Data transformation

Results: 541



#Item
291Precision agriculture / Tom Vilsack / Farm / Agricultural science / Iowa / Human geography / Agriculture

The Digital Transformation of Row Crop Agriculture A “Big Data” Project Report for the Iowa AgState Group December 2014

Add to Reading List

Source URL: www.iowacorn.org

Language: English - Date: 2014-12-16 11:20:25
292Information technology governance / Data analysis / Information technology management / Data governance / Data quality / Business intelligence / Data warehouse / National Information Exchange Model / Data model / Data management / Information / Data

Collaboration & Transformation Financial Management Committee DATA Act Co-Leads: Herschel Chandler, [removed] KC McHargue, [removed]

Add to Reading List

Source URL: www.fiscal.treasury.gov

Language: English - Date: 2014-09-30 08:42:19
293Disk encryption / Data security / Computer security / Information security / Encryption / Key management / Hardware-based full disk encryption / Security / Cryptography / Safenet

Key Management for Encryption Solution Brief Secure, High Assurance with Nutanix and SafeNet The Federal Data Center Consolidation Initiative isn’t just about consolidation, it’s about transformation. Sleek virtual

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2014-12-15 05:04:10
294Cloud storage / Data center / Data management / Distributed data storage / Networks / Infrastructure / Shared services / Procurement / Concurrent computing / Distributed computing / Business

Transformation Initiatives: Status Update Presentation to the Information Technology Infrastructure Roundtable November 12, 2013 Grant Westcott, Chief Operating Officer

Add to Reading List

Source URL: ssc-spc.gc.ca

Language: English - Date: 2013-11-13 14:32:29
295Management / Business intelligence / Data management / Intelligence / Strategic management / Business architecture / Infrastructure optimization / SAP AG / Business technology management / Information technology management / Enterprise architecture / Business

Department National Defence (DND) Defence Renewal Defence Business Management Capability Transformation (DBMCT) Proof of Concept (POC)

Add to Reading List

Source URL: www.fmi.ca

Language: English - Date: 2014-12-11 11:16:27
296Cyberwarfare / Data security / Crime prevention / National security / Vulnerability / Cyber-security regulation / Information security / Security / Computer security / Computer network security

Shared Services Canada Cyber and IT Security Framework Presentation to the Information Technology Infrastructure Roundtable October 7, 2014 Benoît Long, Senior Assistant Deputy Minister, Transformation,

Add to Reading List

Source URL: ssc-spc.gc.ca

Language: English - Date: 2014-12-09 13:26:22
297Enterprise application integration / Middleware / SEEBURGER / Information technology management / Software as a service / Data center / Infrastructure optimization / Computing / Cloud computing / Concurrent computing

SEEBURGER Community Cloud Services Transfer and transformation between trading partners without added infrastructure Ensure communication without complexity and

Add to Reading List

Source URL: www.seeburger.com

Language: English - Date: 2014-01-07 12:46:14
298Data warehousing / Data management / Data transformation / Metadata / Flow / Call report / XML / Data extraction / Spreadsheet / Computing / Data / Information

Call Report Filing Blueprint (CRFB) THE REGULATORY IMPERATIVE Regulated financial institutions worldwide are required to file periodic financial and other information with their respective public regulators. The resultin

Add to Reading List

Source URL: www.datawatch.com

Language: English - Date: 2014-06-18 07:26:47
299Behavioral finance / Statistical inference / Mathematical finance / P/E ratio / Bootstrapping / Robert J. Shiller / Beta / Efficient-market hypothesis / Standard deviation / Statistics / Financial ratios / Data analysis

--title: "Stock-Market Return Predictability: An Unwise Data Transformation, and Saved by the Bootstrap" author: J. Bradford DeLong date created: September 7, 2014 output: html_document --####September 7, 2014 :: UC Berk

Add to Reading List

Source URL: delong.typepad.com

Language: English - Date: 2014-09-10 16:17:59
300Data security / Information security / National security / Safety / Computer security / Crime prevention

Transformation Model Work Plan Developing and increasing teacher and school leader effectiveness Steps for Implementing the Requirements Narrative that explains how the LEA will meet each requirement Time Line for Imple

Add to Reading List

Source URL: wvde.state.wv.us

Language: English - Date: 2010-07-09 13:52:29
UPDATE