Syncsort Blog

Subscribe to Syncsort Blog feed
Covering trends and best practices in data infrastructure optimization, capacity management, data integration, data quality, data availability, security for IBM i and advancing data in the cloud
Updated: 59 min 52 sec ago

New Webcast! Technology Trends for 2019: What it Means for Your Business

Sat, 12/08/2018 - 13:30
Syncsort has released an on-demand webcast, “Technology Trends for 2019: What It Means for Your Business,” which is currently available for download. Ninety percent of the world’s data was generated in the past two years, and 2.5 quintillion bytes of data are generated every day. Organizations across industries have an unprecedented opportunity to harness data to move their business forward – but they will need a solid strategy and the right tools to do so. In this 30-minute webcast,...
Categories: News from Vendors

Staying Afloat When the Data Loss Iceberg Hits: Part 2 of 2

Thu, 12/06/2018 - 13:30
Last time, on part one of our series, we covered storage failure and challenges associated with tape. Here, we take a look at risks to hard-disk storage, the limitations of certain types of Disaster Recovery products, and how to achieve planned downtime. Malware Attacks on the Rise External forces, often applied with malicious intent, can contribute to storage failure. For example, a particularly sinister malware attacked Middle East energy organizations, destroying hard disks on infected system...
Categories: News from Vendors

Staying Afloat When the Data Loss Iceberg Hits: Part 1 of 2

Wed, 12/05/2018 - 13:30
In 1912, the world witnessed a tragedy of epic proportion when the much lauded luxury liner, the Titanic, sunk to the depths of the ocean. For businesses today, consequences can still be grim when oversights leading to data loss threaten to sink an organization. Much like crashing into an iceberg in the middle of the ocean, circumstances leading to data loss disaster might seem unlikely, causing those steering the ship of today’s business to think they may easily come out without negative impact...
Categories: News from Vendors

Using Exit Points to Fortify Your IBM i Security

Tue, 12/04/2018 - 13:30
In the early days of the AS/400 and iSeries, the job of protecting the system was often as simple as managing user authorities and securing user access through menus. This is certainly no longer the case with today’s IBM i environments. Fully open to communicate with other systems across internal and external networks, and accessible by partners and customers, the job of securing the IBM i can be challenging to say the least—particularly in light of rapidly changing threats and new compliance re...
Categories: News from Vendors

Video: CEO Josh Rogers on the Big Iron to Big Data Market and Syncsort’s Success in Delivering Solutions

Mon, 12/03/2018 - 13:30
Syncsort CEO, Josh Rogers, recently sat down to speak with Stu Miniman for a CUBEConversation at theCUBE Studio in Boston, MA. Together, they spoke about the Big Iron to Big Data market, the use cases driving customer needs in the market, and how Syncsort’s success in delivering solutions for those needs has helped to drive record-breaking company performance and rapid business growth. They also discussed Syncsort’s development partnership with IBM and their recent acquisition of EVi...
Categories: News from Vendors

New eBook! Enterprise Data Marketplaces: Enabling a Data-Driven Culture

Sat, 12/01/2018 - 13:30
Syncsort has released a new eBook, “Enterprise Data Marketplaces: Enabling a Data-Driven Culture,” which is now available for download. In the past few years third-party data marketplaces, often provided as Data as a Service, have taken off. But, most organizations already own the data most relevant to their business. That’s why the most successful organizations are applying the concepts of external data markets to create enterprise data marketplaces, where users can easily find and ...
Categories: News from Vendors

Expert Interview (Part 3): Jeff Bean and Apache Flink’s Take on Streaming and Batch Processing

Thu, 11/29/2018 - 13:30
At the recent Strata Data conference in NYC, Paige Roberts of Syncsort sat down for a conversation with Jeff Bean, the Technical Evangelist at data Artisans. In the first of the three part blog, Roberts and Bean discussed data Artisans, Apache Flink, and how Flink handles state in streaming processing. Part two focuses on the adoption of Flink, why people tend to choose Flink, and available training and learning resources. In the final installment, Roberts and Bean speak about Flink’s unique tak...
Categories: News from Vendors

Data Encryption: Secure Your Sensitive Information

Wed, 11/28/2018 - 13:30
It seems that for as long as people have been passing along sensitive information, they have also used various methods of encryption to ensure privacy. The first data encryption tool dates as far back as 700 BC, when Spartan military used scytales to send sensitive messages during battle. Move forward a few thousand years, and we are still trying to protect our information, only with more advanced methods of data encryption. The basics of data encryption If you’re wondering “What does data encry...
Categories: News from Vendors

Expert Interview (Part 2): Jeff Bean on Apache Flink and its Available Learning Resources

Tue, 11/27/2018 - 13:30
At the recent Strata Data conference in NYC, Paige Roberts of Syncsort sat down for a conversation with Jeff Bean, the Technical Evangelist at data Artisans. In the first of the three part blog, Roberts and Bean discussed data Artisans, Apache Flink, and how Flink handles state in stream processing. Part two focuses on the adoption of Flink, why people tend to choose Flink, and available training and learning resources. Roberts: The thing about Flink is that it’s really well-known in Europ...
Categories: News from Vendors

Expert Interview (Part 1): Jeff Bean on Apache Flink and How it Handles State in Streaming Processing

Mon, 11/26/2018 - 13:30
At the recent Strata Data conference in NYC, Paige Roberts of Syncsort sat down for a conversation with Jeff Bean, the Technical Evangelist at data Artisans. In the first of this three part blog, Roberts and Bean discuss data Artisans, Apache Flink, and how Flink handles state in streaming processing. Roberts: So can you tell our readers a little bit about yourself? Bean: Sure. My name is Jeff Bean. I’m a Technical Evangelist at data Artisans. I’m the only US Technical Evangelist and...
Categories: News from Vendors

New eBook! 20/20 Security Visibility for IBM z and i Systems

Sat, 11/24/2018 - 13:30
Syncsort’s has released an eBook, 20/20 Security Visibility for IBM z and i Systems, which is now available for download! Understanding the potential security threats and preventing security breaches has become paramount to just about every IT organization. The image and financial damage caused by a security break can cripple an organization. Compliance initiatives further increase the burden put on most businesses to get a better handle on security. In response to today’s world of complex...
Categories: News from Vendors

6 Threats to the High Availability of Your Data (and How to Solve Them)

Wed, 11/21/2018 - 13:30
Achieving high availability for data is tough. The best-laid data infrastructures often go awry (sorry, Steinbeck fans) for a variety of reasons, and they bring data availability down with them. What are those things that can go awry and prevent data high availability? And what can you do to stop or mitigate them? Let’s take a look at some of the obvious and not-so-obvious high availability problems you may encounter with your data infrastructure. 1. Infrastructure Failure Let’s begi...
Categories: News from Vendors

Data Transformation in Practice: 3 Real-World Data Transformation Examples

Tue, 11/20/2018 - 13:30
Data transformation is a buzzword you hear frequently in the age of big data (even though data transformation’s significance is not limited just to big data). And while it’s easy to define data transformation at a high level, understanding what data transformation means in practice can be trickier. If you’ve found yourself pondering what data transformation actually entails, keep reading for some real-world situations in which data needs to be transformed, and what the transfor...
Categories: News from Vendors

4 Big Data Infrastructure Pain Points and How to Solve Them

Mon, 11/19/2018 - 13:30
Making the most of big data requires not just having the right big data analytics tools and processes in place, but also optimizing your big data infrastructure. How can you do that? Read on for tips about common problems that arise in data infrastructure, and how to solve them. What Is Big Data Infrastructure Big data infrastructure is what it sounds like: The IT infrastructure that hosts your “big data.” (Keep in mind that what constitutes big data depends on a lot of factors; the ...
Categories: News from Vendors

New eBook! TDWI Checklist Report: Five Data Engineering Requirements for Enabling Machine Learning

Sat, 11/17/2018 - 13:30
Syncsort has released a new eBook, “Five Data Engineering Requirements for Enabling Machine Learning,” which is now available to download. Machine learning can provide a competitive advantage to those organizations that use it. As data volume and diversity grows, organizations will need to revisit their data management strategy to support machine learning. Making the jump from test and training environments to full production environments requires a smart data pipeline strategy. This...
Categories: News from Vendors

Real-Time vs. Batch Data Integration: Which is Better for Which Use Cases?

Thu, 11/15/2018 - 13:30
When it comes to big data, there are two main ways to process information. The first—and more traditional—approach is batch-based data integration. The second is real-time integration. Understanding which data integration strategy is the right fit for which situation is an important step for ensuring that you are processing big data in the fastest and most cost-effective way. Toward that end, let’s take a look at the differences between batch-based and real-time data integration, and expla...
Categories: News from Vendors

Engineering Machine Learning – 5 Short Webcasts to Help Create a Data Pipeline

Wed, 11/14/2018 - 13:30
Over the past month, Syncsort has released a series of short webcasts focused on Engineering Machine Learning. Making the hurdle from designing a machine learning model to putting it into production, is the key to getting value back – and the roadblock that stops many promising machine learning projects. After the data scientists have done their part, engineering a robust production data pipeline has its own set of tough problems to solve. See what our experts have to say in these 15-minute webc...
Categories: News from Vendors

Data Breaches Due to Unencrypted Information Represent a Huge Business Risk

Tue, 11/13/2018 - 13:30
Data breaches of unencrypted sensitive information occur often, and many are highly publicized. Businesses are thrust into the spotlight and scrutinized for scandalous lack of oversight and accountability around data security. And even though these breaches happen at the IT level, the burden and the blame for a data breach usually falls on C-level leaders such as the CEO or CIO. Customers question, “Why didn’t you protect my personal information?” and the leaders respond, “We didn’t think it wou...
Categories: News from Vendors

How to Improve Data Quality: 3 Real-World Examples

Mon, 11/12/2018 - 13:30
You hear a lot about data quality these days. But much of the discussion focuses on data quality at a high level, without much attention to what data quality looks like in a real-world context. This article aims to cut against that grain. Below, we take a look at three realistic examples of data quality issues that you might face in an everyday business environment. We also explain how to address them. Without further ado, onto those real-world data quality examples. Inaccurate Address Data Addr...
Categories: News from Vendors

New White Paper! Multi-Factor Authentication for IBM i

Sat, 11/10/2018 - 13:30
The basic IBM i policies that served in years past are no longer sufficient. Security breaches caused by passwords stored in unsecured locations, guessed passwords, or brute-force password attacks have compelled IT shops to implement stronger password management controls. Syncsort’s latest white paper, “Multi-factor Authentication for IBM i,” explores some options for today’s organizations. Because Multi-Factor Authentication requires users to provide at least two authent...
Categories: News from Vendors

Pages