Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 3000 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Teradata, Information Builders roll out BI appliance

April 29 2011

Teradata and Information Builders have developed a data warehousing package that bundles the latter's WebFOCUS BI (business intelligence) software with a Teradata analytic appliance, the companies announced Friday.

The product will allow customers to get a data warehousing platform up and running more quickly, the companies said.

Pricing starts at under US$550,000 for the package, which also includes Information Builders' iWay DataMigrator tool for data extraction, transformation and loading. This means customers can use the same metadata "in both the warehouse building and usage phases, accelerating warehouse implementation," the companies said in a statement.

Appliances can be tested on-site with a customer's own data, it adds.

Some new professional services for the appliances are also available. Pricing ranges from $50,000 "for simple query and report development" up to $550,000 for "data model development and deployment," according to a statement.

The announcement reflects a growing trend toward "analytic solution appliances" aimed at specific purposes, Forrester Research analyst James Kobielus wrote in a recent report.

Teradata had already been selling a number of Accelerate data warehousing packages. Some target areas like finance and marketing, while others aim at verticals such as health care and gaming. IBM and Oracle also sell a variety of tailored appliances.

Still, the market for these products is not yet mature, and the range of product choices is limited, according to Kobielus.

In addition, customers "must recognize that some assembly will be required before you can realize the promise of quick business value," he wrote. "Depending on the amount of custom code you and your systems integrators need to write and the range of complementary solutions you need to deploy, these prepackaged appliances may not appreciably accelerate project delivery over and above the traditional bespoke approach."

Sours From

View more news

 
  Most Popular
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html