Data Warehouse Automation – Master Data Management Solutions #master #data #management


With version 10, Kalido is now part of the Magnitude
brand: Magnitude MDM, Magnitude DIW, Magnitude
Information Engine and Magnitude Business
Information Manager.

Version 10 available now!

Forrester Names Magnitude
a Strong Performer

Automated information management solutions
that accelerate delivering business value
at reduced cost and risk.

Manage Data as an Enterprise Asset

Automated information management solutions
that accelerate delivering business value
at reduced cost and risk.

Manage Data as an Enterprise Asset

Automated information management solutions
that accelerate delivering business value
at reduced cost and risk.

Manage Data as an Enterprise Asset

Manage Data as an Enterprise Asset

Automated information management solutions that accelerate delivering business value at reduced cost and risk.

Manage Data as an Enterprise Asset

Automated information management solutions that accelerate delivering business value at reduced cost and risk.

Data Warehouse Automation

Master Data Management


Magnitude Software leads the way in delivering corporate performance management (CPM), master data management (MDM) and connectivity in heterogeneous environments. Magnitude’s MDM solution (Kalido) enables enterprises to rapidly combine disparate data from heterogeneous systems to deliver trusted master data for reporting and operations.

© Magnitude Software, Inc.


Austin, TX (Headquarters)

Magnitude Software
515 Congress Avenue
Suite 1510
Austin, TX 78701
Toll Free 1-866-466-3849

Press Media Contact:

Click to Email Us
Send us a message – we’d love to hear from you.


Posted In: NEWS

Tags: , , ,

Leave a Comment

Categorical Data Analysis #categorical #data #analysis, #online #statistics #course, #statistics #


Categorical Data Analysis

taught by Brian Marx

This online course, “Categorical Data Analysis” will focus on a logistic regression approach for the analysis of contingency table data, where the cell entries represent counts that are cross-tabulated using categorical variables. Tests for (conditional) independence are discussed in the context of odds-ratios and relative risks, for both two-way and three-way data tables. After the ground work is laid for logistic regression models for binomial responses, more complex data structure will be introduced, e.g. those having more categorical variables or even continuous covariates. As a broad view is taken through the generalized linear model framework, opportunity is taken to also present a few model variations, such as Probit regression for binomial responses and Poisson regression for count data. Model checking (residuals, goodness-of-fit), model inference (testing, confidence intervals), model interpretation (odds-ratios, EL50s), and model selection (AIC, automatic procedures, testing reduced models) are all detailed. The focus of this course will remain laser sharp on logistic regression modeling and on the corresponding interpretation of these models, rather than the theory behind them.

This course may be taken individually (one-off) or as part of a certificate program.

WEEK 1: Categorical Responses and Contingency Tables

  • Binomial and multinomial distributions
  • Maximum Likelihood
  • Test of proportions
  • Joint, marginal and conditional probabilities
  • Odds ratio and relative risk
  • Test of independence
  • Three-way tables
  • Conditional independence and homogenous association

WEEK 2: Generalized Linear Models

  • Components of a generalized linear model
  • Binary data: logistic and probit models
  • Poisson regression for count data
  • Model checking and resideual analysis
  • Inference about model parameters
  • Goodness-of-fit and deviance

WEEK 3: Applications and Interpretations for Logistic Regression

  • Interpretation in logistic regression
  • Odds-ratio, EL50, probability rate of change
  • Inference and confidence intervals for logistic regression
  • Grouped and ungrouped data
  • Categorical predictors/ indicator variables/ coding
  • Multiple logistic regression

WEEK 4: Building and Applying Logistic Regression Models

  • Strategies in model selection
  • Model checking and AIC
  • Forward, stepwise, backward algorithms
  • Likelihood ratio testing for models
  • Deviance and residuals assessment
  • Effects of sparse data


Homework in this course consists of short answer questions to test concepts and guided numerical problems using software.

In addition to assigned readings, this course also has supplemental readings available online, example software files, and an end of course data modeling project.

Categorical Data Analysis

Who Should Take This Course:
Anyone who needs to analyze data in which the response is in yes/no or categorical form. Market researchers, medical researchers, surveyors, those who study education assessment data, quality control specialists, life scientists, environmental scientists, ecologists.

Organization of the Course:

This course takes place online at the Institute for 4 weeks. During each course week, you participate at times of your own choosing – there are no set times when you must be online. Course participants will be given access to a private discussion board. In class discussions led by the instructor, you can post questions, seek clarification, and interact with your fellow students and the instructor.

At the beginning of each week, you receive the relevant material, in addition to answers to exercises from the previous session. During the week, you are expected to go over the course materials, work through exercises, and submit answers. Discussion among participants is encouraged. The instructor will provide answers and comments, and at the end of the week, you will receive individual feedback on your homework answers.

Time Requirement :
About 15 hours per week, at times of your choosing.

Options for Credit and Recognition:
Students come to the Institute for a variety of reasons. As you begin the course, you will be asked to specify your category:

  1. No credit – You may be interested only in learning the material presented, and not be concerned with grades or a record of completion.
  2. Certificate – You may be enrolled in PASS (Programs in Analytics and Statistical Studies) that requires demonstration of proficiency in the subject, in which case your work will be assessed for a grade.
  3. CEUs and/or proof of completion – You may require a “Record of Course Completion,” along with professional development credit in the form of Continuing Education Units (CEU’s). For those successfully completing the course, CEU’s and a record of course completion will be issued by The Institute, upon request.
  4. Other options – Specializations. INFORMS CAP recognition. and academic (college) credit are available for some courses

Categorical Data Analysis has been evaluated by the American Council on Education (ACE) and is recommended for the graduate degree category, 3 semester hours in statistics. Note: The decision to accept specific credit recommendations is up to each institution. More info here .

Course Text:
The required text for this course is An Introduction to Categorical Data Analysis. Second Edition by Alan Agresti.


Most standard software packages can do various forms of categorical data analysis. No one particular software program is required or used predominantly for course illustrations, but this course does require software that can do tests and confidence intervals for proportions, chi-square tests, and logistic regression. Standard packages such as SAS, Stata, R, SPSS, and Minitab can do this; click here for information on obtaining a free (or nominal cost) copy of various software packages for use during the course.

Note. If you are planning to use R in this course and are not already familiar with it, please consider taking one of our courses where R is introduced from the ground up: “R Programming – Introduction 1,” “Introduction to R: Statistical Analysis,” or “Introduction to Modeling.” R has a learning curve that is steeper than that of most commercial statistical software.

October 06, 2017 to November 03, 2017 April 06, 2018 to May 04, 2018 October 05, 2018 to November 02, 2018

Categorical Data Analysis



Posted In: NEWS

Tags: , , , , ,

Leave a Comment

Cyberespionage and ransomware attacks are on the increase warns the Verizon


Cyberespionage and ransomware attacks are on the increase warns the Verizon 2017 Data Breach Investigations Report

NEW YORK – Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much of this is due to the high proliferation of propriety research, prototypes and confidential personal data, which are hot-ticket items for cybercriminals. Nearly 2,000 breaches were analyzed in this year’s report and more than 300 were espionage-related, many of which started life as phishing emails.

In addition, organized criminal groups escalated their use of ransomware to extort money from victims: this year’s report sees a 50 percent increase in ransomware attacks compared to last year. Despite this increase and the related media coverage surrounding the use of ransomware, many organizations still rely on out-of-date security solutions and aren’t investing in security precautions. In essence, they’re opting to pay a ransom demand rather than to invest in security services that could mitigate against a cyberattack.

“Insights provided in the DBIR are leveling the cybersecurity playing field,” said George Fischer, president of Verizon Enterprise Solutions. “Our data is giving governments and organizations the information they need to anticipate cyberattacks and more effectively mitigate cyber-risk. By analyzing data from our own security team and that of other leading security practitioners from around the world, we’re able to offer valuable intelligence that can be used to transform an organization’s risk profile.”

This year’s DBIR – the keystone report’s 10 th anniversary edition – combines up-to-date analysis of the biggest issues in cybersecurity with key industry-specific insights, putting security squarely on the business agenda. Major findings include:

  • Malware is big business. Fifty-one (51) percent of data breaches analyzed involved malware. Ransomware rose to the fifth most common specific malware variety. Ransomware – using technology to extort money from victims – saw a 50 percent increase from last year’s report, and a huge jump from the 2014 DBIR where it ranked 22 in the types of malware used.
  • Phishing is still a go-to technique. In the 2016 DBIR, Verizon flagged the growing use of phishing techniques linked to software installation on a user’s device. In this year’s report, 95 percent of phishing attacks follow this process. Forty-three percent of data breaches utilized phishing, and the method is used in both cyber-espionage and financially motivated attacks.
  • Pretexting is on the rise. Pretexting is another tactic on the increase, and the 2017 DBIR showed that it is predominantly targeted at financial department employees – the ones who hold the keys to money transfers. Email was the top communication vector, accounting for 88 percent of financial pretexting incidents, with phone communications in second place with just under 10 percent.
  • Smaller organizations are also a target: Sixty-one (61) percent of victims analyzed were businesses with fewer than 1,000 employees.

“Cyber-attacks targeting the human factor are still a major issue,” says Bryan Sartin, executive director, Global Security Services, Verizon Enterprise Solutions. “Cybercriminals concentrate on four key drivers of human behavior to encourage individuals to disclose information: eagerness, distraction, curiosity and uncertainty. And as our report shows, it is working, with a significant increase in both phishing and pretexting this year.”

Business sector insights give real-life customer intelligence

This year’s report provides tailored insights for key business sectors, revealing specific challenges faced by different verticals, and also answering the “who? what? why? and how?” for each. Key sector-specific findings include:

  • The top three industries for data breaches are financial services (24 percent); healthcare (15 percent) and the public sector (12 percent).
  • Companies in the manufacturing industry are the most common targets for email-based malware.
  • Sixty-eight (68) percent of healthcare threat actors are internal to the organization.

“The cybercrime data for each industry varies dramatically,” comments Sartin. “It is only by understanding the fundamental workings of each vertical that you can appreciate the cybersecurity challenges they face and recommend appropriate actions.”

The most authoritative data-driven cybersecurity report around

Now in its tenth year, the “Verizon 2017 Data Breach Investigations Report ” leverages the collective data from 65 organizations across the world. This year’s report includes analysis on 42,068 incidents and 1,935 breaches from 84 countries. The DBIR series continues to be the most data-driven security publication with the largest amount of data sources combining towards a common goal – slicing through the fear, uncertainty and doubt around cybercrime.

“We started the DBIR series with one main contributor – ourselves,” comments Sartin. “Our vision is to unite industries with the end goal of confronting cybercrime head-on– and we are achieving this. The success of the DBIR series is thanks to our contributors who support us year after year. Together we have broken down the barriers that used to surround cybercrime – developing trust and credibility. No organisation has to stand in silence against cybercrime – the knowledge is out there to be shared.”

Get the basics in place

With 81 percent of hacking-related breaches leveraging either stolen passwords and/or weak or guessable passwords, getting the basics right is as important as ever before. Some recommendations for organizations and individuals alike include:

  1. Stay vigilant – log files and change management systems can give you early warning of a breach.
  2. Make people your first line of defense – train staff to spot the warning signs.
  3. Keep data on a “need to know” basis – only employees that need access to systems to do their jobs should have it.
  4. Patch promptly – this could guard against many attacks.
  5. Encrypt sensitive data – make your data next to useless if it is stolen.
  6. Use two-factor authentication – this can limit the damage that can be done with lost or stolen credentials.
  7. Don’t forget physical security – not all data theft happens online.

“Our report demonstrates that there is no such thing as an impenetrable system, but doing the basics well makes a real difference. Often, even a basic defense will deter cybercriminals who will move on to look for an easier target,” concludes Sartin.

Verizon delivers unparalleled managed security services

Verizon is a leader in delivering global managed security solutions to enterprises in the financial services, retail, government, technology, healthcare, manufacturing, and energy and transportation sectors. Verizon combines powerful intelligence and analytics with an expansive breadth of professional and managed services, including customizable advanced security operations and managed threat protection services, next-generation commercial technology monitoring and analytics, threat intel and response service and forensics investigations and identity management. Verizon brings the strength and expert knowledge of more than 550 consultants across the globe to proactively reduce security threats and lower information risks to organizations.


Posted In: NEWS

Tags: , , , , , , , , ,

Leave a Comment

Oracle Data Mining #data #mining #and #predictive #analytics


Oracle Data

Scalable in-database predictive analytics


Oracle Data Mining (ODM), a component of the Oracle Advanced Analytics Database Option, provides powerful data mining algorithms that enable data analytsts to discover insights, make predictions and leverage their Oracle data and investment. With ODM, you can build and apply predictive models inside the Oracle Database to help you predict customer behavior, target your best customers, develop customer profiles, identify cross-selling opportunties and detect anomalies and potential fraud.

Algorithms are implemented as SQL functions and leverage the strengths of the Oracle Database. The SQL data mining functions can mine data tables and views, star schema data including transactional data, aggregations, unstructured data i.e. CLOB data type (using Oracle Text to extract tokens) and spatial data. Oracle Advanced Analytics SQL data mining functions take full advantage of database parallelism for model build and model apply and honor all data and user privileges and security schemes. Predictive models can be included in SQL queries, BI dashboards and embedded in real-time applications.

Oracle Data Miner GUI

Oracle Data Miner GUI. an extension to Oracle SQL Developer, enables data analysts, business analysts and data scientists to work directly with data inside the database using the graphical drag and drop workflow and component pallet. Oracle Data Miner work flows capture and document the user’s analytical methodology and can be saved and shared with others to automate analytical methodologies. Oracle Data Miner can generate SQL and PL/SQL scripts for model automation, scheduling and deployment throughout the enterprise.

Oracle Data Miner creates predictive models that application developers can integrate into applications to automate the discovery and distribution of new business intelligence-predictions, patterns and discoveries throughout the enterprise.

Technical Information


Posted In: NEWS

Tags: , , , ,

Leave a Comment

Is North Korea Preparing a Missile Test? #preparing #data #for #analysis


Is North Korea Preparing a Missile Test?

On January 19, South Korea’s Yonhap news agency reported that North Korea had placed two missiles on mobile launchers in preparation for possible testing in the early days of the Trump administration. Details are still scarce, and it should be noted that North Korea has in the past prepared missiles for launch without conducting any test. As we recently noted, missile “tests” are often political demonstrations, and often what is being demonstrated includes an element of restraint. And, of course, if launch preparations indicate technical problems likely to lead to failure, the nature of the demonstration will likely be changed to accommodate the technical reality. Still, it is possible that North Korea could conduct a missile test in the next few days.

We recently discussed what this might entail. but from the limited data available we can perhaps narrow down the speculation. The missiles are reportedly on mobile launchers, but are explicitly described as less than 15 meters long. This measurement rules out any of North Korea’s known ICBM prototypes, all of which are at least 16 meters long. North Korea probably has missiles under development that we don’t know about, but the likelihood of any such missile being ready for an imminent flight test without our first having seen signs of extensive ground testing is very low.

One possibility is that we are not seeing a complete missile: a KN-14 mobile intercontinental ballistic (ICBM) without the reentry vehicle, or a KN-08 mobile ICBM without the third stage, would meet the description provided. It would be unusual to mount the missile on a mobile launcher in an incomplete configuration, but it might be done if the reentry vehicle is stored separately and the mobile launcher is the most expedient way to deliver the missile to the launch site. If this is the case, we might expect a demonstration launch in the next few days, allowing time to mate the reentry vehicle and conduct a final checkout of the integrated system.

It has been suggested that North Korea might even launch a KN-08 with only the first two stages, if for example, the third stage is facing severe technical difficulties. This seems unlikely, however, as both the guidance system and the attachment fitting for the reentry vehicle are part of the third stage. One might launch a missile with a dummy third stage containing only the guidance and payload systems, with ballast in place of the engines and fuel. There is precedent for this in other countries’ large rocket testing, but the rocket would still be of normal length.

A final possibility is that the missile is a plain old-fashioned Nodong missile, the workhorse of North Korea’s strategic arsenal and just about 15 meters long. Kim Jong Un’s engineers almost certainly understand that any test of a new ICBM rushed to meet a political deadline will likely result in failure, and if they have had the courage to tell their boss this then Kim might settle for posturing with shorter-range missiles that he can be confident will actually work.

We are looking for high-resolution satellite imagery to help clear this up. For now, we see three realistic possibilities. First, this may turn out to be simply a bluff.Second, the North Koreans may posture with a demonstration launch of a Nodong missile or two, demonstrating no new capabilities but reminding the world that they are at least a regional threat, Finally, they may launch a KN-08 or KN-14 missile after adding a yet-unseen reentry vehicle (and in the case of a KN-08, the entire third stage).Such a test would probably fail and embarrass the regime, but it could fail in a way that provides Pyongyang’s engineers with critical data going forward. North Korea usually fails with their first test of a new missile, and usually figures out how to make it work in the end.

Recent Articles


Posted In: NEWS

Tags: , , ,

Leave a Comment

Credit Information Business #consumer #credit #reports, #commercial #credit #reports, #real-time #credit


Consumer Reports

Equifax Consumer Reports deliver predictive consumer data to support more profitable decisions, help mitigate risk and maximize growth opportunities. With access to current personally identifiable information for over 210 million consumers, Equifax Consumer Reports deliver an immediate, comprehensive view of a consumer backed by industry-leading data depth and reliability. Understand the consumer from the most predictive perspective available with actionable data that includes tradelines and inquiries. Equifax Consumer Reports combine unmatched delivery speed and data integrity to drive more confident decisions.

Consumer Tri-Merge Reports

Equifax helps you leverage relevant and actionable consumer information that provides unprecedented insight into a borrower’s credit capacity, credibility and collateral to help you make sound risk and regulatory decisions in today’s economy. Credit*Hi-Lite™, our flagship tri-merge credit report, provides current, reliable consumer credit data from all three major credit reporting agencies and allows you to better mitigate risk throughout the entire mortgage life cycle.

Business Credit Reports

Knowing more about your business prospects, customers and vendors helps you make more confident decisions and set terms that optimize profitability while minimizing risk. From verified business identities and detailed credit history to business owner and corporate linkage, Equifax Business Credit Reports give you the deepest level of insight into the validity, financial stability and performance of more businesses. Whether you need domestic or international business credit reports, Equifax offers vast coverage and depth of business credit information, with an unmatched focus on the critical small business segment.

Business Credit Reports for Small Business

Make sure you know who you’re doing business with before you sign a contract with a new business partner, create a purchase order with another supplier, or ship that big customer order. Engaging with high risk businesses could result in financial losses or operational headaches you don’t want or need.

Checking the credit history and financial well-being of a business first can provide the in-depth information you need to make smart business decision. Business Credit Reports start at $99.95 — Get started today.


Posted In: NEWS

Tags: , , , , ,

Leave a Comment

Saas Solutions, Ecommerce Development Services, IoT Solutions #saas #solutions, #ecommerce #development


SaaS Solutions that Future Proof your Business

Propel Innovation

Work with the same high quality software development teams that have worked with many successful Silicon Valley startups, and enterprises. We have been a partner of choice for some of the most discriminating tech leaders and tier-1 venture capitalists due to our cutting-edge skills, agility and attitude.

Let Zymr help you enhance your core solutions to accelerate your cloud roadmap.


1798 Technology Drive
San Jose, CA 95110
United States Of America



2017, Zymr, Inc. All Rights Reserved.

Request a Consultation

Smartsourcing: A guide to selecting an Agile Development Partner

Smartsourcing is a brief guide to the world of modern technology partnerships. It was developed through a collaborative effort of top Zymr executives as we uncovered a gap in the market between the perception of what outsourcing used to be, and how leading technology innovators are leveraging this globalized approach to value generation. Read this guide to learn.

  • Key factors to consider for your development strategy
  • Popular destinations with a track record of high quality services
  • Selection criteria to narrow your shortlisted vendors

Get access to Smartsourcing eBook

Register below to download your free eBook

Register below to download your free White Paper

Register below to download your free Guide

Register below to download your full Case Study

Register below to download your featured Case Study

Register below to download your Healthcare Cloud Stack

Register below to download your Microservices eBook

  • div class=”statcounter” a title=”web analytics” href=”” target=”_blank” img class=”statcounter” src=”” alt=”web analytics”


    Posted In: NEWS

    Tags: , , , , , , , , , , , ,

    Leave a Comment

  • REN Stock Price & News – Resolute Energy Corp #resolute #energy


    Resolute Energy Corp. REN (U.S. NYSE)

    P/E Ratio (TTM) The Price to Earnings (P/E) ratio, a key valuation measure, is calculated by dividing the stock’s most recent closing price by the sum of the diluted earnings per share from continuing operations for the trailing 12 month period. Earnings Per Share (TTM) A company’s net income for the trailing twelve month period expressed as a dollar amount per fully diluted shares outstanding. Market Capitalization Reflects the total market value of a company. Market Cap is calculated by multiplying the number of shares outstanding by the stock’s price. For companies with multiple common share classes, market capitalization includes both classes. Shares Outstanding Number of shares that are currently held by investors, including restricted shares owned by the company’s officers and insiders as well as those held by the public. Public Float The number of shares in the hands of public investors and available to trade. To calculate, start with total shares outstanding and subtract the number of restricted shares. Restricted stock typically is that issued to company insiders with limits on when it may be traded. Dividend Yield A company’s dividend expressed as a percentage of its current stock price.

    Key Stock Data

    P/E Ratio (TTM)
    EPS (TTM)
    Market Cap
    Shares Outstanding
    Public Float

    REN has not issued dividends in more than 1 year.

    Latest Dividend
    Ex-Dividend Date

    Shares Sold Short The total number of shares of a security that have been sold short and not yet repurchased. Change from Last Percentage change in short interest from the previous report to the most recent report. Exchanges report short interest twice a month. Percent of Float Total short positions relative to the number of shares available to trade.

    Short Interest (07/31/17)

    Shares Sold Short
    Change from Last
    Percent of Float

    Money Flow Uptick/Downtick Ratio Money flow measures the relative buying and selling pressure on a stock, based on the value of trades made on an “uptick” in price and the value of trades made on a “downtick” in price. The up/down ratio is calculated by dividing the value of uptick trades by the value of downtick trades. Net money flow is the value of uptick trades minus the value of downtick trades. Our calculations are based on comprehensive, delayed quotes.

    Stock Money Flow

    Real-time U.S. stock quotes reflect trades reported through Nasdaq only.

    International stock quotes are delayed as per exchange requirements. Indexes may be real-time or delayed; refer to time stamps on index quote pages for information on delay times.

    Quote data, except U.S. stocks, provided by SIX Financial Information.

    Data is provided “as is” for informational purposes only and is not intended for trading purposes. SIX Financial Information (a) does not make any express or implied warranties of any kind regarding the data, including, without limitation, any warranty of merchantability or fitness for a particular purpose or use; and (b) shall not be liable for any errors, incompleteness, interruption or delay, action taken in reliance on any data, or for any damages resulting therefrom. Data may be intentionally delayed pursuant to supplier requirements.

    All of the mutual fund and ETF information contained in this display was supplied by Lipper, A Thomson Reuters Company, subject to the following: Copyright © Thomson Reuters. All rights reserved. Any copying, republication or redistribution of Lipper content, including by caching, framing or similar means, is expressly prohibited without the prior written consent of Lipper. Lipper shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

    Bond quotes are updated in real-time. Source: Tullett Prebon.

    Currency quotes are updated in real-time. Source: Tullet Prebon.

    Fundamental company data and analyst estimates provided by FactSet. Copyright FactSet Research Systems Inc. All rights reserved.


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , ,

    Leave a Comment

    How to Recover Data from Failed Raid 1? #recover #data #from


    Restore Data from Failed Raid 1

    RAID 1 also known as Disk mirroring, is the replication of data to two or more disks. It is good option for applications that require high performance such as transactional applications, email and operating systems. While using RAID 1, an exact copy of data is created on two or more discs. This technique will give more reliability and read performance. The only issue is storage capacity (the total storage used by RAID 1 will be equal to capacity of the smallest disk).

    However, RAID users may struggle a lot if data gets inaccessible due to Raid 1 drive failure. Let us know in which situations Raid 1 drive get failed on a Windows computer:

    • Occurrence of more number of bad sectors on hard disk may result in raid 1 drive failure
    • If you do any mistake while changing file system, then RAID 1 drive may fail to work further
    • OS crash is the other common reason for failure of RAID 1 drive
    • Failure of RAID technology can also make drive unreadable and useless

    Once the RAID 1 drive gets failed it will show different kind of error messages like:

    • Storecenter disk failure
    • Critical error on RAID 1 drive
    • Failed hard drive: RAID1

    In case, you come across above mentioned errors, then how will you solve them? How will you get back data from failed RAID 1 drive? Dont worry you can easily recover failed raid 5 array. raid 10 and raid 0 by using proficient data recovery program.

    Software to extract data from failed RAID 1:

    Yodot Hard Drive Recovery tool will help you to retrieve data from failed RAID 1 drive. This program has the ability for recovering data in all kind of risky conditions like RAID1 drive corruption, OS crash and disk failure. Addition to RAID 1, it can retrieve data from RAID 10. RAID 5 and RAID 0 on Windows system. Anyone can use this software easily because of its user friendly UI design. If you feel any difficulty while performing data retrieval process, you can contact same to the 27×7 technical team through mail or phone call. The utility can get back data from different brands of RAID drive such as Intel and Seagate. Apart from RAID drives, the tool is helpful in restoring data from internal / external hard disk, USB flash drive, mmeory cards, SSD and many other storage drives. This application can be used on various versions of Windows OS (Windows Vista, Windows XP, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2003 and 2008).

    Procedure to get back data from failed RAID 1 drive:

    • First, connect failed RAID 1 drive to a healthy Windows system
    • Then, download and install Yodot Hard Drive Recovery software on the computer
    • Once installation is over, run the application in order to start recovery process
    • Tool will show two options “Partition Recovery” and “Formatted / Reformatted Recovery” in main screen
    • Choose “Partition Recovery” to get back data from RAID 1 drive
    • Next, this program will display list of logical and external drives detected in system
    • Select the partition which contains RAID 1 drive
    • Then, software will start scanning process, wait for few minutes till it gets finished
    • Later, you will see data in two views such as “Data view” and “File Type View”
    • Mark the required files or else click on “Skip” button to select all files by default
    • Then, save extracted files to a desired location other than source location

    Important Tips.

    • Be careful while changing file system, chances are there to commit mistake here
    • Maintain significant data on some other storage devices to handle sudden data loss situations

    Other Popular Software

    Recover and restore deleted photos lost from your digital camera memory card or the images from your Windows PC. The software can recover all popular image types including popular audio and video files.

    The only undelete application for Mac that can recover deleted files from HFS+, HFSX partitions on Mac. The software also has the ability to recover lost files using RAW signature method.


    Posted In: NEWS

    Tags: , , , , , , , , , , , ,

    Leave a Comment

    High Speed Data Centre Solutions & Colocation from HNS #high #speed


    • Networking
      • GeoCirrus™
      • Co-Location
      • Leased Lines
      • IP Transit
      • Wavelengths
      • Trans-Atlantic
      • Cloud Connect
      • Hybrid Cloud
    • Data Centres
      • Bristol
      • London
      • Manchester
      • Newport
      • Amsterdam
      • New York
    • About Us
      • Security
      • Careers
      • Clients
    • Channel Partners
    • News & Resources
      • Blog and news
      • HNS in the Press
      • Case Studies
      • White Papers
    • Contact Us
      • Sales
      • Support

    Data Centres Locations

    HNS now offer Co-location at state of the art sites throughout the UK, Europe and the USA. All data centres are connected via our high speed, resilient, carrier independent network. We can provide space at one or more locations of your choosing, and manage your geographical redundancy project simply. Our unique GeoCirrus™ product enables customers to house equipment in different data centres, offering the benefits of geographical redundancy with the simplicity of a single rack.


    Located in Bristol city centre.
    Easy access from M4 and M5 motorways.
    High speed data access to London.
    Space available from 10U to multiple racks.


    Located in London Docklands.
    The heart of the UK Internet.
    Ideal for Ultra high bandwidth applications.
    One of the original and best known data centres.


    Home to the largest Internet exchange in the UK outside London.
    High speed, links to the UK, US and Europe independent of London.
    Space available from 10U upwards.


    Tier 3+ facility.
    State of the art security & reliability.
    Serves Wales and the South West.
    Vast quantities of space and power available.
    Space available from 20U to 20+ rack suites.
    Up to 30kW per rack.


    9MW of power capacity.
    Diversely connected to UK & US.
    Home of Europe’s largest Internet exchange.

    New York

    Spans the entire block between Hudson Street, Thomas Street, Worth Street, and West Broadway.
    Serves the world’s largest financial, media, and enterprise companies.
    Connected via multiple Trans-Atlantic links.


    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    Vas authentication #digital #trust, #data #security, #data #cybersecurity, #trust #to #the


    Mobile Banking Apps Offer Great Opportunity Serious Risk. We Secure Them.

    By 2019, nearly 2 billion people will be using a mobile device for banking transactions. With hackers targeting mobile apps, particularly banking apps, developers need to harden their apps against cyber criminals.

    Our comprehensive software development kit (SDK) natively integrates application security, including Runtime Application Self Protection (RASP), next gen biometric authentication and transaction signing into your mobile applications.

    Solutions for All Industries

    VASCO designs strong authentication solutions to fit a wide range of industries, IT infrastructures and business needs. We build competitive solutions that incorporate open protocols for ease of integration and low cost of ownership.

    Financial Security Solutions

    We secure more than 10,000 clients, 1,700 of which are international banking institutions. Financial service providers know that online and mobile access are key growth opportunities, but these opportunities have gone untapped due to security breach fears. With VASCO’s proven anti-hack solutions, we provide convenience to your clients and the competitive edge to you.

    Healthcare Security Solutions

    VASCO is a global leader in protecting the world’s most sensitive information, and offers a suite of strong, scalable and easy-to-deploy solutions tailored to help healthcare organizations protect identities, safeguard patient records, and enable compliance with regulations. We secure remote-access to patient records and monitoring devices in addition to providing the two-factor authentication required for e-prescriptions.

    Government Security Solutions

    Governmental and public sector services can provide effective and efficient online services. To avoid identity theft or unauthorized access to confidential files, VASCO’s strong authentication solutions will replace insecure static passwords with highly secure one-time-passwords; facilitate transaction or document signing with identity-confirming electronic signatures; and encrypt data files for emails, disk and all other digital files.

    e-Gaming Security Solutions

    The massively multiplayer online game (MMOG) industry has proven to be a popular new entertainment medium and has also become an attractive target for online fraudsters. VASCO’s two-factor authentication technology is a very simple and effective way of bridging the security gaps inherent with static passwords. With two-factor authentication, MMOG companies can regain gamers’ trust and reduce account turnover.

    Payments Retail Security Solutions

    Online payments is a critical aspect for many industries ranging from banking to retail. VASCO’s strong authentication solutions will replace insecure static passwords with highly secure one-time-passwords; facilitate transaction or document signing with identity-confirming electronic signatures; and encrypt data files for emails, disk and all other digital files.


    Posted In: NEWS

    Tags: , , , , , , ,

    Leave a Comment

    Magic Quadrant for Enterprise Data Loss Prevention #magic, #quadrant, #enterprise, #data,


    Magic Quadrant for Enterprise Data Loss Prevention


    Security and risk management leaders purchase on-premises enterprise DLP to solve for either organizationwide regulatory compliance or to better protect specific types of intellectual property, while monitoring emerging cloud DLP capabilities.

    Table of Contents

    • Market Definition/Description
    • Magic Quadrant
      • Vendor Strengths and Cautions
        • Clearswift
        • CoSoSys
        • Digital Guardian
        • Fidelis Cybersecurity
        • Forcepoint
        • GTB Technologies
        • InfoWatch
        • Intel Security
        • SearchInform
        • Somansa
        • Symantec
        • Zecurion
      • Vendors Added and Dropped
        • Added
        • Dropped
    • Inclusion and Exclusion Criteria
    • Evaluation Criteria
      • Ability to Execute
      • Completeness of Vision
      • Quadrant Descriptions
        • Leaders
        • Challengers
        • Visionaries
        • Niche Players
    • Context
    • Market Overview
      • Data Loss Prevention Is Rapidly Becoming Cloud-Centric
      • Microsoft’s Continued Impact on the DLP Market
      • DLP as a Managed Service Option
      • Regulatory Compliance Remains as a Main Driver for DLP Deployments
      • Intellectual Property Protection Creates a Rise in Endpoint DLP Capabilities
      • Data Loss Prevention and UEBA
      • Decisions Are Driven by a Variety of Factors as DLP Capabilities Expand
    • Evidence
    • Gartner Recommended Reading

    2017 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

    Free Research

    Discover what 12,000 CIOs and Senior IT leaders already know.

    Why Gartner


    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    How to unformat memory card #format #recovery, #recover #formatted #files, #recover


    Recover data after memory card and computer hard drive reformat

    How to recover deleted formatted photo video files from memory card/computer hard disk/sd card/usb drive

    Is there any data recovery program to recover files after windows hard drive reformat? I formatted the wrong drive and want to get back lost files. Any format recovery software that can recover deleted files? I pressed format button by mistake and formatted my video camcorder’s memory card, how can I recover formatted files on the memory card? How to unformat memory card, hard drive, removable device and restore lost data. In this article, we will discuss about format recovery.

    The format recovery solution discussed here supports memory storage such as memory card, SD card, Compact Flash card CF card, MicroSD card, xD picture card, MultiMedia MMC card, SD mini, MicroSD, SDHC, SDXC, MicroSDHC, MicroSDXC card, usb drive, xBox 360, comptuer hard drive, usb key, SD card, external hard drive, flash drive, pen drive, android phones and tablet, removable drive, GoPro, memory stick Pro, Duo, Pro Duo, Pro-HG, Micro(M2), SanDisk Cruzers, Transcend, PNY, Olympus, Kingston, Lexar, OCZ, Patriot, Silicon Power, OCZ Patriot Memory, computer hard disk and external usb hard drive, seagate, Western Digital WD, Maxtor, Hitachi, Samsung hard drive HDD, DSC and DSLR digital cameras and video cameras, Nikon Coolpix, Canon Powershot, EOS, Kodak, FujiFilm, Casio, Olympus, Sony Cybershot, SamSung, PanasonicFuji, Konica-Minolta, HP, Agfa, NEC, Imation, Sanyo, Epson, IBM, Goldstar, LG, SHARP, Lexar, Mitsubishi, Kyocera, JVC, Leica, Phillips, Toshiba, SanDisk Chinon, Ricoh, Hitachi, Pentax, Kinon, Verbatim, Vivitar, Yashica, Argus, Lumix, Polaroid, Sigma, android phones and tablet device such as Samsung Galaxy S5, S4, S3, S2, Tab, Note 3, Note 2, Ace 3, POCKET Neo, Gear, Trend, Ace 2, Express, Mini 2, Galaxy Y, Young, Ace, Nexus, Google Nexus 10, 7, Nexus 5, HTC Touch, HTC One X, Telstra One XL, Sony Xperia Z, Motorola Droid, Amazon 7″ Kindle Fire HD, 8.9″ Kindle Fire HD, Kindle Fire 2, Nokia X, AT ?>


    Posted In: NEWS

    Tags: , , , , , , , ,

    Leave a Comment

    ADRC Data Recovery Tools User Guide #salvage #data #recovery


    User Guide

    Before you proceed to use this software, please be aware that wrong use of the software may result in data corruption. Please read our terms and conditions before you proceed.

    Note: If you are not able to recover your data using this free tools, you may want to consider our more powerful ADRC Data Recovery Express.

    Love or hate our software?

    We like to hear from you! Help us improve so that we can serve you better.

    ADRC Data Recovery Tools contains a collection of DIY recovery tools that supports a wide variety drives and file systems.

    The software incorporates extremely simple GUI with novice users in mind. The software zooms in to do only critical recovery functions with minimum complexity. It gives you full control to undelete files, disk image back up, restore a backup image, copy files from hard disk with bad sectors, disk cloning, backup, edit and restore your boot parameters.

    It is absolutely free! It is our pleasure to offer you the software without charge, direct or hidden, to download and use a fully functional copy of the program. The software will not install any spyware of adware. It does not gives pop-up ads or force any form of subscription to mailing lists.

    The program is designed to be compact green-ware without any installation. In fact, the whole program is less than 130 kb and you could stuff it anywhere (such as a floppy) and run the program from there.

    If you are happy with the utility, share the information with others about ADRC Data Recovery Tools or place to link to our download home page.

    Features: ADRC Data Recovery Tools – Undelete

    When a file is deleted from the data media, the space that the file used to reside is marked as available or the file in question is marked deleted . For as long as the space has not been overwritten, the data can be retrieved.

    ADRC Data Recovery Tools – Undelete helps you to recover lost and deleted data from hard drives, floppy disks, basic or dynamic volumes, compressed or fragmented files. Besides hard disk drives, it also supports removable devices such as compact flash, Smart Media, Iomega Zip drives, USB drives etc

    The file recovery tool allows recovery of accidental deletion of files. It works on drives formatted in FAT12, FAT16, FAT32 and NTFS file-systems. It works under all windows family operating systems such as Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows 2003 Server and Windows XP.

    You could undelete the files even after you have cleared the recycle bin.

    Features: ADRC Data Recovery Tools – Copy Files

    This is not a normal kind of copy function. The Copy Files tool actually recovers files from disks with physical damage such propagation of bad sectors on disk. Normal windows copy will result in system being halt or hang (the infamous CRC IO errors). In this situation, Copy Files tool could come to your rescue handy.

    The program will attempt to recover every readable bits of a file and put the bits together to salvage your data. It is hopeful that in the worst case scenario, most parts of files can still be extracted even some parts are gone.

    To reduce the number of tedious retries, whenever a bad sector is encountered, the program will intelligently search the neighbouring sectors to determine the extent of bad blocks and mathematically calculate the number of retries needed.

    It also features the Copy Sub Folders option which scans through the entire directory and attempts to copy everything you need.

    Features: ADRC Data Recovery Tools – Raw Copy

    Raw Copy transfers the binary raw image from one drive directly to another. It is rather similar to the infamous Ghost function. You could perform a disk clone backup (or if your disk is slightly faulty) and do not want perform a file by file copy. This is really ideal if you do not want to re-install the operating system. As the transfer is done in true low level binary, you could do this for drives with an unknown file system to be cloned such as game machines, Mac disk etc. With some built in recovery features, the program will try to recover data even if it is on bad sectors to ensure all or maximum data is restored from the drive.

    This is a very powerful function and must be used with care. As it is a binary dump, the original data on the target drive is no longer recoverable upon completion of process.

    Features: ADRC Data Recovery Tools – Image Backup / Restore

    Image Backup / Restore create and write disk image files to and from hard drives and any removable media. In just one click, it performs wholesome backup and restoration of the entire drive. A common application is to create a floppy image for transfer across internet and then downloaded the image to be written back to floppy again. One can also backup a disk image for safe keeping. It is an ideal way to backup all your operating system, data and program files.

    Features: ADRC Data Recovery Tools – Boot Builder

    The primary function of Boot builder is to allow you to import or export the boot sector of a drive (either FAT or NTFS boot sector type). In case the boot sector is damaged due to virus or system corruption, one can easily import it back. You can even custom make your own boot sector from scratch (if you know the standard parameters) to rescue a corrupted disk.


    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Hargrove – Associates, Inc #business #intelligence, #business #intelligence #services, #custom #development,


    Turn your data into a powerful asset with HAI.

    Turn your data into a
    powerful asset with HAI.

    For 25 years and counting, Hargrove & Associates, Inc. has been helping companies, manufacturers and trade associations make better business decisions backed by meaningful data. Businesses small and large in the United States and across the globe depend on our people, processes, and technology.

    Partner with us for forward-looking, dependable solutions for your data processing and business analysis needs.

    Business Intelligence

    Custom Development

    Technology and tools built to your unique business needs.

    First, we help you define measurable business goals. Then, we custom build the tools you need to collect, manage, and output your data.

    We believe technology should be flexible and responsive so you can get data when you need it whether you’re working at your desk or consulting with a vendor in the field.

    Plus, we’re Microsoft certified and pride ourselves on integrating our technology with today’s business tools while monitoring the trends of tomorrow.

    Data Processing Services

    From data collection to curation, we’re here to help.

    Our experienced support team can help you collect, process, and distribute your data. We can also help your team understand how to use your data effectively and efficiently because data is only as good as the people using it.

    Ask us about our customizable training and continuing education services for our technology and reporting tools.

    Meet Our Team

    We are dedicated stewards of your data.

    As the trusted protectors of your data, we promise honesty, integrity, and dependability. We have the capacity to handle your current needs and anticipate future challenges.

    Our team of motivated and skilled professionals take pride in helping you maximize your data, and have the ability and foresight to evolve with your changing needs.

    Stan Hargrove

    Claire Hargrove

    Brian Seebacher

    Dustin Carlson

    Matthew Corcoran

    Laurel Ogren

    Koni Kogan

    Nathan Groon

    Raj Abbu

    Kim Strauss

    Let’s Connect

    Tell us what you need.

    Great partnerships begin with a simple introduction. We’d love to meet you and discuss your data processing and business analysis needs. Drop us a line today and we’ll be in touch soon.

    You can always reach us at (612) 436-5500.

    Thank You!

    Expect to hear from us soon.

    2015 Hargrove Associates, Inc.

    100 North 6th Street, Suite 306B, Minneapolis, MN 55403 USA
    +1 612 436 5500

    Hargrove Associates, Inc. // 100 North 6th Street, Suite 306B, Minneapolis, MN 55403 USA // +1 612 436 5500


    Posted In: NEWS

    Tags: , , , , , , , , , , ,

    Leave a Comment

    Gwyddion – Free SPM (AFM, SNOM #data #analysis #software #open #source



    Gwyddion is a modular program for SPM (scanning probe microscopy) data visualization and analysis. Primarily it is intended for the analysis of height fields obtained by scanning probe microscopy techniques (AFM, MFM, STM, SNOM/NSOM) and it supports a lot of SPM data formats. However, it can be used for general height field and (greyscale) image processing, for instance for the analysis of profilometry data or thickness maps from imaging spectrophotometry.

    Gwyddion provides a large number of data processing functions. including all the standardd statistical characterization, levelling and data correction, filtering or grain marking functions. And since the developers are active SPM users, the program also contains a number of specific, uncommon, odd and experimental data processing methods they found useful – and you may find them useful too.

    Gwyddion is Free and Open Source software, covered by GNU General Public License. It aims to provide a modular program for 2D data processing and analysis that can be easily extended by third-party modules and scripts. Moreover, thanks to being free software, it provides the source code to developers and users, which makes easier both verification of its data processing algorithms and further program improvements.

    Gwyddion works on GNU/Linux, Microsoft Windows, Mac OS X and FreeBSD operating systems on common architectures. All systems can be used also for developement. It has a modern graphical user interface based on the widely portable Gtk+ toolkit, consistent across all the supported systems.


    2017-08-15: Version 2.49 “Window to the West” was released. As usual, it brings a bundle of new modules and various improvements – and also module bundles. The most noticeable changes are, nevertheless, a new much nicer icon set by Felix Kling and a better widget for adjusting the bazillion parameters of various algorithms. See the detailed news for the complete list of changes.

    2017-08-12: Petr’s talk Gwyscan – library for smart scanning paths about gwyscan was added to presentations. See also the related paper .

    2017-08-11: There seems to be still some interest in GIMP image generation plug-ins Yeti wrote 15 years ago – and abandoned essentially when Gwyddion development started. Although resurrection is unlikely, the good news is that their ideas have found their way into Gwyddion synthetic data modules. We added some information about the correspondence between them .

    2017-05-11: A list of Gwyddion-related publications was added – more specifically, publications describing Gwyddion architecture and algorithms or otherwise related to the software in a fundamental manner.

    2017-04-29: Version 2.48 “Magnetic Monastery” was released. It brings a bunch of MFM-related modules as well as the usual collection of new and improved file import modules and bugfixes. There is also a new translation, Brazilian Portugese. See the detailed news for the complete list of changes.

    2017-01-18: A Fedora 25 repository was added. We are sorry for the delay.


    2016-11-18: Version 2.47 “Pythocalypse” was released. It would be mostly a bugfix release, repairing selections that did not work properly in several modules. Except for one thing, a complete overhaul of pygwy (including a few API changes). And finally, Python scripting is also described in the user guide now. See the detailed news for the complete list of changes.

    2016-10-31: A patch for version 2.46 was published, fixing broken function gwy_selection_set_data() that affects selections in Correct Affine, Measure Lattice, Straighten Path and a few other functions. See also Patches .

    2016-10-18: A patch for version 2.46 was published, fixing compilation failure of the JPK scan file module when minizip is not available. See also Patches .

    2016-10-14: Version 2.46 “Lichen Logistics” was released, bringing geometrical shape fitting, a new grain marking function, editable toolbox, new file modules and lots of other improvements. See the detailed news for the complete list of changes.

    2016-09-04: Gwyddion has conquered space! The analysis of comet dust images from the Micro-Imaging Dust Analysis System (MIDAS) in the famous Rosetta space probe studying Comet 67P/Churyumov-Gerasimenko employed Gwyddion. See the ESA blog post and the full paper in Nature .

    2016-07-21: A Fedora 24 repository was added. In related news, a patch for version 2.45 was published, fixing broken installation of API documentation with gtk-doc 1.25+ (which can in turn break package builds). See also Patches .

    2016-07-20: A new version of the sample standalone module was released: threshold-example-2.5. A bug affecting the Mask mode was fixed and the handling of settings now more closely matches a typical Gwyddion module. A few pieces of the code were also slightly modernised (without increasing minimum required Gwyddion version).

    2016-04-27: Version 1.2 of libgwyfile was released. The library was updated to handle new data types introduced in Gwyddion 2.45.

    2016-04-26: Version 2.45 “Scatter and Slither” was released with a large number of new features, user interface improvements – and also initial native XYZ data support. See the detailed news for the complete list of changes.

    2016-03-20: Some results, the ‘right’ values and remarks to the user influence survey are now available. See the description of each individual task for a link to the results and remarks. There may be some further elaboration and refinements, anyway, the results will hopefully satisfy your curiosity for now.

    2016-03-01: The user influence survey is now closed. Thanks all who participated. We will publish the ‘right’ values and some remarks here after the Nanoscale conference.

    2016-01-31: We have received a fair number of responses in the user influence survey so far and would like to thank all who participated. The survey form will be open to the end of February (which is also when the MS Windows installer will finally stop advertising it).

    If you have not tested your data processing skills yet please download the survey images and fill your best estimates in the form. Thanks!

    2016-01-12: Version 1.1 of libgwyfile was released, fixing a couple of bugs and improving error reporting and MSVC support.

    2016-01-11: Version 2.44 “Entropy Everywhere” was released, bringing a few new features, but mainly lots of bug fixes and file format support improvements. As usual, the detailed news lists them all.


    2015-12-20: A Fedora 23 repository was added. Note there were a few problems with various auxiliary developer scripts (cross build, night build, …) in F23. The scripts should be generally fixed in svn now.

    2015-11-16: Complete MSVC development package is now available for Gwyddion compilation and development with Microsoft Visual Studio 2015. The package was prepared for Gwyddion 2.43 (the last stable version) and is still under development. Feedback is welcome.

    2015-12-14: Please participate in our user influence survey in which we are trying to characterise the influence of humans on quantitative AFM results. The survey is fun because it consists of actual data processing (as opposed to just filling some boring forms) and it should not take more than several minutes of your time. At least unless you decide to figure out the absolutely best possible data processing procedures, in which case it can take an arbitrarily long time…

    2015-12-10: If you use pygwy in MS Windows please avoid the Python 2.7.11 package (the latest one at this moment) because it causes a crash during Gwyddion startup. To stop the crashes once Python 2.7.11 has been already installed it is not sufficient to downgrade to a lower version. Apparently it is necessary to not only uninstall Python but also delete manually C:\Python27 and then reinstall all Python packages afresh. Known good versions:

    • 2.7.10 (or lower) for use in MS Windows
    • 2.7.9 (or lower) for cross-compilation in Linux

    2015-11-25: Version 2.43 “Respectable Rotunda” was released. The number of improvements and bug fixes is large but they are scattered all over the program. See the detailed news for their full list.

    2015-11-02: Broken Fedora 22 repository causing the RPM signature check to fail with ‘No such file or directory’ was hopefully fixed.

    2015-10-07: Version 2.42 “Even Enlightenment” was released. The change everyone will probably notice is the new line correction module. There are however plenty of other improvements. See the detailed news for a full list of changes.

    2015-07-29: We lost a few recent commits in the restoration of subversion repository from backup. The corresponding changes have been recommitted and subversion should be working normally now. However, the revision history since r17212 (including) has changed.

    It is recommended to check out fresh working copies of all svn modules and transfer any changes you might have to the new copies. If you have a working copy updated to a r17212 or later, you must check it out afresh. If you observe anything odd with subversion please report it.

    2015-07-16: There was a major outage of services due to a storage failure. File download works, but subversion, discussion, etc. are out of order at this moment. Details can be found at the SourceForge blog .

    2015-07-13: Version 1.0 of libgwyfile was released. Several bugs were fixed since version 0.9 and MS Windows support was greatly improved. The library is considered stable now.



    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    Data Logger for GPS trackers, vehicle trackers and personal trackers #gps


    Data Logger for GPS trackers, vehicle trackers and personal trackers

    For Windows 2000 – Windows 10 (2016) (incl. Server, x86 and x64). Latest version: 2.7.9 build 802. August 2, 2017 .

    Brief description:

    Devices that use GPS to locate an object and a GSM channel to send data to the user have become widely used lately. With GPS trackers. you can create a vehicle tracking system that allows you to track the entire route of a car or another vehicle. Besides information about the location, a GPS tracker can use additional sensors to send data about fuel consumption, traveled distance, velocity and car alarm.

    It works in the following way: the GPS tacking unit uses a GPS or GLONASS receiver to determine its coordinates. The tracker reads data from sensors and generates a data packet containing all information about the vehicle. Then it uses the GSM transmitter or the GPRS data transfer channel to send the information packet to the server.

    Our program GPS Tracker Data Logger acts as the server and allows you to collect data from an unlimited number of various GPS trackers simultaneously. The obtained data is processed, uniformed and written to a log file or a database. Also, the program has a set of interfaces so other applications can get data in real time.

    Besides, GPS Tracker Data Logger can convert data into other formats (the formats of other trackers) and send them to other servers. It allows you to connect previously unsupported devices to existing systems or view data from heterogeneous GPS trackers with the help of integrated client software.

    What problems can be solved with GPS Tracker Data Logger?

    The advantages of using GPS vehicle tracking systems are undeniable as they allow you to considerably reduce your company’s expenses due to reduced expenditure on deviations from the route and prevented personal use of company vehicles.
    Our program allows you to reduce the amount of client and server software being used thanks to the possibility to receive and process data from various trackers. One configuration can process data only from one type of GPS trackers. To connect another type of trackers, you need to create a new configuration using the button with a green plus sign on it in the main window of the program or clone an existing one.

    Getting started is easy. GPS Tracker Data Logger is ready!

    The software installation wizard can create a basic configuration where you will be able to make all necessary changes. To make these changes, start GPS Tracker Data Logger from the Start – Programs menu. Select a configuration from the drop-down list and click one of the buttons near it. You can select the parser for your tracker on the Plug-ins – Query Parse Filter tab. If necessary, configure export to the database using one of the plug-ins on the Plug-ins – Data Export tab.



    Posted In: NEWS

    Tags: , , , , , , ,

    Leave a Comment

    Dashboard Software #dashboards, #excel #dashboards,dashboard #software,dataviz,excel #dashboards #software #excel #dashboard, #access

    InfoCaptor Business Intelligence Super easy data discoveryDrag and drop visual analyticsBest Dashboard DesignerCreate Dashboard MockupsD3js based visualizationsFully web basedEnterprise ReadyScalable from department to 1000s of usersSuper AffordableGoogle AnalyticsSalesforceCSV FilesPackaged Data warehouse

    InfoCaptor is an extremely competent product, capable of addressing many BI, data visualisation and analytics needs at a very modest price. Deployment can either be in-house or on the web, and in either case the interface is browser based. This is a pragmatic, ‘get-the-job-done’ solution without the surface gloss and high prices charged by other suppliers.
    Martin Butler. Butler Analytics

    Free business intelligence and dashboards

    Why spend thousands and millions in business intelligence tools? InfoCaptor is free for Startups, Non-profits and students InfoCaptor the cheapest dashboard software

    Excel Dashboard Software

    Stop building dashboards in Excel! InfoCaptor provides a clear path to keep your data and dashboard presentation separate. Works with CSV, Excel or any TXT datasets

    Rapid Analytics

    It takes under 10 mins to build your first dashboard. Drag drop visual analytics does not limit you thinking in terms of X and Y axis. Rapidly change visualizations to see data from different angles. Keep what you like and package them into published dashboards.

    Ad-hoc Visualization

    Drag and Drop Visual Analyzer for self-service data exploration. Takes only few clicks from data to final dashboards.

    Prototyping Mockups/Dashboards

    Provides a prototyping and flowcharting engine for quick dashboard mockups.Free style placement of widgets.[no restrictive grids]


    Projects and user groups for collaborative work. Embed dashboard or individual widgets LIVE on any web page. Integrate executive dashboards straight into your sharepoint portal or your website for live interactions

    Data Sources

    Variety of JDBC and ODBC sources including Microsoft Excel, Microsoft Access, Oracle, SQL Server, MySql, DB2, Progress,Sqlite,PostgreSQL, Hadoop Hive, Cloudera Impala and HTTP API for web services

    Security and Data Governance

    Enterprise user access control mechanism.Integrates with LDAP or Active Directory.Public or private dashboards.


    Comprehensive library from pivot tables to bars, stacks,area and scatter plots. Hierarchical visualizations such as Circle pack, Treemap, sunburst and cluster charts. Trellis and small multiples.

    How is InfoCaptor unique and different

    InfoCaptor is simply a web based application that works on every platform [windows, linux/unix or Mac].

    Web and browser based dashboard designer and bi tools are a must to establish a firm data-driven culture. Why spend thousands of dollars on each desktop license and then millions of dollars on server licenses?

    Compared to other vendors like Tableau or Qlikview, InfoCaptor is extremely affordable.

    • Quickly upload CSV data and build Excel Dashboards
    • Simply connect to any SQL database and build live SQL dashboards
    • Use Hadoop connectors for Bigdata and make bigdata dashboards
    • Free dashboard software for Startups, Students and Non-profits

    InfoCaptor Visual Analyzer enables you to rapidly browse datasets and spin it across variety of visualizations

    No SQL knowledge necessary. No Technical skills needed.

    Explore InfoCaptor’s Features and Benefits

    • Self service Adhoc analysis
    • Bird’s Eye view of entire operation
    • Quick prototyping
    • Public dashboards – accessible as web page URL
    • Dynamic dashboards with filters/parameters
    • Unlimited drill downs
    • In-memory packaged dashboards
    • Static dashboards for mockups and prototyping
    • Visual Alerts
    • Motion Alerts
    • Email Alerts
    • Sound Alerts
    • Flowchart and Prototyping Engine
    • Vector Charts – SVG and HTML5
    • D3js based advanced visualization
    • Awesome Visual Analyzer
    • Gauges/Dials for KPI monitoring
    • Bullet chart/graph for performance tracking
    • Bar charts/Group/Column bars
    • Line chart and Area chart
    • Scatter charts and Bubble Scatter chart
    • Circle Pack and Treemap
    • Chord and Sunburst
    • Cluster diagrams

    Has InfoCaptor Convinced you?

    If so, click to buy now, including 60 minutes of dashboard development for free!

    Wow, This tool has amazing capabilities!

    This tool has amazing capabilities and can analyze from simple spreadsheets to complex data sources with ease and that too in your browser. I can stitch several spreadsheets with ease by just copy pasting the required elements and analyze further.Visualizations are amazing. Great product for non enterprise users too! Parag Khadye – BI Manager at Accenture

    Selected Media mentions

    Selected People who mentioned InfoCaptor visualizations (you could be one)


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Data Recovery – Free download and software reviews – CNET #data


    Data Recovery

    2017-08-20 07:12:54 | By Patoditi

    | Version: Data Recovery 2.3.1

    55% Off
    Great product, nice price, helped me revover all lost data. thanks for discount with coupon code.

    Haven’t found any cons, the program saved me multiple times. The only time you won’t be able to retrieve lost data is if you already over-write new images/files over formated SD card. But that’s not the software’s fault, it’s your fault.

    Easy to use, if you used your camera to do quick format on an SD card and then realized that you haven’t download the images, this tool is for you. This tool works exceptionally well for sd card data recovery. As long as you haven’t done any deep formats your data should still be retrievable. It even sorts data by date so you know exactly what you need to recover.

    Did not work at all :[

    February 25, 2017 | By scps

    2017-02-25 20:43:10 | By scps

    | Version: Data Recovery 2.3.1

    It was free to try.

    Could not read ANYTHING from the afflicted drive

    Could not read ANYTHING from the afflicted drive even though windows could.

    None that I could find.

    It failed to do anything but install a bunch of programs I did not want. It reset my homepage in my web browser and reset my search engine to its crappy tool. I had to waste 20 minutes uninstalling and resetting my settings. This is a pure virus.

    Beware of the virus insertion tool.

    Great Backup data recovery for all Storage Devices

    2013-08-26 23:33:52 | By adonismark

    | Version: Data Recovery 2.3.1

    I lost all my data and photos, from my PC. Some said there is nothing usable and I am searching over the past 24 hours almost ready to scream and give up all hope. I found Amrev Data Recovery software on a Google search and more recovery software and follow the step by step after few hours my entire data file, Massages Photo are recover, wow thanks God. It’s really awesome data recovery software Thanks Amrev Software Thanks a Lot

    Very fast recovery process (at least for big files)

    Overall, this software recovered all data that I didn’t think I would get back. It was very fast and would ask me to “overwrite” files quite often, but it eventually worked.


    2013-03-02 21:30:41 | By tvlbrother

    | Version: Data Recovery 2.3.1

    Didn’t find deleted file!

    I spent half an hour uninstalling misc. software that was loaded.

    Recovered files from my Truecrypt-encrypted drive!

    2012-09-26 15:24:57 | By kokanee-yyz

    | Version: Data Recovery 2.3.1

    Only recovery tool that recovered files from a Truecrypt-encrypted volume

    None that I found when running the program. It’s pretty intuitive.

    Thanks to the author Tokiwa!!

    Windows Data Recovery

    2012-08-11 03:45:31 | By supriyalovely

    | Version: Data Recovery 2.3.1

    Best to install and use.there are no need any technical knowledge its use very simple.

    Surely Recommend to everyone!

    Window Software is one of the best software to restore lost data from corrupted hard drives, pen drives, USB drives, etc.

    2012-08-05 12:00:35 | By nikkosguy

    | Version: Data Recovery 2.3.1

    Easy and fast to set up.

    I needed to retrieve a deleted file from a Digital Secure card. It would not recognize my camera as a lettered drive of any kind. It will only retrieve deleted data on a card if you have a car reader installed as a drive.

    All in all this program could not assist me. So I can’t say if it worked or not. Too bad it needed a specific drive letter to work with.

    Thought all pics were gone, so this is a lifesaver!

    2012-07-16 08:44:08 | By B-dubs

    | Version: Data Recovery 2.3.1

    Data Recovery was fairly simple and easy to use. When I realized that I had hit “delete all” on the camera, I nearly broke down in tears. It helped me recover the majority of the pictures from our trip to Montana. Although it didn’t recover all of them, it made me extremely happy to have most of them back.

    Frustratingly slow, but since I didn’t have to pay any money to recover my pics from our trip to Montana, I dealt with how long it took. Some pictures came back with part of the pic missing, while others couldn’t be recovered at all. I think I was able to recover about 90% of the pictures.

    Overall, this program recovered many pics that I didn’t think I would get back. It was very slow and would ask me to “overwrite” pics quite often, but it eventually worked.


    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    Containerized Data Centers Moving Out Of Niche Shadows – Page: 1


    Containerized Data Centers Moving Out Of Niche Shadows

    Portable containerized data centers. which pack the compute power of a small data center into a standard shipping container, can be rolled out quickly as a way to increase IT capacity faster than might be possible with their brick-and-mortar counterparts.

    Portable containerized data centers feature a variety of data center technologies, including servers, storage, networking, power, and cooling equipment pre-configured in standard 20-foot or 40-foot shipping containers similar to those used to ship products on ships or by rail.

    Such “data centers-in-a-box” can be used to quickly expand the capacity of fixed data center locations, or quickly shipped and set up in remote locations for use in an emergency or where compute power is required but no local data centers are available.

    While the market for portable containerized data centers still depends on more specialized uses such as containers built for companies such as Google which can bring them in and quickly set them up to meet their fast-growing compute requirements, solution providers in the data center market are looking at more mainstream uses for them.

    For now, however, the market is still fairly small. According to an Uptime Institute survey of 525 large data center operators conducted this past Spring, 4 percent of respondents said they have deployed containerized data centers, 5 percent said they are planning to do so, 37 percent are exploring the concept, and 55 percent have no interest in the technology.

    The number of potential suppliers continues to grow. Cisco this Spring became the latest to enter the market with a new offering configured with Cisco’s UCS (Unified Computing System) data center technology, which ties server, storage, and networking into a single architecture.

    Customers can also order them configured with a vBlock storage architecture from VCE. the EMC-Cisco joint-venture which builds storage infrastructures for virtualized and cloud environment, or with a NetApp FlexPod Modular Data Center Solution .

    Cisco joins a large number of suppliers, some of whom are well-known server and system vendors including Hewlett-Packard, SGI, IBM, Dell, Liebert, Oracle-Sun, and Bull.

    Representative offerings from the major vendors, in addition to the new Cisco units, include the ICE Cube from SGI. The ICE Cube is available in 20-foot and 40-foot containers which can support up to 1,540 U of rack space, up to 36,768 server core, and up to 16 petabytes of storage capacity using its own server and storage products or those from third-party vendors.

    Another is HP’s Performance Optimized Datacenter, or POD, which supports up to 1,600 server nodes or 5,400 hard drives in a 20-foot container or up to 3,520 server nodes or about 12,000 hard drives in a 40-foot container. HP claims its 40-foot models offers the equivalent of a traditional 5,000-square-foot data center space.

    Smaller companies in this field, as listed by a Lawrence Berkeley National Laboratory study in February, include i/o Data Centers, Pacific Voice Data, Elliptical Mobile Solutions, PDI, Cirrascale, Lee Technologies, Telenetix, Universal Networking Services, NxGen Modular, and BladeRoom Group.

    A representative model from these lesser-known vendors is the FORREST container from Poway, Calif.-based Cirrascale, which the company claims can house over 2,880 servers or 26 PBs of storage in a 40-foot container. The company offers customers a choice of its own blade server and blade storage systems or third-party equipment.

    Next: Different Types, Different Markets


    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    BBRY Stock Price & News – BlackBerry Ltd #blackberry #ltd. #stock


    BlackBerry Ltd. BBRY (U.S. Nasdaq)

    P/E Ratio (TTM) The Price to Earnings (P/E) ratio, a key valuation measure, is calculated by dividing the stock’s most recent closing price by the sum of the diluted earnings per share from continuing operations for the trailing 12 month period. Earnings Per Share (TTM) A company’s net income for the trailing twelve month period expressed as a dollar amount per fully diluted shares outstanding. Market Capitalization Reflects the total market value of a company. Market Cap is calculated by multiplying the number of shares outstanding by the stock’s price. For companies with multiple common share classes, market capitalization includes both classes. Shares Outstanding Number of shares that are currently held by investors, including restricted shares owned by the company’s officers and insiders as well as those held by the public. Public Float The number of shares in the hands of public investors and available to trade. To calculate, start with total shares outstanding and subtract the number of restricted shares. Restricted stock typically is that issued to company insiders with limits on when it may be traded. Dividend Yield A company’s dividend expressed as a percentage of its current stock price.

    Key Stock Data

    P/E Ratio (TTM)
    EPS (TTM)
    Market Cap
    Shares Outstanding
    Public Float

    BBRY has not issued dividends in more than 1 year.

    Latest Dividend
    Ex-Dividend Date

    Shares Sold Short The total number of shares of a security that have been sold short and not yet repurchased. Change from Last Percentage change in short interest from the previous report to the most recent report. Exchanges report short interest twice a month. Percent of Float Total short positions relative to the number of shares available to trade.

    Short Interest (07/14/17)

    Shares Sold Short
    Change from Last
    Percent of Float

    Money Flow Uptick/Downtick Ratio Money flow measures the relative buying and selling pressure on a stock, based on the value of trades made on an “uptick” in price and the value of trades made on a “downtick” in price. The up/down ratio is calculated by dividing the value of uptick trades by the value of downtick trades. Net money flow is the value of uptick trades minus the value of downtick trades. Our calculations are based on comprehensive, delayed quotes.

    Stock Money Flow

    Uptick/Downtick Trade Ratio

    Real-time U.S. stock quotes reflect trades reported through Nasdaq only.

    International stock quotes are delayed as per exchange requirements. Indexes may be real-time or delayed; refer to time stamps on index quote pages for information on delay times.

    Quote data, except U.S. stocks, provided by SIX Financial Information.

    Data is provided “as is” for informational purposes only and is not intended for trading purposes. SIX Financial Information (a) does not make any express or implied warranties of any kind regarding the data, including, without limitation, any warranty of merchantability or fitness for a particular purpose or use; and (b) shall not be liable for any errors, incompleteness, interruption or delay, action taken in reliance on any data, or for any damages resulting therefrom. Data may be intentionally delayed pursuant to supplier requirements.

    All of the mutual fund and ETF information contained in this display was supplied by Lipper, A Thomson Reuters Company, subject to the following: Copyright © Thomson Reuters. All rights reserved. Any copying, republication or redistribution of Lipper content, including by caching, framing or similar means, is expressly prohibited without the prior written consent of Lipper. Lipper shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

    Bond quotes are updated in real-time. Source: Tullett Prebon.

    Currency quotes are updated in real-time. Source: Tullet Prebon.

    Fundamental company data and analyst estimates provided by FactSet. Copyright FactSet Research Systems Inc. All rights reserved.


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , ,

    Leave a Comment

    Business Voice, VPS, Colocation – Internet Connectivity Service Seattle, Bellevue –


    Home Personal Services

    We offer a wide range of access options and services to residential customers and we have state of the art equipment and technology to provide fast and reliable connections for our customers. Our expert support staff is available to assist our residential customers with professional service to help with anything from getting connected to troubleshooting.

    Residential Connectivity Services:

    • Web Page Hosting with several options available for your personal page.
    • DSL Internet Services featuring exceptionally fast speeds
    • Dial-Up Internet provides an affordable solution for residential internet connections
    • TrueRing Home Phone with low prices and no set up fees

    Digital Home Phone

    Unlimited Calling only 24.99 /month

    • Keep your current number
    • Use your existing phone
    • No computer needed

    Personal Web Hosting

    Less than 3 a Month!

    • Unlimited space, bandwidth databases
    • Unlimited e-mail
    • FREE domain name

    If you are looking for VPS. business internet connectivity, or other services for your home or business in Bellevue, Redmond, or Seattle, you will find additional information about our residential and commercial services on our website.

    1994 2017, ISOMEDIA Inc.

    12842 Interurban Ave S, Seattle, Washington 98168


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Business Analytics – Digital Business #big #data #& #analytics


    Main menu

    7 Definitions of Big Data You Should Know About

    Faced with the ongoing confusion over the term ‘Big Data,’ here’s a handy – and somewhat cynical – guide to some of the key definitions that you might see out there.

    The first thing to note is that – despite what Wikipedia says – everybody in the industry generally agrees that Big Data isn’t just about having more data (since that’s just inevitable, and boring).

    (1) The Original Big Data

    Big Data as the three Vs: Volume, Velocity, and Variety. This is the most venerable and well-known definition, first coined by Doug Laney of Gartner over twelve years ago. Since then, many others have tried to take it to 11 with additional Vs including Validity, Veracity, Value, and Visibility.

    (2) Big Data as Technology

    Why did a 12-year old term suddenly zoom into the spotlight? It wasn t simply because we do indeed now have a lot more volume, velocity, and variety than a decade ago. Instead, it was fueled by new technology, and in particular the fast rise of open source technologies such as Hadoop and other NoSQL ways of storing and manipulating data.

    The users of these new tools needed a term that differentiated them from previous technologies, and–somehow–ended up settling on the woefully inadequate term Big Data. If you go to a big data conference, you can be assured that sessions featuring relational databases–no matter how many Vs they boast–will be in the minority.

    (3) Big Data as Data Distinctions

    The problem with big-data-as-technology is that (a) it s vague enough that every vendor in the industry jumped in to claim it for themselves and (b) everybody knew that they were supposed to elevate the debate and talk about something more business-y and useful.

    Here are two good attempts to help organizations understand why Big Data now is different from mere big data in the past:

    • Transactions, Interactions, and Observations. This one is from Shaun Connolly of Hortonworks. Transactions make up the majority of what we have collected, stored and analyzed in the past. Interactions are data that comes from things like people clicking on web pages. Observations are data collected automatically.
    • Process-Mediated Data, Human-Sourced Information, and Machine-Generated Data. This is brought to us by Barry Devlin. who co-wrote the first paper on data warehousing. It is basically the same as the above, but with clearer names.

    (4) Big Data as Signals

    This is another business-y approach that divides the world by intent and timing rather than the type of data, courtesy of SAP’s Steve Lucas. The old world is about transactions, and by the time these transactions are recorded, it s too late to do anything about them: companies are constantly managing out of the rear-view mirror . In the new world, companies can instead use new signal data to anticipate what s going to happen, and intervene to improve the situation.

    Examples include tracking brand sentiment on social media (if your likes fall off a cliff, your sales will surely follow) and predictive maintenance (complex algorithms determine when you need to replace an aircraft part, before the plane gets expensively stuck on the runway).

    (5) Big Data as Opportunity

    This one is from 451 Research s Matt Aslett and broadly defines big data as analyzing data that was previously ignored because of technology limitations. (OK, so technically, Matt used the term ‘Dark Data’ rather than Big Data, but it’s close enough). This is my personal favorite, since I believe it lines up best with how the term is actually used in most articles and discussions.

    (6) Big Data as Metaphor

    In his wonderful book The Human Face of Big Data. journalist Rick Smolan says big data is “the process of helping the planet grow a nervous system, one in which we are just another, human, type of sensor.” Deep, huh? But by the time you’ve read some of stories in the book or the mobile app, you’ll be nodding your head in agreement.

    (7) Big Data as New Term for Old Stuff

    This is the laziest and most cynical use of the term, where projects that were possible using previous technology, and would have been called BI or analytics in the past have suddenly been rebaptized in a fairly blatant attempt to jump on the big data bandwagon.

    And finally, one bonus, fairly useless definition of big data. Still not enough for you? Here s 30+ more and counting.

    The bottom line: whatever the disagreements over the definition, everybody agrees on one thing: big data is a big deal, and will lead to huge new opportunities in the coming years.

    Share this:

    Post navigation


    Posted In: NEWS

    Tags: ,

    Leave a Comment

    Mysql can t create #restoring #possible #half #written #data #pages #from


    01-09-2008 07:14 PM

    Mysql can’t create/write to

    Ok. having some issues with getting Mysql up and running.
    the system..
    PII box with 512 ram
    Fedora 7 (Moonshine)
    Mysql-5.0.45-linux-i686 (that is the build I downloaded.

    Everytime I try to run the mysqld_safe script I get
    nohub: ignoring input and redirecting stderr to stdout
    Starting mysqld daemon with databases from /var/lib/mysql
    STOPPING server from pid file /var/run/mysqld/

    Now after extensive searching through the data bases here I ended up in /var/log/mysqld.log.
    Now I see when I started the server each time and what happened. Each time mysqld started, I get a database was not shut down properly, then a bunch a stuff about restoring half written pages, apply batch of log records, progress in percents followed by a bunch of numbers 3-99, apply batch completed (everything up till this point I am not too worried about because I think that the next 2 lines explains why the data base was not shut down properly.
    [ERROR] /usr/local/mysql/bin/mysqld: can’t create/write to file ‘/var/run/mysqld/’ (Errcode: 2)
    [ERROR] Can’t start server; can’t create PID file no such file or directory.
    mysqld ended

    (I assume that the 080108 and time stamps were not important so have eliminated them.)

    When I look for /var/run/mysqld/ it does not exist at all, nor does the directory /var/run/mysqld.

    Now does this mean I missed something in the install process, or is there a setting somewhere that I have wrong. Any help would be greatly appreciated. Also I hope this was the right forum to put this in (it was either this one or the server forum, hopefully a mod will move if it should be in the server forum to prevent me from double posting. thanks.)

    01-09-2008 07:52 PM

    Here is the first 2 instances in the log.

    080108 14:56:04 mysqld started
    nohup: ignoring input
    InnoDB: The first specified data file ./ibdata1 did not exist:
    InnoDB: a new database to be created!
    080108 14:56:04 InnoDB: Setting file ./ibdata1 size to 10 MB
    InnoDB: Database physically writes the file full: wait.
    080108 14:56:05 InnoDB: Log file ./ib_logfile0 did not exist: new to be created
    InnoDB: Setting log file ./ib_logfile0 size to 5 MB
    InnoDB: Database physically writes the file full: wait.
    080108 14:56:05 InnoDB: Log file ./ib_logfile1 did not exist: new to be created
    InnoDB: Setting log file ./ib_logfile1 size to 5 MB
    InnoDB: Database physically writes the file full: wait.
    InnoDB: Doublewrite buffer not found: creating new
    InnoDB: Doublewrite buffer created
    InnoDB: Creating foreign key constraint system tables
    InnoDB: Foreign key constraint system tables created
    080108 14:56:06 InnoDB: Started; log sequence number 0 0
    080108 14:56:06 [ERROR] /usr/local/mysql/bin/mysqld: Can’t create/write to file ‘/var/run/mysqld/’ (Errcode: 2)
    080108 14:56:06 [ERROR] Can’t start server: can’t create PID file: No such file or directory
    080108 14:56:06 mysqld ended

    080108 15:00:32 mysqld started
    nohup: ignoring input
    080108 15:00:33 InnoDB: Database was not shut down normally!
    InnoDB: Starting crash recovery.
    InnoDB: Reading tablespace information from the .ibd files.
    InnoDB: Restoring possible half-written data pages from the doublewrite
    InnoDB: buffer.
    080108 15:00:33 InnoDB: Starting log scan based on checkpoint at
    InnoDB: log sequence number 0 36808.
    InnoDB: Doing recovery: scanned up to log sequence number 0 43655
    080108 15:00:33 InnoDB: Starting an apply batch of log records to the database.
    InnoDB: Progress in percents: 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99
    InnoDB: Apply batch completed
    080108 15:00:33 InnoDB: Started; log sequence number 0 43655
    080108 15:00:33 [ERROR] /usr/local/mysql/bin/mysqld: Can’t create/write to file ‘/var/run/mysqld/’ (Errcode: 2)
    080108 15:00:33 [ERROR] Can’t start server: can’t create PID file: No such file or directory
    080108 15:00:33 mysqld ended

    and the last 2 incase that helps any.

    080109 19:34:00 mysqld started
    nohup: ignoring input
    080109 19:34:01 InnoDB: Database was not shut down normally!
    InnoDB: Starting crash recovery.
    InnoDB: Reading tablespace information from the .ibd files.
    InnoDB: Restoring possible half-written data pages from the doublewrite
    InnoDB: buffer.
    080109 19:34:01 InnoDB: Starting log scan based on checkpoint at
    InnoDB: log sequence number 0 36808.
    InnoDB: Doing recovery: scanned up to log sequence number 0 43655
    080109 19:34:01 InnoDB: Starting an apply batch of log records to the database.
    InnoDB: Progress in percents: 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99
    InnoDB: Apply batch completed
    080109 19:34:01 InnoDB: Started; log sequence number 0 43655
    080109 19:34:01 [ERROR] /usr/local/mysql/bin/mysqld: Can’t create/write to file ‘/var/run/mysqld/’ (Errcode: 2)
    080109 19:34:01 [ERROR] Can’t start server: can’t create PID file: No such file or directory
    080109 19:34:01 mysqld ended

    080109 19:59:02 mysqld started
    nohup: ignoring input
    080109 19:59:02 InnoDB: Database was not shut down normally!
    InnoDB: Starting crash recovery.
    InnoDB: Reading tablespace information from the .ibd files.
    InnoDB: Restoring possible half-written data pages from the doublewrite
    InnoDB: buffer.
    080109 19:59:02 InnoDB: Starting log scan based on checkpoint at
    InnoDB: log sequence number 0 36808.
    InnoDB: Doing recovery: scanned up to log sequence number 0 43655
    080109 19:59:02 InnoDB: Starting an apply batch of log records to the database.
    InnoDB: Progress in percents: 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99
    InnoDB: Apply batch completed
    080109 19:59:03 InnoDB: Started; log sequence number 0 43655
    080109 19:59:03 [ERROR] /usr/local/mysql/bin/mysqld: Can’t create/write to file ‘/var/run/mysqld/’ (Errcode: 2)
    080109 19:59:03 [ERROR] Can’t start server: can’t create PID file: No such file or directory
    080109 19:59:03 mysqld ended

    01-09-2008 07:54 PM

    Originally Posted by pickuprover (Post 3017295)

    running as mysql as user (all the permissions seem to be with mysql user when I did a search on ownership)
    I tried it with root and got the same message (thought I should get a permission denied when I tried to start it with root as mysql is the owner of the program and all files.)

    No if you did it as root, you wont get permission denied, that don’t happen to root.

    And I’m sorry, somehow I missed this when I first read it, but by all means if you don’t have the /var/run/mysqld directory, go ahead and create it, and make sure mysql.mysql owns it. That does in fact seem to be what its complaining about.

    01-09-2008 08:03 PM

    Thank-you, it is now up and running. yay. I was soo close to on my own, but thankfully there are forums out there. KnightHawk, I thank you very much.
    I am so glad I switched to Linux, in less than a week since I downloaded it onto the old computer I feel like I know 20 times more about my operating system than I ever did with Windows. once again, thanks.

    01-14-2008 08:58 PM

    hi there! i’m a newbie in installing MySQL on a linux box. I can’t start my MySQL (Timeout error occurred trying to start MySQL Daemon. – i got this error) and when i look at the /var/log/mysqld.log i got the following error.

    080115 10:22:22 mysqld started
    080115 10:22:26 InnoDB: Started; log sequence number 0 43634
    080115 10:22:26 [ERROR] /usr/libexec/mysqld: Can’t create/write to file ‘/var/run/mysqld/’ (Errcode: 13)
    080115 10:22:26 [ERROR] Can’t start server: can’t create PID file: Permission denied
    080115 10:22:26 mysqld ended

    this is my /etc/my.cnf

    # Default to using old password format for compatibility with mysql 3.x
    # clients (those using the mysqlclient10 compatibility package).



    thanks in advance!


    Posted In: NEWS

    Tags: , , , , , , , ,

    Leave a Comment

    Switch’s Las Vegas Data Center Stronghold Reaches North of 2 Million


    Switch’s Las Vegas Data Center Stronghold Reaches North of 2 Million Square Feet

    Yevgeniy Sverdlik on June 15, 2017

    Switch has officially launched the latest massive facility on its homebase Las Vegas data center campus, bringing its total capacity in Sin City to more than 2 million square feet and about 315MW.

    Switch, the largest data center provider in Vegas, recently started expanding to other markets. Known for its proprietary data center design, futuristic interiors, and ex-military security guards armed with machine guns, the company builds hyper-scale colocation facilities and lists among its top customers Amazon Web Services, eBay, Hulu, and NASA.

    Its latest Las Vegas 10 data center adds about 350,000 square feet of data center space and can provide up to 40MW of power. It is designed to the same specifications as the previously existing Las Vegas 8 and Las Vegas 9 facilities.

    Recommended: Switch Gets Tier IV for Second Las Vegas Data Center

    The design, according to Switch, is a brain child of its founder and CEO, Rob Roy, who designed everything from mechanical and electrical systems to the roof and conference-room interiors. The company leans heavily on its data center design for setting itself apart from competitors, and earlier this month announced its own design standard, called Tier 5 Platinum, which includes a long list of characteristics that aren’t covered by the industry’s most widely used and recognized data center design rating system created by the Uptime Institute.

    Switch had portions of Las Vegas 8 and 9 data centers certified by Uptime. Both received Tier IV Gold certification, the highest rating in the system designed to evaluate data center infrastructure reliability. Switch said it would not pursue Uptime certification for any of its future facilities because the system doesn’t take into account elements such as network carrier redundancy and availability of renewable energy, among many others. It also complained that Uptime doesn’t do enough to police misuse of its terminology by data center providers.

    Switch’s current design is called Switch MOD 250 (Modularly Optimized Design). Modularity enables data center providers to expand capacity in a building quickly by installing standardized, pre-fabricated infrastructure components.

    The company launched its first non-Las Vegas data center in February of this year. The first building on its Citadel Campus outside of Reno, Nevada, has eBay as the anchor tenant and measures 1.3 million square feet; it can support up to 130MW of power. The following month Switch announced the launch of a data center in Michigan. inside a re-purposed pyramid-shaped former office building, and in May said it had secured land to build data centers in Atlanta .

    The company is also building data centers in Italy and Thailand. Both international projects are partnerships with local investors.


    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    Jefferson Health forms as merger closes, sets aggressive innovation plans, Healthcare


    Jefferson Health forms as merger closes, sets aggressive innovation plans

    Healthcare data sets

    Healthcare data setsThomas Jefferson University Hospital photo by Andy Gradel via Wikipedia

    Thomas Jefferson University Hospitals and Abington Health System have completed their merger, forming Jefferson Health to compete with Philadelphia’s University of Pennsylvania Health System, the largest in the city. The question now is whether the system will be as much of an industry disruptor as CEO Stephen Klasko, MD, has promised.

    “Jefferson Health is truly different, because now patients can choose an organization that marries the nationally recognized and renowned academic medical center of Thomas Jefferson University with the outstanding clinical reputation and community connectedness of Abington,” said Klasko.

    Jefferson Health, with a medical school and five hospitals, is pursuing a mission of education, research and advanced medicine. It’s on a slightly smaller scale than competitor Penn Medicine, which is researching diseases and treatments with $409 million in NIH funding, and offering access to clinical trials and new treatments through a soon-to-be five-hospital system with the planned acquisition of Lancaster General Health on the horizon.

    Jefferson Health has been designed to extend the expertise of Jefferson clinicians to suburbanites through telehealth, urgent care centers and Abington’s three community hospitals and clinics, rather than set up a regional referral network for an academic medical center to keep doing its best work at an urban hospital complex, Klasko said.

    “This new urban-suburban hub-and-hub model we believe is the first in the country,” Kasko said. “If you look at a lot of mergers, it’s a hub and spoke, an academic medical center in the city, and people have to travel and it increases the costs.”

    Jefferson Health’s goal, Klasko said at a press conference, is “going from a Blockbuster model to Netflix model, bringing Jefferson care and Jefferson and Abington care to the patients as close as they can be.”

    The new system, spanning Philadelphia and its northern suburbs, features five hospitals (including Abington Memorial on the edge of the city and Jefferson’s downtown 950-bed University Hospital), nine outpatient centers and four urgent care centers, all staffed by 19,000 employees and 3,370 physicians. Among the executives at the new health system are Praveen Chopra, chief information and transformative innovative environment officer; Anne Boland Docimo, MD, chief medical officer; and John Ekarius, chief strategy officer. The board includes 11 trustees from the old Jefferson, 11 from the old Abington, plus two independent members.

    Klasko said Jefferson and Abington did not really have to combine to survive. Among the dozen-plus health systems and independent hospitals in metropolitan Philly, both were in solid financials prior to the merger. Jefferson had a net income of $103 million on $2.1 billion in revenue in fiscal year 2014, while Abington brought in $17.6 million on $774 million in revenue.

    But last summer, when Klasko dined with Larry Merlis, Abington’s CEO and COO of the new system, there was a connection that suggested the two organizations shared a vision for the future. “After the glass of wine, it became more obvious that Jefferson and Abington would be a great fit,” Klasko said.

    The Netflix model

    A 61-year-old OB-GYN, MBA and Philly native, Klasko has done quite a bit in stoking Jefferson’s brand in his two years on the job as CEO. He lambasts the arcane, dysfunction aspects of American healthcare — from the six-figure debt for patients to phone call scheduling systems,— and points to consumer technology as inspiration. “Why can I be in my pajamas the day after Thanksgiving watching Game of Thrones and doing all my holiday shopping, but if I have a stomach ache, I still have to get on the phone and hopefully somebody will see me two days from now?” Klasko said in an interview earlier this year.

    “I see this as an absolutely seminal moment in healthcare,” he said. “We’re going to change the DNA of healthcare one physician at a time,” he also said in a TEDx Talk, outlining a vision for “Jefferson 3.0.”

    Klasko has been saying that American healthcare needs to change for the better part of a decade, since he was head of the University of South Florida College of Medicine. His record there was mixed. One former colleague told Philadelphia Magazine that Klasko’s “disruptive innovation” agenda was seen as “just disruptive.”

    At the Villages retirement community, Klasko spearheaded a $4 million USF medical clinic with the goal making it “America’s Healthiest Hometown.” USF pulled out the project last June, taking a $5 million loss. Another initiative, the $38 million Center for Advanced Medical Learning and Simulation, lost $2 million for the 2013-14 fiscal year, but is still seen as part of needed changes in the ways medical students learn to become doctors, nurses and caregivers.

    Competing in Philly

    At Jefferson, Klasko said he has a mandate to evolve the enterprise, which “means everything from literally changing how we select and educate students” to “changing the most expensive place to can get care, the urban academic medical center,” he said. “We believe that 65 percent or so of patients who end up in a hospital’s emergency rooms don’t need to be there, and not just because it could not just be five hours of a patient’s life but $1,500 of their deductible.”

    The hub-and-hub health system can be the way to “get patients to the most efficient and effective place for them to get care,” Klasko said. “That might be their home with telehealth. That might a Jeff Connect urgent care center. That might be a freestanding ER, or if they’re really, really sick, they should go to the most expensive, high acuity ER at the hospital.”

    Whether Klasko’s ideas and Jefferson’s vision translate into more affordable healthcare remains to be seen, said Robert Field, a Drexel University health researcher who writes the Field Clinic column in the Philly Inquirer. For one thing, Field said, neither Jefferson nor any other regional provider system has made headway in improving patient billing, although the region’s largest insurer, Independence Blue Cross, is trying to make progress on the price shopping front.

    Jefferson is also not the only area health system looking to create an integrated health network spanning the suburbs and center city Philadelphia. Jefferson bought the naming rights to a downtown train station, but all across the region, residents are beckoned with advertising for systems such as Temple Health, Einstein Healthcare Network, Main Line Health, Doylestown Health, Jefferson and Penn Medicine. The competition between Penn Medicine and Jefferson as the largest and second largest academic medical centers in the region has been explicit, though still friendly, said Field, who worked in management at the Penn’s health system in the late 1990s.

    Jefferson and Abington have a slight advantage on the retail clinic approach. Like other metro areas, Philly has dozens of urgent-care clinics, though only a few are operated by major hospital systems.

    That, along with the expanded telehealth options Jefferson is rolling out with the American Well on-demand telemedicine company, could put Jefferson ahead in an area that Klasko thinks is growing more quickly than some healthcare executives might like to acknowledge.

    In 2010, Klasko and a group of academic medical center leaders were at a conference when Walgreens announced the launch of its walk-in clinics. Klasko remembered many of the deans laughing it off: “What a stupid business model. Who’s going to go to a drugstore to have their kid be seen with an earache?”

    Billions of dollars later, Klasko said, retail primary and urgent care clinics are one of the fastest growing parts of healthcare, and some providers complain that they are taking away high-margin, low-acuity services.

    “The reason isn’t because everybody was excited about going to the drugstore to have their kid be seen. The reason was, back then, if your kid had an earache you would be told by your pediatrician in many places that we could see you in two days,” Klasko said. “Well by then, your kid was either better or had gone to the emergency room.”


    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    IT Architecture For Dummies Cheat Sheet #common #data #security #architecture


    IT Architecture For Dummies Cheat Sheet

    When planning and implementing your IT architecture, ease the process by reviewing critical information: major IT architecture concepts such as common IT architecture tasks, standardizing technology, and consolidating and centralizing technology resources; collaboration solutions to institute across the enterprise; and system maintenance processes that can be automated to help you increase savings and reduce administrative overhead.

    Identifying Common IT Architecture Tasks

    Taking on an IT architecture project means dealing with myriad detailed tasks. No matter the nature of your IT architecture project, however, be sure to cover this abbreviated checklist of common, high-level tasks:

    Eliminate resource silos: Getting rid of separate information resource silos through consolidation and centralization makes many other projects possible.

    Identify data requirements: Determine the type of data your organization uses, its location and users, as well as any associated business requirements.

    Identify and integrate existing resources: Identify resources currently in use and determine whether they should be integrated into the new architecture, replaced with an alternate solution, or retired.

    Define technical standards: Define the rules and guidelines that your organization will use when making decisions regarding information technology.

    Identify security requirements: Implementation can t start until the security requirements have been identified. Remember, information is an asset to be protected.

    Justify changes: Ensure that changes provide value to your organization in some fashion.

    IT Architecture: Standardizing Technology

    Standardization of technology is a common part of IT architecture projects. A standardized technology reduces complexity and offers benefits such as cost savings through economy of scale, ease of integration, improved efficiency, greater support options, and simplification of future control. Some common targets for standardization include

    User workstation environments: This includes desktop hardware, operating system, and user productivity suites.

    Software development: Consider standardizing not only programming languages, but also software development practices.

    Database management systems: Try to standardize on a single database platform, such as Oracle, Microsoft SQL, mySQL, or PostgreSQL.

    IT Architecture: Consolidating and Centralizing Technology Resources

    A good IT architecture plan improves efficiencies. When your IT architecture program includes consolidation and centralization of technology resources, particularly in the data center, you gain improved resource use, document recovery, security, and service delivery; increased data availability; and reduced complexity. Some elements that you can consolidate or centralize include

    IT personnel: Consolidate IT personnel into centrally managed, focused support groups based on need and skill sets.

    Servers: The number of physical servers can be reduced by implementing virtualization or simply eliminating redundant functionality.

    File storage: Get local file repositories off multiple file servers and onto a centralized storage solution such as a storage area network (SAN).

    Directory services: Provide a common directory service for authentication or implement a single sign-on or federated authentication solution to bridge multiple directories.

    IT Architecture: Collaborating Across the Enterprise

    Collaboration solutions facilitate IT architecture teamwork by allowing team members to communicate, share data, and create repositories of collective intelligence, regardless of location or scheduling complications. They may decrease travel and telephone costs significantly. In IT architecture, common collaboration solutions include

    Social networking: Social networking tools, such as chat, blogs, and forums, provide new and flexible methods for sharing information.

    Groupware: Groupware allows employees to work together regardless of location by using integrated tools that facilitate communication, conferencing, and collaborative management.

    Enterprise portal: Portals aggregate content from multiple sources, bringing it all into one place for easy access and creating a single point of contact.

    IT Architecture: Automating System Maintenance

    Part of IT architecture includes improving efficiencies by restructuring enterprise resources. The more system maintenance processes that you automate in the IT architecture, the greater cost savings you can realize from reduced administrative overhead and support.

    Operating system patches/updates: Most operating systems have some type of native automated patch management solution, and third-party solutions are also available.

    Application updates: Some applications have the ability to update themselves automatically, while others may be updated through logon scripts or push technology.

    Anti-malware updates and scans: Use enterprise-level anti-malware solutions that update frequently and scan regularly to improve security.


    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    ForensiT Domain Migration #windows, #data, #migration, #solutions, #technology, #developer, #system, #it,


    User Profile Wizard 3.12

    Simple. Scalable. Low cost

    User Profile Wizard 3.12 is the latest version of ForensiT s powerful workstation migration tool. User Profile Wizard will migrate your current user profile to your new user account so that you can keep all your existing data and settings.

    Large-scale migration made easy

    User Profile Wizard has been used to automatically migrate hundreds of thousands of workstations to new domains. It can be used to migrate workstations to a new domain from any existing Windows network, or from a Novell NDS network; it can join standalone computers to a domain for the first time, or migrate workstations from a domain back to a workgroup.

    No need to lose personal data and settings

    A User Profile is where Windows stores your stuff. Normally, when you change your user account Windows will create a new profile for you, and you lose all your data and settings – your “My Documents”, “My Pictures” and “My Music” files and all the other information that makes your computer personal to you, like your desktop wallpaper, Internet favorites and the lists of documents you’ve recently opened.

    User Profile Wizard is an easy-to-use migration tool that means this doesn’t need to happen – you can simply migrate your original profile to your new user account. User Profile Wizard does not move, copy or delete any data. Instead it configures the profile “in place” so that it can be used by your new user account. This makes the process both very fast and very safe.

    With the User Profile Wizard Deployment Kit you can build a scalable, enterprise solution to automatically migrate tens of thousands of workstations.

    Scalable – up or down

    Unlike some alternatives, User Profile Wizard does not assume that there is an enterprise directory in place. It supports all environments from Small Business Server through to a Global Domain Consolidation.


    • Migrates all user profile data and settings on Windows XP/Windows 7/8 and Windows 10
    • Automatically joins a machine to a new domain
    • Supports domain migrations over a VPN
    • Supports all Active Directory and Samba domains
    • Migrates from a domain back to a workgroup
    • Includes Enterprise strength scripting support
    • Supports push migrations of remote machines
    • Tried and trusted – over one million licenses sold

    Corporate and Professional Editions

    User Profile Wizard comes in two editions. Read our User Profile Wizard Feature Comparison to find out what features are availble in the Corporate and Professional editions. The Corporate Edition is licensed per workstation. The Professional Edition is licensed per technician.

    More information


    Posted In: NEWS

    Tags: , , , , , , , , , , ,

    Leave a Comment

    What is Microsoft SQL Server Parallel Data Warehouse (SQL Server PDW)?


    Microsoft SQL Server Parallel Data Warehouse (SQL Server PDW)

    Microsoft SQL Server Parallel Data Warehouse (SQL Server PDW) is a pre-built data warehouse appliance that includes Microsoft SQL Server database software, third-party server hardware and networking components.

    Download this free guide

    SQL Server Import Export Wizard Step-By-Step Tutorial

    In this expert-led tutorial, senior DBA and technical trainer Basit Farooq provides a step-by-step guide for using the SQL Server Import and Export Wizard to transfer data between SQL Server databases and Microsoft Excel worksheets.

    By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

    You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy .

    Parallel Data Warehouse has a massively parallel processing (MPP ) architecture. As such, Microsoft has billed Parallel Data Warehouse as being well-tuned for big data processing.

    Like other server appliances, one of the main features of Parallel Data Warehouse is that it is easier to set up when compared to buying commodity hardware and software and configuring them in house. There are currently two versions of Parallel Data Warehouse: one uses Hewlett-Packard servers and the other uses Dell hardware.

    This was last updated in August 2013

    Continue Reading About Microsoft SQL Server Parallel Data Warehouse (SQL Server PDW)

    Related Terms

    columnstore index A columnstore index is a type of index used to store, manage and retrieve data stored in a columnar format in a database. See complete definition database (DB) A database is a collection of information that is organized so that it can be easily accessed, managed and updated. See complete definition SQL-on-Hadoop SQL-on-Hadoop is a class of analytical application tools that combine established SQL-style querying with newer Hadoop data. See complete definition

    Dig Deeper on SQL Server Data Warehousing


    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Data Center Manager Interview Questions #data #center #interview #questions, #data #center


    Data Center Manager interview questions

    Data Center Manager interview questions for Behavioral interview :
    Are you seeking employment in a company of a certain size?
    Why were you given these promotions at your present or last company?
    What were the development steps on your last performance appraisal?
    On what do you spend your disposable income?
    What would you consider a conducive job atmosphere?
    Describe a situation in which you lead a team.
    Why did you leave that job?

    Data Center Manager interview Questions

    Data Center Manager interview Answers

    Data Center Manager interview Tips

    Data Center Manager interview Sites

    Data Center Manager interview questions for General job interview :
    What unique experiences separate you from other candidates?
    What do you do in leisure/spare time?
    What qualities would you look for if hiring someone?
    What were your responsibilities?
    What aspects of working with others do you find least enjoyable?
    Why did you leave that job?
    What is your greatest weakness?

    Data Center Manager interview questions for Panel job interview :
    – What is the difference between a manager and a leader?
    – How would your teacher or other Data Center Manager describe you?
    – Do you prefer to work independently or on a team?
    – Give an example of a time you successfully worked as Data Center Manager on a team.
    – Time when you have encountered conflict in the workplace.
    – Give me an example of when you have done more than required in a course.
    – How did you get work assignments at your most recent employer?

    Data Center Manager interview questions for Phone interview :
    What do you do if you can’t solve a problem on your own?
    What expectations do you have for your future employer?
    Do you check your messages while on vacation?
    What is your definition of intelligence?
    Are you willing to go where the company sends you?
    How have you increased profits in your past jobs?
    What major problem have you encountered and how did you deal with it?

    Difficult Data Center Manager interview questions :
    You seem overqualified for this position, what do you think?
    How quickly can you adapt to a new work environment?
    Do you have a geographic preference?
    What type of salary are you worth and why?
    Tell me something that you are not proud of?
    What personal characteristics do you think lead to success in this job?
    Are you looking for a permanent or temporary position at the company?

    Data Center Manager interview questions for Group interview :
    – What irritates you about other people?
    – What are the qualities of a good Data Center Manager?
    – Describe a situation in which you had to collect information.
    – What have you learned from your past jobs that related to Data Center Manager?
    – What was your most difficult decision?
    – Have you handled a difficult situation with a co-worker? How?
    – What is your greatest failure, and what did you learn from it?


    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    Better Solutions #telephone #company, #atc, #telecommunications, #clec, #long #distance, #phone #service,


    Better Solutions. Better Service. Better Experience.

    Consultative Solutions, Unparalleled Service

    About ATC

    ATC is an end-to-end telecommunications consulting and management company.

    American Telephone Company provides quality telecommunications solutions delivered by caring, knowledgeable professionals. Our organization is committed to always doing “what’s best” for our customers, employees and partners.

    We pride ourselves on providing customized cost-effective solutions to enterprises of all sizes. We offer a wide range of telecom solutions and will help you select the services best suited to your business needs. Whether you want to keep your existing service, upgrade, or purchase an entirely new system, ATC will expertly guide you through the process.


    American Telephone Company is proud to offer telecommunications solutions and services that are second to none in their quality, versatility and cost competitiveness. ATC has partnered with a variety of facilities based carriers that include RBOC’s, Broadband Providers and CLEC’s to offer our customers a complete variety of turnkey solutions. The ATC product portfolio offers solutions that will help your business maximize profit while minimizing hassle and cost.


    We’ll come to your office, or planned location if you’re moving, for a no-cost, no-obligation analysis of your current phone system, hardware and cabling. We’ll also conduct an audit of your previous phone bills to determine areas to reduce costs.


    With our vast industry knowledge, we know which solutions offer the most value for your needs. We will ensure that you get a cost-effective plan where you pay only for the services you require.


    If you’re relocating, we’ll coordinate with architects, building managers and other parties to ensure that your telecom system is fully up and running on the day you move in.


    Our on-site technicians will handle all the details to switch service from your current telecom provider so you can stay focused on running your business. In most cases, you can even keep your current phone number!

    Request More Information


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Data Recovery and Disk Repair Service Comparison Table #best #data #recovery


    Data Recovery and Disk Repair: A Guide to Software and Services

    Everyone on this list without exception uses PC-3k. I know this for a fact.
    When you askedabout their “advanced recovery” you should have asked if they design their own imaging hardware/controllers.
    Everything else can mean just fluff like spacers for HR changers(Gilware) to things like custom software tools(which everyone should have).

    Going down the list here’s some more information clarification for the readers:
    Hard Drive Manufacturers:
    Western Digital lists everyone here because they get paid commissions and want the greatest amount of choices. Platinum Partners on the WD partner site like Drivesavers and Ontrack pay monthly for that placement.

    Hitachi and G-Technology who are wholly owned subsidiaries of WD have a separate partner site where they separately list partners(Data rescue Center, Ontrack, Drivesavers, etc. ).

    Toshiiba has an internal support page, Seagate uses there own SRS for Data Recovery.

    IN GENERAL; the Drive manufacturers support organizations know little to nothing about the data recovery process and often make things worse in their attempt to troubleshoot.

    A good example(though by far not the only one) is G-Tech’s relationship with Data rescue center where Data rescue is a reseller of G-Tech’s drive and perpetuates bad assumptions about recovery to peddle their software(they were a software company for 20 years before opening a lab).

    Also. “Personal data on a damaged hard disk can be restored, he says, without needing to open any files to confirm the restoration”.

    This is absolutely not true either and this is just a business model decision.

    What ends up happening is Ontrack’s end users get “compelted” recovery projects with corrupt data and no recourse.
    you would think this happens only for things like individual documents(where you obviously can’t tell if there’s corruption just by staring at a hex dump) but even things like Virtual Machines/databases being unatachable or corrupt come out of this kind of policy by Ontrack(and others of course).

    The raw numbers:

    I have a lot of skepticism when it comes to the number of technicians being listed here because I know what a serious top tier Lab like SRS9at least before this year) looks like in terms of it’s engineers.

    Also I have a BIG problem with any lab that refers to it’s engineers as “repair. (something)”. data recovery involves the repair of drives incidentally. and there’s a significant distinction in professionalism and ethics from those that actually TRY to repair drives and data recovery engineers.

    There’s a lot more I could talk about here and notable companies that are missing(and some that are oddly inconsistent from the RAID recovery article list), but frankly that’s kind of the nature of the industry. unless you’ve been in the trenches for a while, you cna’t really peel back the layers completely.

    You did a decent job here, though. Better than i’ve seen as of yet.


    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    Offline Data Typing Job, Easy offline Data Typing Job #offline #data


    • 0353-2461473
    • Facebook
    • +91-9434019000

    We at Universal Info Service (ISO 9001:2015 Certified), would like to inform you that – it has came to our notice that few people are being misguided by two companies name styled as Universal info services, from Karnataka and Universal info services, Gujarat. They are using similar name styles as our Universal Info Service. We here by declare that we don’t have any direct or indirect relationship with those companies and we are not liable for any loss or damages occurred to any body due to transaction with those companies. We also declare that UIS and Universal Info Service are the Trade Marks of our headquartered Siliguri Universal Info Service, Near- Bela Bakery, A.P.C Sarani, Deshbandhupara, Siliguri-04, West Bengal, India. If you have any doubts againts our company then just call us at 0353-2461473, (M) 09434019000 Good News for Facebook User- Our company will hiring 500 fresh Candidates for Data Entry Operator on May’2017, so interested Male/Female candidates can apply at Get Latest Job details SMS NAME SPACE EMAIL ID to- 9434019000

    Introduction:-There are more India’s company are going to selling the E-Book through internet. Now days the Online Business is growing in India very fast. So we are start the offline Data Entry Content/ Document editing / Proof Reading ) Job. The basic work is typing in Ms-Word correction the mistake word.

    As a data proofreader, you will get assignment to read through manuscripts and Websites to look for grammar and spelling errors. You will be proofreading the following. Dissertations, Essays, Research reports, Applications Novels, Short stories, Screenplays, Scripts, Articles, Books, Manuscripts, Proposals, Business plans, Presentations, Advertising copies, press releases, Newsletters, Resumes, Cover letters, Dating profiles, Personal statements, Website text, Auto responders, Forms and letters.

    If you have good grammar and spelling, this is a great opportunity. You can make very good money doing this type of work all in the comfort of your own home. Out of all the programs I offer, this is the only one that will requires testing and certification. I can help you to get certified. After you are certified the opportunities are endless and pay from Rs.8/- to 12/- INR per assignment for online and off-line proofreading opportunities. Pay will vary depending whether you work off-line.

    Though most people are confident using computers and software such as Microsoft Word and Works to spell and grammar check articles, books, newspapers, magazines, course work, leaflets, pamphlets, instruction manuals, etc there is still a demand for work from home proofreaders and copy editors. This work involves checking a manuscript and typescript galley and page proof
    This article will discuss how you can earn from proofreading, the advantages and disadvantages of working as a proofreader and where to find employment as a freelance proofreader. There is also an excellent recommended course for those who wish to gain a qualification in proofreading. For typing, grammar and spelling errors by the author, the copy editor and also the typesetter. Some editors and publishers also ask their proofreaders to spot factual mistakes in the editorial and any potentially libellous statements.

    1. The Allotment of job is purely contractual work for the duration is as per plan, and is not, in any way related to employment directly or indirectly. Request once made not transferable.

    2. Universal Info Service will be activate the user account only after receiving the full registration fees i.e. after receipt of Cash / Demand Draft or Money Order, Pay order/ upon realization of payment. No refund of any kind shall be made by the company.

    3. The assignments will be provided by Universal Info Service in Zip File Format only. The company will not accept done work in any other format. In this case user account will be terminated, and we will not be responsible for this. Mention Registration Number and file name clearly in the same manner that has been given in Technical Instructions. The processed data work should be returned under the given time frame described in Project Detail to Universal Info Service otherwise user account can be Terminated.

    4. The Company’s system will check the accuracy of completed data and all concerned outputs shall be notified about the same through dvr (Data Verification Report) via email.

    5. No dispute shall be entertained regarding Data Verification Report. The accuracy will be decided by the technical officials of the company and is final and cannot be challenged.

    6. You are not allowed to use any software for converting image file to MS-Word. If found we will terminate you. Because when you use software’s it changes the Ms-Word file codes which is not visible to us. Also these files will be immediately rejected by company systems.

    7. All files will be .jpeg files, in Zip Format. Just click the Zip files and files will be saved on your PC. These .jpeg/.jpg can be easily open on any computer.

    8. ACCURACY IS CALCULATED:- Here per image file you are allowed to make at the most 6 mistakes. If you make more than 5 mistakes in any single image file than that page will be disqualified. Accuracy is calculated as follows:-

    Total Image files – Total Disqualified image files

    Total Image files

    9. Minimum 94 % accuracy allowed for getting the payment, less than 94 % accuracy is not allowed any payment.

    9. Minimum 94% accuracy allowed for getting the payment, less than 94% accuracy is not allowed any payment.

    10. Payments are made every month between the 7th and the 15th day. In case of non receipt of payment, Re-payment is made on 22nd of every month.

    Note: If you have any further query about our data entry services, you can email us at [email protected]

    Complaint and Jurisdiction:-In the event of any dispute or difference arising between the candidates (User and Company) here to relating to or arising out of this terms, including the implementation, execution interpretation, rectification, validity, enforceability, termination or rescission there of. including the rights, obligations or liabilities of the parties (user and company) here to. the same will be adjudicated and determined by arbitration .The Indian arbitration and conciliation act, 1996 or any statutory amendment or re-enactment there of is force in India, shall govern the reference. Either party shall appoint their respective arbitrator or the arbitrators thus appointed should appoint the third arbitrator who shall function as the presiding arbitrator. The venue of arbitration shall be Coochbehar, West Bengal state only. The courts in the city of Coochbehar, West Bengal shall have exclusive jurisdiction entertain, try and determine the same.

    (Given below the Offline Data Entry Job Demo work, so click in link for download the demo work, it will take few time for download

    Tags: Offline Data Typing Job, Easy offline Data Typing Job


    Monthly Income Rs.35,000/-,Work from home on PC, Laptop or Mobile, Registration Free, Qualification 12+

    Universal Info Service (India based) can show you how to work from home

    Data’s which require you to be online i.e to be connected to internet for work

    Get in touch

    Mobile numbers for information and Landline Numbers are for customer care

    • 0353-2461473
    • 0353-2110484
    • +91-9434019000
    • +91-9474425752
    • Universal Info Service
      Near Bela Bakery, APC Sarani
      Deshbandhu Para
      Siliguri, WB 734004

    Universal Info Service. All rights reserved.


    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    Data recovery Maharashtra #data #recovery #maharashtra,hard #disk #data #recovery #maharashtra,data #recovery


    DATA RECOVERY Maharashtra(+919772846167 / +919772846168)

    We provide data recovery services in Maharashtra on a professional level. We provide data recovery services and solutions for all types of storage media like Hard Disk,Memory Cards,Android Phones,Pen Drive etc.Data Recovery is the most popular and reputed data recovery service provider for desktop and laptop hard disk drives,as well as the devices which uses hard disk as data storage media.We can also recover memory cards,Flash drives,pen drives and several other data storage media.We also provide hard disk repair services .If you are looking for professional and reliable data recovery service center,then Data Recovery is the right place to get all your required solutions.We are the most successful data recovery service provider.Our team of engineers takes utmost efforts to recover your data as quickly as possible and get back you to life and ready to work as before and make you fully satisfied!

    Data recovery is the process to retrieve data from a dead hard disk which is non-functional or cannot be seen in computer bios or its respective operating system by the user.We are able to recover the lost data from the accidentally damaged and stopped working hard disk,pen drives memory cards etc.We offer affordable and efficient data recovery services in Delhi for the persons who are searching for best data recovery services.

    Data Recovery services Maharashtra

    Hard disk data recovery Maharashtra

    Non detecting hard disk data recovery Maharashtra

    Burnt hard disk data recovery Maharashtra

    Logical hard disk data recovery Maharashtra

    Seagate hard disk data recovery Maharashtra

    Western digital hard disk data recovery Maharashtra

    Hitachi hard disk Data recovery Maharashtra

    Toshiba hard disk data recovery Maharashtra

    Laptop hard disk data recovery Maharashtra

    Desktop hard disk data recovery Maharashtra

    Formatted partition hard disk data recovery Maharashtra

    Partition table corrupted hard disk data recovery Maharashtra

    External hard hard disk data recovery Maharashtra

    Bad sector hard disk data recovery Maharashtra

    USB hard hard disk data recovery Maharashtra

    WD my passport hard disk data recovery Maharashtra

    Firmware corruption hard disk data recovery Maharashtra

    Pen drive data recovery data recovery Maharashtra

    Memory card data recovery recovery Maharashtra

    SD CARD data recovery Maharashtra

    Virus infected hard disk data recovery Maharashtra

    Server hard disk data recovery Maharashtra

    SSD hard disk data recovery Maharashtra

    Bad sector repair hard disk data recovery Maharashtra

    Android data recovery Maharashtra

    Android phone data recovery Maharashtra

    iPhone data recovery Maharashtra

    hard disk data recovery Maharashtra

    Samsung hard disk data recovery Maharashtra

    0 MB issue hard disk data recovery Maharashtra

    Burnt logic card hard disk data recovery Maharashtra

    Cctv camera hard disk data recovery Maharashtra

    Play station hard disk data recovery Maharashtra

    Tata sky backup hard disk data recovery Maharashtra

    Fujitsu hard disk data recovery Maharashtra

    Smartphone data recovery Maharashtra

    Raid hard disk data recovery Maharashtra

    Water damaged hard disk data recovery Maharashtra

    Damaged hard disk data recovery Maharashtra

    CD/DVD data recovery Maharashtra

    Quantum hard disk data recovery Maharashtra

    Buffalo hard disk data recovery Maharashtra

    Linux data recovery Maharashtra

    Lacie hard disk data recovery Maharashtra

    Ios data recovery Maharashtra

    Windows data recovery Maharashtra

    Maxtor hard disk data recovery Maharashtra

    Mac os hard disk data recovery Maharashtra

    Corrupted database data recovery Maharashtra

    Failed hard disk data recovery Maharashtra

    Mobile phone data recovery Maharashtra

    Professional hard disk data recovery Maharashtra

    NAS hard disk data recovery Maharashtra

    Crash hard disk data recovery Maharashtra

    Micro sata hard disk data recovery Maharashtra

    Memory stick data recovery Maharashtra

    Internal hard disk data recovery Maharashtra

    Hanging state hard disk data recovery Maharashtra

    Micro SD card data recovery Maharashtra

    Deleted file data recovery Maharashtra

    Mini SD card data recovery Maharashtra

    Flash drive data recovery Maharashtra

    Ide hard disk data recovery Maharashtra

    Sata hard disk data recovery Maharashtra

    Damaged head hard disk data recovery Maharashtra

    Deleted partition hard disk data recovery Maharashtra

    Fatal error showing hard disk data recovery Maharashtra

    Dead hard disk data recovery Maharashtra

    NTFS/FAT hard disk data recovery Maharashtra

    HFS/HFX/HFS+ hard disk data recovery Maharashtra

    Tape drive data recovery Maharashtra

    Transcend hard disk data recovery Maharashtra

    Android phone data recovery Maharashtra

    CF card data recovery Maharashtra

    Cyclic redundancy error showing hard disk data recovery Maharashtra

    MMC card data recovery Maharashtra

    EXT2/EXT3/EXT4/exFAT hard disk data recovery Maharashtra

    Sql database data recovery Maharashtra

    Surveillance hard disk data recovery Maharashtra

    Outlook data recovery Maharashtra

    Email data recovery Maharashtra

    Sony hard disk data recovery Maharashtra

    Digital media hard disk data recovery Maharashtra

    Tally data recovery Maharashtra

    hard disk data recovery Maharashtra

    IBM hard disk data recovery Maharashtra

    Tablet data recovery Maharashtra

    Phbalet data recovery Maharashtra

    Mac os hard disk data recovery Maharashtra

    Apple hard disk data recovery Maharashtra

    2.5 inches hard disk data recovery Maharashtra

    3.5 inches hard disk data recovery Maharashtra

    1.8 inches hard disk data recovery Maharashtra

    Tally data recovery Maharashtra

    Intel SSD data recovery Maharashtra

    Compact flash card data recovery Maharashtra

    Database recovery Maharashtra

    Mobile device recovery Maharashtra

    ipad data recovery Maharashtra

    Photo data recovery Maharashtra

    Windows Phone Data Recovery Maharashtra

    Video Data Recovery

    We also purchase the old hard disk both working and non working. Data Recovery offers high quality of Data Recovery services for all Storage media such as Hard disk,pendrive,memory cards,android phones etc. We ensure to do everything and make sure that all the requirements are met with the necessary service.

    We have an excellent team of knowledgeable and well-trained staff who will assist you in all your requirements. We have a very strong base of extremely satisfied customers who keep coming back to us. And, that speaks of the immense trust and faith they have bestowed on us.

    Data Recovery in Maharashtra

    Data Recovery in Thane Maharashtra

    Data Recovery in Pune Maharashtra

    Data Recovery in Mumbai Suburban Maharashtra

    Data Recovery in Nashik Maharashtra

    Data Recovery in Nagpur Maharashtra

    Data Recovery in Ahmadnagar Maharashtra

    Data Recovery in Solapur Maharashtra

    Data Recovery in Jalgaon Maharashtra

    Data Recovery in Kolhapur Maharashtra

    Data Recovery in Aurangabad Maharashtra

    Data Recovery in Nanded Maharashtra

    Data Recovery in Mumbai Maharashtra

    Data Recovery in Satara Maharashtra

    Data Recovery in Amravati Maharashtra

    Data Recovery in Sangli Maharashtra

    Data Recovery in Yavatmal Maharashtra

    Data Recovery in Raigarh Maharashtra

    Data Recovery in Buldana Maharashtra

    Data Recovery in Bid Maharashtra

    Data Recovery in Latur Maharashtra

    Data Recovery in Chandrapur Maharashtra

    Data Recovery in Dhule Maharashtra

    Data Recovery in Jalna Maharashtra

    Data Recovery in Parbhani Maharashtra

    Data Recovery in Akola Maharashtra

    Data Recovery in Osmanabad Maharashtra

    Data Recovery in Nandurbar Maharashtra

    Data Recovery in Ratnagiri Maharashtra

    Data Recovery in Gondiya Maharashtra

    Data Recovery in Wardha Maharashtra

    Data Recovery in Bhandara Maharashtra

    Data Recovery in Washim Maharashtra

    Data Recovery in Hingoli Maharashtra

    Data Recovery in Gadchiroli Maharashtra

    Data Recovery in Sindhudurg Maharashtra

    Data Recovery in Maharashtra

    The registrant of this domain maintains no relationship with third party advertisers that may appear on this website. Reference to or the appearance of any particular service or trade mark is not controlled by registrant and does not constitute or imply its association, endorsement or recommendation. All the matter shown on the website in the form of advertisement or schemes is the expressions of the advertisers; the registrant of this domain is in no way responsible for the same. All the brand names, logos,videos and registered trademarks maybe claimed as property of others or their respective owners.


    Posted In: NEWS

    Tags: , , , , ,

    Leave a Comment

    Singapore Data Center – Colocation Services #data #center #move #checklist


    Singapore Data Center

    SG2: Singapore

    More Locations

    Tech Specs

    Tech Specs

    SG2: Singapore

    Tech Specs

    Tech Specs

    More Locations

    Michael Levy | April 18,2017

    Many businesses must avail themselves of the latest technology to remain competitive in their industry. For instance, many car manufacturers now include backup cameras, Bluetooth and GPS capabilities and in-car Wi-Fi in their newer models. Newer vehicles without those technologies … Read more…→ The post Innovations in Data Center Connectivity appeared first on CenturyLink EpiCenter Blog.

    Business Continuity Planning: The Distributed Data Center Approach (Part Two)

    Chip Freund | April 05,2017

    As I discussed in my most recent blog, some companies utilize a distributed data center approach to achieve redundancy, scalability and high availability as part of their plan for business continuity. It enables businesses to help mitigate disasters that can … Read more…→ The post Business Continuity Planning: The Distributed Data Center Approach (Part Two) appeared first on CenturyLink EpiCenter Blog.

    Data Center World Global – Unleashing the Power of Colocation

    David Murphy | April 03,2017

    The greatest ideas – the most impactful innovations – come from recognizing an opportunity and then trying new approaches. As I look forward to the Data Center World Global meeting to be held in Los Angeles, I think about what … Read more…→ The post Data Center World Global – Unleashing the Power of Colocation appeared first on CenturyLink EpiCenter Blog.

    CenturyLink has sold its data centers and associated colocation business to a consortium led by BC Partners and Medina Capital Advisors. This move led to the creation of a bold, new company, Cyxtera Technologies. comprised of world-class talent and technology. CenturyLink will continue to work closely with Cyxtera and the same strong team that has operated the data centers successfully for years and who will continue to deliver world-class customer service and Operational Excellence for all colocation customers.

    Products Services

    • 2017 CenturyLink. All Rights Reserved. Third party marks are the property of their respective owners.


    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    UK Phone Book – Teleappending – Telephone number appending #teleapend, #data



    Our telephone number appending service requires a balance of credits, please sign in or register to continue.

    What is teleappending?

    Use our telephone number appending (also known as “teleappending”) service to improve your business and consumer marketing lists with an up-to-date telephone number sourced from all of the licensed UK telephone providers.

    Example of telephone number appending result

    It’s free to check how many phone numbers can be matched against your marketing list and you are only charged when you download the result.

    1. To start the process, simply upload a CSV file and select whether the file contains residential or business data.
    2. Once you have uploaded your CSV, you will need to indicate the format of your CSV, i.e. which column is the name, which column is the address and which column is the postcode.
    3. You will now be able to view a free summary of your teleappending job, indicating how many records we have found with a telephone number and how many records are on the TPS register. You will also be informed how many credits it will cost and are under no obligation to download the results.
    4. If you wish to proceed, you need to click “Download result” which will decrement your credits and return your CSV with five new columns. The first column indicates whether any telephone number was found, the second provides a landline telephone number for the record (where possible), the third indicates the landline TPS status, the fourth provides a mobile telephone number for the record (where possible) and the fifth column indicates the mobile telephone number’s TPS status.
    5. The resulting teleappended CSV will then be saved into your previous jobs list and is available to re-download for 28 days.

    Our competitively priced teleappending service has a fast yet powerful matching algorithm to find as many up-to-date phone numbers for your records as possible.

    Prices start from as little as 2p per row on our biggest credit packages. Please call 0800 0 607080 for more information.

    T2A API – Telephone Number Appending

    Teleappend residential or business telephone numbers to a CSV dataset via the T2A API and improve your consumer and business marketing data.

    What is T2A?
    T2A is an API (Application Programming Interface) that allows website and application developers to access our powerful database functionality.


    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Data recovery services from – 99 by Kroll Ontrack #online #data


    You may only get one chance for data recovery

    I can not praise these guys enough

    I can not praise these guys enough, we originally took our server to a local company who only got 16GB of 400GB of lost data back and that was only PDFs and JPEGs. Sent it to Kroll as a last ditch attempt and they got back every single file and folder in complete order and in less time than the other company. Customer service was excellent. If you ever have a problem of lost data just go to Kroll and don’t waste any time or money with other people. 100% satisfied, excellent company.

    Craig Fozard. Paramount Projects UK Ltd.

    I was impressed at the speed of your work and the results

    Thanks to those at Kroll On Track, all of my Masters work has been recovered. Words can not express my gratitude! The data itself has been retrieved with all the correct titles, date created info etc. I was impressed at the speed of your work and the results. Also, the people I have communicated with have been very professional and there has been total clarity at each stage. I would definitely recommend your services.

    Alicia Booth. University of Westminster

    Kroll provided a great service

    I was recommended Kroll Ontrack by Apple, my computer had water on it and was completely broken, I had to rescue what data I could. I was panicked. Kroll provided a great service. Mike was very patient with all my questions. And I got almost 100% of my data back. I’d definitely recommend Mike & Kroll.

    Independent reviews


    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    5 Big Data Use Cases To Watch #business #opportunities #in #big


    5 Big Data Use Cases To Watch

    Here’s how companies are turning big data into decision-making power on customers, security, and more.

    10 Hadoop Hardware Leaders

    (Click image for larger view and slideshow.)

    We hear a lot about big data’s ability to deliver usable insights — but what does this mean exactly?

    It’s often unclear how enterprises are using big-data technologies beyond proof-of-concept projects. Some of this might be a byproduct of corporate secrecy. Many big-data pioneers don’t want to reveal how they’re implementing Hadoop and related technologies for fear that doing so might eliminate a competitive advantage, The Wall Street Journal reports .

    Certainly the market for Hadoop and NoSQL software and services is growing rapidly. A September 2013 study by open-source research firm Wikibon, for instance, forecasts an annual big-data software growth rate of 45% through 2017.

    [Digital business demands are bringing marketing and IT departments even closer. Read Digital Business Skills: Most Wanted List .]

    According to Quentin Gallivan, CEO of big-data analytics provider Pentaho. the market is at a “tipping point” as big-data platforms move beyond the experimentation phase and begin doing real work. “It’s why you’re starting to see investments coming into the big-data space — because it’s becoming more impactful and real,” Gallivan told InformationWeek in a phone interview. “There are five use cases we see that are most popular.”

    1. A 360 degree view of the customer
    This use is most popular, according to Gallivan. Online retailers want to find out what shoppers are doing on their sites — what pages they visit, where they linger, how long they stay, and when they leave.

    “That’s all unstructured clickstream data,” said Gallivan. “Pentaho takes that and blends it with transaction data, which is very structured data that sits in our customers’ ERP [business management] system that says what the customers actually bought.”

    A third big-source, social media sentiment, also is tossed into the mix, providing the desired 360 degree view of the customer. “So when [retailers] make target offers directly to their customers, they not only know what the customer bought in the past, but also what the customer’s behavior pattern is as well as sentiment analysis from social media.”

    2. Internet of Things
    The second most popular use case involves IoT-connected devices managed by hardware, sensor, and information security companies. “These devices are

    Jeff Bertolucci is a technology journalist in Los Angeles who writes mostly for Kiplinger’s Personal Finance, The Saturday Evening Post, and InformationWeek. View Full Bio


    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    NAID: NAIDnotes #data #aggregation #hipaa



    Common misconceptions about HIPAA and data destruction

    In my blog next Tuesday, I will continue my pricing thread about why secure destruction professionals aren t willing to do what s necessary to get out of the commodity rat race. But, today, I am going to mix it up by shedding light on a few Health Insurance Portability and Accountability Act (HIPAA) misconceptions in our industry. Probably the most common HIPAA misconception is that it requires the destruction of protected health information (PHI). It doesn t. Nowhere in any of the five HIPAA rules does it say a word about data destruction, particle size, or anything about how or where PHI has to be destroyed.

    What it says is that covered entities are required to prevent unauthorized access to PHI. That s it. But even with such a vague directive, it was enough to get health care organizations to outsource their data destruction. Before that, they were simply throwing the records away or selling the paper to a recycler.

    The U.S. Department of Health and Human Services (HHS) gave some direction that they expected data to be destroyed when discarded. Their expectation regarding destruction came when they were asked for an example of what was meant by physical safeguards to prevent unauthorized access. The example they provided, completely separate from the law itself, was for instance, the destruction of discarded PHI.

    Still destruction was not specifically required by the law. In fact, a few years ago, a consultant in the Midwest caused some trouble when he convinced health care organizations they did not have to shred at all. He took the position that recycling was enough because, if done with some control, it still prevented unauthorized access to PHI. He convinced hundreds of organizations they could save a lot of money using this loophole. Eventually, that trend died, although there are still some health care organizations relying on recycling instead of destruction for security.

    Now, you might think the Health Information Technology for Economic and Clinical Health (HITECH) amendment to HIPAA added a destruction requirement. It did not. HITECH did, however, add the Health Data Breach Notification provisions, stating that if there was a security breach, the authorities, media, and patients must be notified. Further, it stated that improperly discarded paper and electronic equipment containing PHI would be considered a security breach. HHS later issued guidance that said encrypted or wiped hard drives and paper that was made practicably unreadable would not be considered a security breach when discarded.

    In reality, there is no reason for concern over this technicality. Even though data destruction is not specifically required in writing by HIPAA, it is a requirement. Like every other data protection law on the books, HIPAA is based on the reasonableness principle. No one could ever say it was reasonable to discard information without destruction and still meet the requirement to prevent unauthorized access to PHI.

    It is still important that destruction professionals know the distinction and talk about it correctly in the marketplace. To say HIPAA requires data destruction is not accurate. It is better to say HIPAA requires the prevention of unauthorized access to PHI, which, in turn, necessitates destruction.

    It remains to be seen whether clearer requirements for destruction will emerge in the long overdue HITECH Final Rule. You can bet you ll hear from NAID as soon as it s published.

    Comments: 0 | Reply


    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Big Data Frameworks #big #data #frameworks


    Big Data Frameworks

    This course examines current and emerging Big Data frameworks with focus on Data Science applications. The course starts with an introduction to MapReduce-based systems and then focuses on Spark and the Berkeley Data Analytics (BDAS) architecture. The course covers traditional MapReduce processes, streaming operation, machine learning and SQL integration. The course consists of the lectures and the assignments.

    The course has an IRCnet channel #tkt-bdf.

    Assignments are given by Ella Peltonen, Eemil Lagerspetz, and Mohammad Hoque.

    Completing the course

    The course consists of the lectures and the course assignments. The assignments are based on the Spark Big Data framework and the Scala programming language.

    Instead of the first week exercise session, we have a Spark coding tutorial on Friday 13.3. at 10-12. Please bring your laptop with you, if you have one. You can install the latest Spark version beforehand.

    The Scala Spark Tutorial 13.03.2015 slides are available here:

    The first exercise set is now out: link. Deadline is strictly 19.3. 2pm. returnings via Moodle. The first exercises will be discussed on Friday 20.3.

    The second exercise set is available there. Deadline is 26.3. 2pm. please return your answers via Moodle. These exercises have been discussed on Friday 27.3. when there will also be a Q A for the exercise set three. Some hints included to the exercise set. Extended deadline 2.4. 2pm. Maximum number of points will be 5 if you use this opportunity. You can pick and do 5 that you are sure of, or do all 6 if you re not sure about one of them.

    The third exercise set is now published. Deadline is 9.4. 2pm. please return via Moodle. These exercises will be discussed on Friday 10.4. after Easter. Because of the Easter break, we will not have an exercise on 3.4. Extended deadline 16.4. 2pm. Maximum number of points will be 5 if you use this opportunity. Please, return the entire solution set, also the exercises you are happy with from the first round.

    On Friday 17.4. there is a Q A session instead of the exercise session. Prepare your questions beforehand.

    The fourth (and last) exercise set is published. Deadline is 23.4. 2pm and returnings via Moodle as always. These exercises will be discussed on Friday 24.4. Nota that there will be no extension for this last exercise set.

    Tentative lecture outline

    7.4. Easter break

    21.4. Two industry presentations (Nokia and F-Secure) on Big Data and Spark


    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    IBM big data platform – Bringing big data to the Enterprise


    Big data at the speed of business

    Is your architecture big data ready?

    IBM solves this challenge with a zone architecture optimized for big data. The next generation architecture for big data and analytics delivers new business insights while significantly reducing storage and maintenance costs.

    The information management big data and analytics capabilities include :

    • Data Management Warehouse: Gain industry-leading database performance across multiple workloads while lowering administration, storage, development and server costs; Realize extreme speed with capabilities optimized for analytics workloads such as deep analytics, and benefit from workload-optimized systems that can be up and running in hours.
    • Hadoop System: Bring the power of Apache Hadoop to the enterprise with application accelerators, analytics, visualization, development tools, performance and security features.
    • Stream Computing: Efficiently deliver real-time analytic processing on constantly changing data in motion and enable descriptive and predictive analytics to support real-time decisions. Capture and analyze all data, all the time, just in time. With stream computing, store less, analyze more and make better decisions faster.
    • Content Management: Enable comprehensive content lifecycle and document management with cost-effective control of existing and new types of content with scale, security and stability.
    • Information Integration Governance: Build confidence in big data with the ability to integrate, understand, manage and govern data appropriately across its lifecycle.

    Gain a strategic advantage over your competition, with IBM’s platform for big data and analytics.

    “IBM has clearly made a big investment in building out a powerful Big Data platform.

    IBM s Big Data Platform and Decision Management
    Decision Management Solutions, James Taylor, May 2011


    Posted In: NEWS

    Tags: , , , , , ,

    Leave a Comment

    Credit Data Reporting Services for Data Furnishers #credit #data #reporting, #consumer


    Credit Data Reporting Services

    Winning with data reporting

    For us, it s all about promoting a healthy credit eco-system for everyone.

    Reporting consumer data to credit bureaus is essential for your customers to reach their financial goals and imperative for you to grow your business. By reporting credit data to Experian, you can:

    • Reduce risky lending decisions With access to more comprehensive credit data, lenders have a more accurate picture of a consumer s behavior and can make more informed and less risky decisions.
    • Minimize delinquencies and collections Other credit grantors may offer credit to your customer, not knowing that the customer already has an obligation to you. This may result in your customer getting over-extended and negatively impact their ability to pay you.
    • Increase on-time payments and collect bad debt When customers know that their lenders report, they are more likely to pay on time. You can also encourage late payers to resolve outstanding debts before delinquency affects their credit.
    • Improve your customers experiences and cross-sell By reporting positive data about your customers, you can reward good behavior and extend additional credit for other products and services.
    • Align with regulatory expectations and industry best practices While credit data reporting is voluntary, you can align with regulatory priorities and best practices to help and protect the consumer throughout their financial journey.

    Reporting credit data to Experian is fast, simple and easy and we ll help you every step of the way. Call us: 1 800 831 5614, option 3

    For information on Experian s Business Data Reporting Program, please visit

    To report or not to report?

    8 Easy Steps for Reporting Data

    Best Practices Checklist

    Experian Data Integrity Services

    Consumer Data Reporting

    Should I Report Credit Data?

    Please enable JavaScript to submit this form.

    Solutions and Services

    2017 Experian Information Solutions, Inc. All rights reserved.

    Experian and the Experian marks used herein are service marks or registered trademarks of Experian Informations Solutions, Inc. Other product and company names mentioned herein are the property of their respective owners.

    Experian Global Sites


    Posted In: NEWS

    Tags: , , , , , , , ,

    Leave a Comment

    Gartner Publishes Magic Quadrant for Managed Print Services, Worldwide 2013 #gartner,


    By Allie Philpin

    Gartner, Inc. has just released their latest update of their Magic Quadrant for Managed Print Services, Worldwide 2013 and the top 10 MPS providers worldwide remain the same, including last year’s new entry, Kyocera!

    Gartner defines Managed Print Services (MPS) as a service provided to ‘optimise or manage a company’s document output to meet certain objectives’. Those objects could be cost efficiency, increase productivity, or to lessen the load on IT support. MPS is primarily implemented by corporate companies with over 500 users, although smaller enterprises are discovering the benefits of investing in an MPS solution, particularly those that have several locations worldwide. But for this report, Gartner limited it to providers that are single source across a minimum of two regions.

    MPS covers a range of services including scanning, document capture, copy centres, telecommuters, workflow optimisation including restructuring of document workflows, document security, reducing print volumes and automating paper-intensive document processes, enterprise content management services and MFPs (multifunction products).

    MPS is one of the fastest growing service markets with the top 10 providers of MPS services massing $8.9 billion in direct revenue, demonstrating a worldwide growth of 10%, with SMEs showing the quickest growth overall. Developing regions, such as Asia/Pacific which shows growth at 19%, are also taking up MPS exponentially. As trends continue towards mobility, cloud computing, handling of large amounts of data and analytics, as well as social media, organisations are required to adapt. As workers become more mobile yet demand better access to applications and the sharing of documents, there is a need for automating imaging and print services towards the paperless office.

    Criteria for inclusion in the Magic Quadrant for Managed Print Services, Worldwide report is strict and only vendors that meet all the criteria are included. Their evaluation criteria are based on two areas: the Ability to Execute and Completeness of Vision. Ability to Execute examines the providers’ level of success in delivering results, both currently and in the future, and incorporates the quality and efficacy of their processes, methods, systems or procedures to enable competitive performance that is efficient, effective, and affects revenue in a positive way, retention and reputation.

    Gartner identified 10 MPS providers that they considered to be market leaders in the field of Managed Print Services, Worldwide, as follows:

    1. The largest MPS provider in 2012 was Xerox, and by quite a margin at $2.75 billion in revenue. Xerox work in partnership with Fuji Xerox to support the Asia/Pacific region; and their Enterprise Print Services (EPS) and Xerox Partner Print Services plans are the most popular.
    2. Second largest in 2012 is Ricoh, bringing in $2.09 billion in revenue, utilising their wide range of A3 MFPs. In 2009, they launched their Managed Document Services and a single service plan that offers a range of options and variations that can be adapted to meet a customer’s requirements.
    3. HP was the third largest in 2012 with revenue of $1.52 billion, but with more customers than other MPS providers. Again, their offering is single source but it is adaptable with additions that can be tailored to a company’s needs. HP also works with Canon and other partners to ensure that what they offer is what the customer requires.
    4. Fourth largest was Lexmark who brought in revenue in 2012 of $958 million, and who specialise in organisations that carry out a large amount of process-driven printing, for example, the banking, retail and securities, insurance, healthcare, manufacturing and the public sector.
    5. HP partners, Canon, are the fifth largest MPS provider and enjoyed revenue of $810 million in 2012. Canon’s MPS business is built upon their massive MFP sales and service organisations, and is based around their Managed Document Services (MDS) A3-centric product.
    6. Sixth largest is Konica Minolta, totalling $391 in MPS revenue in 2012 worldwide and also registers one of the highest growth rates at 48%, principally in Western Europe and North America. Konica Minolta’s Optimised Print Services (OPS) offering has been particularly successful within Europe.
    7. Toshiba came in seventh posting MPS revenue of $163 million. Their Toshiba Encompass incorporates MPS and they are also a big supplier of A3-style MFPs, which are often placed in MPS programs.
    8. Pitney Bowes is the eighth largest MPS provider and registered MPS revenue of $154 million (according to Gartner’s estimate). Having sold off their UK and Ireland operations, their business is mainly concentrated in North America.
    9. Ninth in the list is ARC Document Solutions, with revenue of $72 million. ARC, a large MPS provider, is not an equipment manufacturer and it isn’t closely linked with a single manufacturer.
    10. Last in the top 10 of MPS providers is Kyocera. Having improved and up-scaled their MPS program – Managed Document Services (MDS) – recently, it first qualified for inclusion in the Magic Quadrant report last year and whilst their biggest market is North America, their MPS program is more widely known in Western Europe.

    If you’re a medium to large organisation looking to evaluate and identify suitable MPS providers, then Gartner’s report is a good starting point; but remember, just because Managed Print Services is the buzzword (or buzzwords!) doesn’t mean that it is right for your organisation. So assess and evaluate based upon your specific needs as a business.

    To read the full report, download here .


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Online-MSDS – Material Safety Data Sheets Management # #online #msds, #onlinemsds,



    Have you been searching for a quality MSDS management provider? Look no further, you have found the original developers of computerized MSDS management systems. Additionally, we can now offer a complete suite of compliance management solutions.

    Online-MSDS provides you with an easy set of solutions to manage your MSDSs.

    • No initial startup cost
    • Multiple program levels
    • 24/7/365 Operator Assistance
    • Personalized Service
    • Simple monthly invoicing

    Simplify the effort it takes to meet the burdensome task of tracking and reporting your HazMat inventory.

    • Multi-Site
    • Dynamic or static inventory
    • User Permissions
    • Regularity Reporting
    • Does the math

    Eliminate 50% of the clerical functions performed by your environmental professionals

    • No more spreadsheets
    • Process Formula Based
    • Consolidated Reports
    • CAS # Database
    • Units of Measure Conversions

    Services that can make your time more efficient and beneficial to your company.

    • MSDS Retrevial
    • MSDS Distribution
    • FaxBack

    The above modules together form a cohesive system to enable your company to easily handle all of the demands placed on you by the regulatory agencies. We have been serving health and safety professionals such as yourself since 1985 and we continue to support you by updating our software as the industry and the regulations change. We are committed to providing our clients with a set of long term solutions to grow alongside with you in the future.

    Copyright 1985 – 2017 Kelleher, Helmrich and Associates, Inc. All rights reserved. Privacy Policy


    Posted In: NEWS

    Tags: , , , , , , , , , , , , ,

    Leave a Comment

    Ethanol: Pros ?>



    Positive Net Energy Balance – Corn-based ethanol has a positive net energy balance of 1.06btu per gallon for 1.00btu of energy used without ethanol by-product credits. With these credits, for things such as DDGS, corn-based ethanol has a positive net energy balance of 1.67btu per gallon for 1.00btu of energy used.

    Biodegradable – As ethanol is made with organic materials it is highly biodegradable making spills far less worrysome than petroleum spills. When spilled, 74% of ethanol is broken down within 5 days.

    Usable By-Products – The two chief by-products of corn-based ethanol are CO2 and DDGS, both of which are usable in other industries. The CO2 can be captured for use in the food and beverage industry. DDGS can be used for cattle feed or further crushed to extract corn oil, for food or biodiesel production uses.

    Most Infrastructure In-place – There are few changes that would need to be made to widely adopt ethanol. Most automobiles available in the U.S. are Flex Fuel capable and there are roughly 2,000 stations already serving E85. While most of these stations are lumped in the Midwest, they are increasing nationwide.


    Food vs. Fuel – 2.4 to 2.8 gallons of ethanol can be produced per bushel of corn. As a result, there has been massive media coverage over the use of food as fuel. While there are mountains of findings showing how the use of corn has increased food costs and equal amounts showing it does not, in the end food crops are being used as fuel, making corn-based ethanol inferior to cellulosic ethanol in this regard.

    Reduced MPG – Based on 2009 flex fuel vehicles, E85 miles per gallon is expected to be roughly 28.5% lower in the city and 26.5% lower on the highway. This means it takes 1.35 to 1.40 gallons of E85 to equal the mileage of 1.00 gallons of gasoline.

    Fuel Transportation – Ethanol absorbs water and is corrosive. which make it difficult to ship through existing pipelines from the Midwest of the U.S. where most production occurs. Remedies include shipping or building dedicated ethanol pipelines, however the most likely scenario seems to involve rail or road transport. The best scenario would be local ethanol plants, with the easiest way to accomplish this through continued development of cellulosic ethanol, where feedstocks are abundant everywhere as opposed to corn or sugar.

    Water Absorbtion – Ethanol absorbs water, which can contaminate it as a fuel and makes it more difficult to ship through pipelines. As a result, ethanol has a shorter shelf and tank life than gasoline.

    Fueling Locations – There are roughly 2,000 E85 fueling stations in the U.S. with the majority in Illinois, Indiana, Iowa, Minnesota and Wisconsin. A U.S. E85 fueling station map and locator can be found here.


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials #machine


    TFR Visualizer – Temporary Flight Restrictions Visualized on 30+ Maps!

    Computational and Inferential: The Foundations of Data Science

    Post under Data Science on Sat Jul 01, 2017

    Step by step, you’ll learn how to leverage algorithmic thinking and the power of code, gain intuition about the power and limitations of current machine learning methods, and effectively apply them to real business problems.

    Artificial Neural Networks – Models and Applications

    This is a current book on Artificial Neural Networks and Applications, bringing recent advances in the area to the reader interested in this always-evolving machine learning technique. It contains chapters on basic concepts of artificial neural networks.

    Applied Artificial Neural Networks (Christian Dawson)

    This book focuses on the application of neural networks to a diverse range of fields and problems. It collates contributions concerning neural network applications in areas such as engineering, hydrology and medicine.

    This book provides proven steps and strategies on learning what Linux is and how to use it. It contains information on the Linux Operating System, especially for beginners.

    Optimization Algorithms- Methods and Applications

    This book covers state-of-the-art optimization methods and their applications in wide range especially for researchers and practitioners who wish to improve their knowledge in this field.

    Global Optimization Algorithms – Theory and Application. 2nd Ed.

    This book is devoted to global optimization algorithms, which are methods to find optimal solutions for given problems. It especially focuses on Evolutionary Computation by discussing evolutionary algorithms, genetic algorithms, Genetic Programming, etc.

    Artificial Neural Networks – Architectures and Applications

    This book covers architectures, design, optimization, and analysis of artificial neural networks as well as applications of artificial neural networks in a wide range of areas including biomedical, industrial, physics, and financial applications.

    With this example-driven ebook, you’ll learn how improved metaprogramming techniques in C++11 and C++14 can help you avoid a lot of mistakes and tedious work by making the compiler work for you.

    Cloud Computing – Architecture and Applications (Jaydip Sena)

    This book presents some critical applications in cloud frameworks along with some innovation design of algorithms and architecture for deployment in cloud environment. It establishes concrete, academic coverage with a focus on structure and solutions.


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Hybrid Business Intelligence with Power BI #sql #server, #powerbi, #hybrid #business


    Hybrid Business Intelligence with Power BI

    This week in the social media chatter, I noticed tweets regarding a new Microsoft white paper by Joseph D Antoni and Stacia Misner published to TechNet on Hybrid Business Intelligence with Power BI. This white paper is a fantastic technical overview and a must-read for groups looking at Power BI, wondering how to best implement it with existing on-premises business intelligence BI, or Azure Infrastracture as a Service (IaaS) hosted BI. Covered topics include:

    • hybrid BI technical architecture options
    • data management gateway
    • best practices for:
      • integrating security
      • identity management
      • networking
      • Office 365

    Aside from small businesses that may only have cloud hosted solutions, many businesses currently have a combination of cloud and on-premises data sources. Just think about how many groups use, Google Analytics, Constant Contact, and other departmental cloud applications. Typically, I see those groups leveraging APIs or connectors to bring cloud data back on site into a local data warehouse for creating reports. We are taking those same concepts quite a bit further with Microsoft Azure and Power BI.

    Ideally, we are no longer moving all of the data in our big data world. Concepts like data virtualization, for example, are becoming more popular. Most likely, we are now tasked to deliver a transparent Microsoft BI experience across Office 365 and existing on-premises SharePoint portals or data sources.

    Understanding how to architect hybrid-BI scenarios is becoming a more important skill to master in our profession. However, prior to this new white paper, finding the answers and best practices for it was fairly challenging.

    Security in a Hybrid World

    Upon a brief skim through this new technical whitepaper, I noticed a lot of content around networking and identity management. Historically, identity management and security in Microsoft BI has not been easy to master. In a hybrid BI world, these topics appear to be comparable or even a bit more complex.

    Let s face it, getting through a SharePoint 2013 BI farm installation and configuration can be a daunting process for even the top talent in the world. I usually advise to folks considering a new SharePoint 2013 BI farm installation to first read Kay Unkroth s incredible white paper to understand SharePoint security, Microsoft BI security, and Kerberos delegation concepts.

    Managing user security in Office 365 looks comparable to on-premises SharePoint security. There are options to federate Active Directory (AD) to Office 365 and use Single Sign On (SSO). There are additional alternatives for multi-factor authentication in scenarios where you require additional layers of security.

    In hybrid BI scenarios where you have Analysis Services or Reporting Services hosted on Microsoft Azure VMs, you might also need to configure Azure AD, AD Federation Services (ADFS), and the Azure Active Directory Sync tool to synchronize passwords, users, and groups between on-premises AD and Azure AD supporting the Office 365 installation. The new Hybrid Business Intelligence with Power BI white paper goes into detail on those concepts and includes links to a plethora of excellent resources.

    Data Management Gateway for Power BI

    At the moment, Data Management Gateway appears to be the key to hybrid BI with Office 365 Power BI. The Data Management Gateway is a client agent application that is installed on an on-premises server and copies data from internal data sources to the Power BI cloud data source format.

    Office 365 Power BI data sources are a bit of a cloud data island per se, but over time it should continue to evolve. Present Power BI Data Refresh capabilities, basically Excel workbooks deployed to a Power BI site, can have a single data refresh schedule from the following supported data sources:

    • On-premises SQL Server (2005 and later)
    • On-premises Oracle (10g and later)
    • Azure SQL Database
    • OData feed
    • Azure VM running SQL Server

    Now, if you have a VPN connection and Azure virtual network, it opens up many more potential data sources for Power BI. In that case, accessing data sources with Power BI data connections and scheduled refresh is similar to on-premises Power Pivot except it sure looks like you still need Data Management Gateway to get that data into Power BI-land. The white paper section labeled Power BI Data Refresh goes into deep detail on supported data sources, data refresh schedules, and various data location scenarios.

    Sending Feedback to Microsoft

    We are just beginning to see Microsoft BI and Power BI in a cloud and hybrid world. Groups that are using Power BI and hybrid BI today are early adopters. We would all benefit from hearing about their tips, tricks, and lessons learned. I see a lot of continual changes in Azure and total confusion out here especially around Azure cloud BI and Power BI with on-premises data sources.

    If you have Microsoft technical content requests, you can send feedback to the teams that develop these resources to get new topics on their radar. Don t assume someone else has already expressed a need. If no one asks or complains, the folks in Redmond may be completely unaware of that need. It really is that simple.


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , ,

    Leave a Comment

    EHDF: Web Hosting, Data Centres, Dedicated Servers – Dubai, UAE #data


    About Us

    Most secure, reliable and robust Data Centre and Managed Hosting services provider in Dubai, UAE

    Established in 2001, eHosting DataFort (eHDF) is amongst the 1st providers of Managed Hosting and Cloud Infrastructure Services in the Gulf region. We own and operate multiple T3 Data Centres, delivering Managed and Web Hosting Services, through reliable infrastructure, 24/7 support and guaranteed uptime. We are the only services provider in the Middle East to offer credit based Service Level Agreements.
    eHDF was the pioneer in the region to introduce hosted Managed Private Cloud solutions and an online portal for Public Cloud services. We are certified to ISO 9001 / 20000 / 22301 / 27001. Very recently, eHDF obtained Cloud Security Alliance (CSA) STAR Certification, becoming the 1st company in the region to achieve this. We are also certified to PCI-DSS.

    Why Us?


    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    FICO® Xpress Optimization Suite #fico #xpress #optimization, #xpress #optimization, #xpress, #optimization,




    • Analytics
    • Decision Management Suite
    • Data Management
    • Optimization
    • Model Management
    • Optimization in Manufacturing & Supply Chain
    • Artificial Intelligence & Machine Learning
    • IFRS 9 Impairment Management
    • Marketing & Customer Engagement
    • Data Integration
    • Personalized Engagement
    • Advanced Analytics
    • Communicate
    • Fraud and Security
    • Enterprise Security Score
    • Enterprise Fraud
    • Cyber Security
    • Fraud & Security Insights
    • Scores
    • FICO® Score
    • Auto Scoring Solutions
    • Bankcard Scoring Solutions
    • Retail Banking Solutions
    • Mortgage Scoring Solutions
    • Scoring Consulting Services
    • FICO® Score for International Markets
    • Debt Management Solutions
    • Recovery Management
    • Collection Communications
    • Compliance
    • Communications
    • Mobile Fraud Alerts
    • Collections
    • Patient Adherence
    • Customer Service
    • Originations
    • Alternative lending
    • Consumer Credit
    • Financial Services
    • Leasing
    • Small Business Credit
    • Risk & Compliance
    • Anti-Money Laundering
    • Counter-Terrorism Financing
    • Know Your Customer
    • Tax Compliance
    • Business Partner Due Diligence
    • Compliance Cloud
    • Anti-Financial Crime Solutions


    • Top Products
    • FICO® Xpress Optimization Suite
    • FICO® Decision Central™
    • FICO® Engagement Analyzer
    • FICO® Score
    • FICO® Score Open Access
    • FICO® Payment Integrity Platform
    • FICO® Debt Manager™ solution
    • FICO® Falcon Fraud Manager
    • FICO® Origination Manager
    • FICO® TRIAD® Customer Manager
    • FICO® Blaze Advisor® Decision Rules Management System
    • FICO® Strategy Director for Deposit Management
    • Need help with a product?
    • View Product Support »
    • See Our Entire Product Listing »


    • Financial Services
    • Auto Lending
    • Bankcard
    • Collection Agencies
    • Leasing
    • Mortgage
    • Retail Banking
    • Small Business Lending
    • Insurance
    • Healthcare
    • Life Insurance, Annuity and Pension
    • Property and Casualty
    • Customer Communication Services
    • Public Sector
    • Federal, Ministerial, and Civic
    • State, Provincial, and Local
    • Pharma and Life Sciences
    • Medical Devices
    • Pharma
    • Pharmacy Benefit Manager
    • Retail Pharmacy
    • Education
    • Academic Engagement Program
    • University
    • Retail
    • Retail
    • Manufacturing
    • Technology
    • Utilities and Telecommunications
    • Transportation and Travel
    • Learn how BMW sped up its customer communications
    • Read More


    FICO® Xpress Optimization Suite

    Key Features

    • Access algorithms for solving large-scale linear, mixed integer and non-linear as well as constraint programming problems.
    • Powerful solution sensitivity analysis, making it possible to efficiently explore large quantities of “what if?” scenarios.
    • Highly configurable solution that allows you to create powerful optimization applications.
    • Straightforward, goal-oriented screens put the power of optimization in the hands of business users.
    • Business users can understand trade-offs and sensitivities implicit in the business problem and compare the outcome of different scenarios.
    • High-performance and reliable optimization engines that leverage multiple cores and computers across the network.
    • Xpress-Mosel programming language provides an easy-to-learn, robust way to interact with Xpress solver engines.
    • Xpress-Mosel contains drivers for access to text, XML, R, CSV, Excel, Hadoop’s HDS, OBDC and Oracle databases and APIs connecting it to Java, C/C++. NET and other languages and Web services.
    • Xpress and Optimization Modeler capabilities are integrated within the FICO® Decision Management Suite in the FICO Analytic Cloud. enabling organizations of all sizes to leverage the power of optimization.
    • Connects to R and Python, and provides specific capabilities for optimizing under data uncertainty (robust optimization), facilitating the needs of data scientists.

    Want to take your business to new heights?

    Request more information. Enter your information and we will respond directly to you.

    Pöyry puts muscle behind energy forecasting and modelling using FICO Xpress Optimization Suite

    Client: Pöyry, a European energy consultancy, based in Vantaa, Finland.

    Challenge: the need to partner with world-class optimization software to move beyond the limitations of spreadsheet modelling and provide customers with fast, data-intensive, multi-country energy analyses.

    Solution: FICO® Xpress Optimization Suite

    Results: 100x faster runtimes, scalability, increased model accuracy, ability to create complex, multi-country models.


    Posted In: NEWS

    Tags: , , , , , , , , , ,

    Leave a Comment