Remove Analysis Remove Examples Remove Exercises Remove Mining
article thumbnail

Application modernization overview

IBM Big Data Hub

Many are addressing this via building accelerators that could be customized for enterprise consumption that helps accelerate specific areas of modernization and one such example from IBM is IBM Consulting Cloud Accelerators. We will explore key areas of acceleration with an example in this article.

Cloud 98
article thumbnail

#ModernDataMasters: Mike Evans, Chief Technology Officer

Reltio

Mike Evans is CTO and Founder at Comma Group and has spent more than a decade in the business analysis, MDM and data management space. As an aspiring Project Manager, I was asked to work on an analysis project to understand why some recent initiatives weren’t achieving expected results. “It I never consciously chose to work in data.

MDM 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Selling and utilising personal data in an insolvency situation

Data Protection Report

For example, in February of this year, the FCA and ICO issued a joint statement warning regulated firms and insolvency practitioners of their responsibilities when dealing with personal data.

article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

Relocating the data from a legacy system to a modern ECM system is also a relatively simple one-off exercise that should quickly pay for itself. For example, organizational restructuring such as mergers and acquisitions can result in staff needing to access multiple, similar systems to respond to a single customer request.

ECM 166
article thumbnail

Monitoring DB2 for z/OS: What's in YOUR Subsystem?

Robert's Db2

While several of the DB2 DISPLAY commands provide information that's useful for monitoring activity on a DB2 subsystem (a favorite of mine is -DISPLAY BUFFERPOOL(ACTIVE) DETAIL), for an in-depth view into what's going on you really want the capabilities of a monitor tool at your disposal. Take, for each part of the report (i.e.,

Mining 48
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. Mine was 2000. Daniel provides an example. Daniel’s first Black HAt was in 1999.

IT 40
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

All of these things combined – the prevalence of breaches, the analysis I was doing and the scale of Adobe – got me thinking: I wonder how many people know? HIBP's brand is intrinsically tied to mine and at present, it needs me to go along with it. Do they realise they were breached? Do they realise how many times they were breached?