News from Vendors

IBM POWER vs. x86: The Key Differences

Syncsort Blog - 4 hours 35 min ago
What makes System i different from other platforms? A large part of the answer lies in the CPU architectures that System i servers use: System i relies on IBM POWER microprocessors, whereas most other modern computers and servers use the x86 architecture. And just what does System i’s use of POWER chips mean? Let’s take a look at the major factors that distinguish the POWER architecture from x86. History: IBM POWER vs. x86 Although the origins of the POWER architecture and x86 CPUs b...
Categories: News from Vendors

New eBook! Passing Your Next Audit: The Challenges of Properly Securing Your IBM i and Maintaining Compliance

Syncsort Blog - Sat, 08/18/2018 - 13:30
To achieve a security posture that is a real deterrent to theft or fraud – whether perpetrated by external or internal actors – a determined, consistent effort is required that combines the right mix of technologies, expertise and best practices. Syncsort’s eBook, “Passing Your Next Audit: The Challenges of Properly Securing Your IBM i and Maintaining Compliance,”  is intended to give you some insights in this direction. Achieving optimal security on the IBM i isn’t so much a d...
Categories: News from Vendors

New Sources, New Data, New Tools: Large Health Insurance Group Confronts the Future of Financial Data Management in Healthcare

Talend Blog - Fri, 08/17/2018 - 22:42
The world of healthcare never rests and one of the largest health insurance groups in the U.S. is not alone in wanting to provide, “quality care, better patient outcomes, and more engaged consumers.”   They achieve this through careful consideration as to how they manage their financial data.  This is the backbone of providing that quality care while also managing cost.  The future of healthcare data integration involves fully employing cloud technology to manage financial information while reco...
Categories: News from Vendors

How DevOps Changes the Meaning of ‘Mainframe Programmers’

Syncsort Blog - Thu, 08/16/2018 - 13:30
We live in the age of DevOps, and no sector of IT — not even mainframes — remains unchanged. Here’s a look at how DevOps has reshaped the way mainframe programmers work. As you probably know by now if you work in IT, DevOps is an approach to software development and deployment that emphasizes close collaboration between development teams and operations (or “IT Ops”) teams. The driving idea behind DevOps is that by having the programmers who write applications work a...
Categories: News from Vendors

Trading Migration Downtime Costs for Uptime Savings

Syncsort Blog - Wed, 08/15/2018 - 13:30
Last year we conducted a series of surveys that gave us an interesting bird’s eye view of the migration landscape. We found that IT departments were consistently falling short of their RTOs and RPOs and executives lacked confidence in their recovery plans. We also learned out of the thousands of IT managers we talked to, nearly half were delaying migrations that could vastly improve their productivity and business continuity. Why? The high probability and risk of migration-related downtime. Rece...
Categories: News from Vendors

The CIO Reading List: The Startup Way

Informatica Blog - Tue, 08/14/2018 - 20:15
Eric Ries’ first book, The Lean Startup, was a must-read for every tech entrepreneur at a newly launched business. Now he’s shifted focus to the established enterprise. His second book, The Startup Way, is aimed squarely at leaders driving change and institutionalizing innovation in large organizations. It’s a practical resource, packed with field-tested advice on giving a “Lean Startup” boost to bigger businesses. Ries is focused on creating a culture of continuous transformation, which he say...
Categories: News from Vendors

ETL Integration: Best Practices in 30 Seconds

Syncsort Blog - Tue, 08/14/2018 - 13:30
The efficiency of ETL integration can make or break the rest of your data management workflow. Want to get the most from your ETL processes? Keep reading for high-performance ETL integration best practices. Minimize data input The less data that you have going into ETL process, the faster and cleaner your results are likely to be. That’s why you want to strip out any unnecessary data as early in the ETL process as possible. If you have redundant entries in a database, for example, clean th...
Categories: News from Vendors

Informatica is Three for Three as a Leader in the 2018 Gartner Metadata Management MQ

Informatica Blog - Mon, 08/13/2018 - 18:15
Gartner recently published their third annual 2018 Metadata Management MQ and for the third year in a row Informatica was again named a Leader. Why should a business leader care about metadata management and what does it mean to be a leader? Metadata management sounds like something only IT should care about and an IT problem. But it is a critical business requirement when it comes to the digital transformation of a company’s business. A digital transformation requires an intelligent metadata ma...
Categories: News from Vendors

4 Tips for Optimizing Your Data Infrastructure

Syncsort Blog - Mon, 08/13/2018 - 13:30
Building a data infrastructure is one thing. Building a data infrastructure that is efficient, reliable and cost-effective is another. What can you do to optimize your data infrastructure and keep it running at peak performance? Keep reading for tips on data infrastructure optimization. What Is Data Infrastructure? For the purposes of this article, we’ll define data infrastructure as all of the infrastructure tools and components that help you store, manage, analyze, integrate and back up ...
Categories: News from Vendors

Going Serverless with Talend through CI/CD and Containers

Talend Blog - Mon, 08/13/2018 - 11:20
Why should we care about CI/CD and Containers? Continuous integration, delivery and deployment, known as CI/CD, has become such a critical piece in every successful software project that we cannot deny the benefits it can bring to your project. At the same time, containers are everywhere right now and are very popular among developers. In practice, CI/CD delivery allows users to gain confidence in the applications they are building by continuously test and validate them. Meanwhile, containerizat...
Categories: News from Vendors

Webcast: Top 5 Encryption Myths for IBM i Users

Syncsort Blog - Sat, 08/11/2018 - 13:30
Syncsort has released their on-demand webcast, “Top 5 Encryption Myths for IBM i Users.” Do you know encryption fact from fiction? With data breaches frequently making the headlines, businesses are losing more business and personally identifiable information than ever. Every industry and company is at risk – public and private. Encryption is one of the best ways to protect this information, but misperceptions related to cost, performance, and ease of use run rampant. View this webcas...
Categories: News from Vendors

Talend Connect Europe 2018: Liberate your Data. Become a Data Hero

Talend Blog - Fri, 08/10/2018 - 18:03
Save the date! Talend Connect will be back in London and Paris in October Talend will welcome customers, partners, and influencers to its annual company conference, Talend Connect, taking place in two cities, London and Paris, in October. A must-attend event for business decision makers, CIOs, data scientists, chief architects, and developers, Talend Connect will share innovative approaches to modern cloud and big data challenges, such as streaming data, microservices, serverless, API, container...
Categories: News from Vendors

Strategy Alone Doesn’t Matter

Informatica Blog - Thu, 08/09/2018 - 20:15
If you have a Data-driven Strategy, or any kind of strategy, it doesn’t matter if you don’t have a way to put it into action! When I was working at Wells Fargo a few years ago in Enterprise Architecture, the CEO, John Stumpf, made the point in this quote “We always say we could leave our strategic plan on an airplane, somebody could pick it up and it wouldn’t matter. It’s all about execution.“ Actually, strategy is crucial especially for your innovative and dramatic data-driven digital transform...
Categories: News from Vendors

Everything a Marketer Never Wanted to Know About Data Governance (But Should)

Informatica Blog - Thu, 08/09/2018 - 19:15
I’ve had an interesting career journey. I spent the first 20 years as either a data management/data governance practitioner, or industry analyst covering the data management space – and only the last 5-6 years or so as a marketing professional supporting a variety of marketing functions. From the outside it may appear as if this was a major shift in my career direction, but from my perspective it was the next logical evolution. My favorite part of the ‘data’ side of my career (no, not the Dark S...
Categories: News from Vendors

Mainframe Training Resources: How to Expand Your Mainframe Skillset

Syncsort Blog - Thu, 08/09/2018 - 13:30
Do you want to learn more about mainframe programming and administration, but are struggling to find mainframe learning resources? If so, this article is for you. Keep reading for a list of easily accessible mainframe training and learning tools. Despite the fact that mainframes remain essential to many IT infrastructures, mainframe training opportunities can be tough to come by. Relatively few colleges teach mainframes (although some do). As a result, many experienced computer scientists and sy...
Categories: News from Vendors

3 Common Pitfalls in Building Your Data Lake and How to Overcome Them

Talend Blog - Wed, 08/08/2018 - 18:36
Recently I had the chance to talk to an SVP of IT at one of the largest banks in North America about their digital transformation strategy. As we spoke, their approach to big data and digital transformation struck me as they described it as ever evolving. New technologies would come to market which required new pivots and approaches to leverage these capabilities for the business. It is more important than ever to have an agile architecture that can sustain and scale with your data and analytics...
Categories: News from Vendors

The Hidden Costs of Big Data

Syncsort Blog - Wed, 08/08/2018 - 13:30
How much does big data cost? There are two ways to answer that question: The simplistic way, which looks only at surface-level big data costs, and the comprehensive way, which factors in the “hidden costs of big data” as well. What are the hidden costs of big data, you ask? Keep reading for an overview of the costs that you could easily be overlooking within your big data management processes. Big Data’s Obvious Costs On the surface, the costs associated with managing big data ...
Categories: News from Vendors

How to Develop a Data Processing Job Using Apache Beam – Streaming Pipelines

Talend Blog - Tue, 08/07/2018 - 19:21
In our last blog, we talked about developing data processing jobs using Apache Beam. This time we are going to talk about one of the most demanded things in modern Big Data world nowadays – processing of Streaming data. The principal difference between Batch and Streaming is the type of input data source. When your data set is limited (even if it’s huge in terms of size) and it is not being updated along the time of processing, then you would likely use a batching pipeline. Input source, in this...
Categories: News from Vendors

Bolstering Google Cloud Data Readiness with Informatica

Informatica Blog - Tue, 08/07/2018 - 19:15
Google Cloud Next has grown into a large cloud industry event with more than 25,000 people gathered at the conference in San Francisco this July. Google is investing heavily in bringing its data innovations to Google Cloud and growing the Google Cloud partner ecosystem. Since Diane Greene joined Google Cloud 2 years ago, Google has been rounding out the capabilities of its Cloud services and the available partner solutions to make Google Cloud fully enterprise ready. As demonstrated by the atten...
Categories: News from Vendors

Dangers of Encryption on the IBM i (AS/400, iSeries): 7 Pitfalls to Avoid

Syncsort Blog - Tue, 08/07/2018 - 13:30
Syncsort recently acquired the IBM i encryption and security products of Townsend Security. The article below is an update to their popular blog post on the dangers of encryption on the IBM i. IBM’s security implementation on the IBM i platform is good, but that doesn’t mean that it’s immune from data breaches. All PCs and servers on the same network as your IBM i server are potential attack points for a data breach. There’s no doubt that cyber criminals know that the IBM i server is a rich targ...
Categories: News from Vendors


Subscribe to Data Integration Info aggregator - News from Vendors