of GDPR

The data management implications of GDPR
By:

This paper discusses the EU's forthcoming General Data Protection Regulation (GDPR) not from a legal perspective but from the point of view of data management.

Cover image for Foundation issues for the Chief Data Officer

Foundation issues for the Chief Data Officer
By:

Discovering, and understanding, your data landscape is a necessary condition for meeting the functional requirements of a CDO.

Cover image for Self-service data preparation

Self-service data preparation
By:

Data preparation is the meat in the sandwich between data sources on the one hand and business intelligence, analytics and visualisation on the other.

Cover image for Moving to the Cloud

Moving to the Cloud
By:

Which comes first, the cloud or the application/technology? In our opinion there is only one answer to this question.

Cover image for Streams, events and analytics

Streams, events and analytics
By:

Stream processing is enjoying a resurgence thanks to big data and the emergence of the Internet of Things.

Cover image for All about graphs: a primer

All about graphs: a primer
By:

Graph databases are the fastest growing sector within the database market. This paper answers some common questions about graph databases.

Cover image for Self-service data preparation

Self-service data preparation
By:

This paper discusses what self-service data preparation products offer, why they are important and what sort of features to look for.

Cover image for Advanced threat protection and remediation

Advanced threat protection and remediation
By:

Attacks cannot be defeated with protective technologies alone, given today's technology and the sophistication of attackers, some attacks will always get through.

Cover image for Automated test case generation

Automated test case generation
By:

In this paper we focus on automating the testing process, it is there where we believe that the greatest savings and efficiencies can be achieved.

Cover image for Managing Cyber Business Risk - with Content Assurance and Cyber Insurance

Managing Cyber Business Risk - with Content Assurance and Cyber Insurance
By: Nigel Stanley

Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...

Cover image for Big data and the mainframe

Big data and the mainframe
By:

We discuss some of the issues surrounding big data deployments and how they might be resolved within the context of a mainframe environment.

Cover image for Managing indicators of compromise - taking a more proactive stance on security breach remediation

Managing indicators of compromise - taking a more proactive stance on security breach remediation
By:

This document introduces the concept of IOCs and explains how organisations can use them for their benefit.

Philip Howard

11th September, 2013 - Tools for Data Migration
This paper discusses the various types of tools that may or should be used to support successful data migrations.

Philip Howard

17th July, 2013 - The importance of performance to DevOps
Production performance is not normally a functional requirement for application development projects but, in our minds, it should be.

Cover image for Identity management services - bringing external services into the mix

Identity management services - bringing external services into the mix
By:

In the past four to five years, identity and access management technologies and services have seen considerable evolution and innovation.

Cover image for Data Masking

Data Masking
By:

In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.

Fran Howarth

2nd May, 2012 - People-Centric Security - adapt to the real-world needs of workers, partners and customers
Taking a people-centric view of security allows controls to be placed around an individual's data.

silhouette of a person

28th February, 2012 - Where is the Business? - Business intelligence empowered by location
Business intelligence supports decision-making but location shows you 'Where is the Business?'

Cover image for Where is the Business? - Business intelligence empowered by location

Where is the Business? - Business intelligence empowered by location
By: Natalie Newman

Business intelligence supports decision-making but location shows you 'Where is the Business?'