Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Can Microsoft’s SQL Server 2014 Compete with SAP HANA?

2/06/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmzkvndgvmc9mawxlil0swyjwiiwidgh1bwiilci2mdb4ndawxhuwmdnlil1d

CEO Satya Nadella took the lid off several new innovations from Microsoft with the launch of SQL Server 2014. But what’s got many people buzzing is the so-called “big data in a box” appliance that could help Microsoft compete against the likes of SAP.

SQL Server 2014 is the latest version of the industry’s most deployed database. After announcing the new software, Nadella shared the company’s path to deliver a platform for the next era of “ambient intelligence.” Ambient intelligence deals with electronic environments that are both sensitive and responsive to people’s presence. It’s one vision for the future of consumer electronics.

“Developing the ability to convert data into the fuel for ambient intelligence is an ambitious challenge. It requires technology to understand context, derive intent and separate signal from noise,” said Nadella. “Building out a comprehensive platform that can enable this kind of ambient intelligence is a whole company initiative that we are uniquely qualified to undertake.”

The Benefits of Big Data

At the launch event, Nadella stressed the importance of a data culture — one that encourages curiosity, action and experimentation — for everyone and every organisation. Also showcased were the results of a new IDC study that demonstrates the clear benefits for companies that take a comprehensive data approach. Specifically, these companies realise an additional 60 percent return on data assets. IDC figures it’s a $1.6 trillion opportunity worldwide.

“Customers who take a comprehensive approach to their data projects realise a higher data dividend than customers who take a point-by-point approach,” said Dan Vesset, program vice president, Business Analytics and Big Data, at IDC. “This new research shows that by combining diverse data sets, new analytics and insights to more people — at the right time — businesses worldwide can tap into a more than trillion-dollar opportunity over the next four years.”

This article has been extracted from http://www.cio-today.com, please click on this link to read the article in full http://www.cio-today.com/article/index.php?story_id=0010004CMZGR

Montash is a multi-award winning, global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...