Self-service data preparation
Published: 16th April 2016 | By: Philip Howard
Data preparation is the meat in the sandwich between data sources on the one hand and business intelligence, analytics and visualisation on the other.
Moving to the Cloud
Published: 17th September 2015 | By: Philip Howard
Which comes first, the cloud or the application/technology? In our opinion there is only one answer to this question.
Streams, events and analytics
Published: 15th September 2015 | By: Philip Howard
Stream processing is enjoying a resurgence thanks to big data and the emergence of the Internet of Things.
All about graphs: a primer
Published: 11th September 2015 | By: Philip Howard
Graph databases are the fastest growing sector within the database market. This paper answers some common questions about graph databases.
Self-service data preparation
Published: 21st April 2015 | By: Philip Howard
This paper discusses what self-service data preparation products offer, why they are important and what sort of features to look for.
Advanced threat protection and remediation
Published: 30th October 2014 | By: Fran Howarth
Attacks cannot be defeated with protective technologies alone, given today's technology and the sophistication of attackers, some attacks will always get through.
Automated test case generation
Published: 1st October 2014 | By: Philip Howard
In this paper we focus on automating the testing process, it is there where we believe that the greatest savings and efficiencies can be achieved.
Managing Cyber Business Risk - with Content Assurance and Cyber Insurance
Published: 28th April 2014 | By: Nigel Stanley
Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...
Big data and the mainframe
Published: 24th March 2014 | By: Philip Howard
We discuss some of the issues surrounding big data deployments and how they might be resolved within the context of a mainframe environment.
Managing indicators of compromise - taking a more proactive stance on security breach remediation
Published: 11th October 2013 | By: Fran Howarth
This document introduces the concept of IOCs and explains how organisations can use them for their benefit.