Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • Downloads // Feb 2014

    AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Cloud Priorities 2014: Cloud strategies, priorities and implementation plans of North American IT leaders and professionals

    The ZDNet Cloud Priorities 2014 report, sponsored by Windstream, is a research study on cloud in North America and reports on the current and future adoption of the subject technology, the business objectives of adopters, and the experiences of those adopters. The report also covers current budgets and changes in...

    Sponsored By ZDNet

  • White Papers // Jun 2014

    Dell Case Study: Rich learning outcomes for digitally-connected students

    Somerville House has deployed personal notebooks to students for the past eleven years as part of their integrated approach to technology in education. The school wanted to give their students and teachers access to anytime, anywhere learning through devices with the capability for integrating richer data types into the learning...

    Sponsored By Brought to you by Dell and Intel® Core™ vPro™ processor family

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Dell Whitepaper: Critical Factors to Endpoint Security

    The modern threatscape of today is very different from the one that existed even five years ago in that organized crime and government operatives are aggressively funding, organizing and building significant offensive capabilities all focused on generating revenue or gaining a competitive advantage in the global economy. “Crimeware” can be...

    Sponsored By Brought to you by Dell and Intel® Core™ vPro™ processor family

  • Case Studies // Apr 2014

    Cloud Services for Dummies eBook

    For business leaders, cloud computing is a cost-effective way to leverage IT resources to prototype and implement strategic change. For your IT organization, the cloud allows it to be significantly more proactive and responsive when it comes to supporting strategic business imperatives. Learn how to take advantage of IaaS and...

    Sponsored By IBM

  • White Papers // Dec 2012

    Taming the Data Beast: Integrating Systems and Applications for a Better Business

    Businesses are inundated with data from a variety of systems. Customer relationship management (CRM), point-of-sale, Web analytics, logistics, customer support and many other systems create a nearly insurmountable of data that businesses are looking to turn into actionable information. Leveraging data is difficult enough, but tracking and managing change, auditing,...

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Enhance and optimize your mobility/BYOD infrastructure

    Wondering how to meet the needs of your growing mobile workforce without increasing security risks or administrative complexity? This new white paper outlines how Dell Mobility Solutions can help you increase mobile performance and capacity for mobility/BYOD initiatives while protecting company resources and streamlining IT management.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Sponsored By Global Knowledge

  • White Papers // Feb 2014

    Managing Data through Replication: Avoiding Errors, Improving Access

    CIOs and IT entities looking to secure data and ensure its availability during times of emergency could benefit from employing a data replication tool. Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it...

    Sponsored By Dell Software

  • White Papers // Feb 2014

    12 things effective intrusion prevention systems should do

    Do you know what to look for in an intrusion protection system? Read our e-book, “12 Things Effective Intrusion Protection Systems Should Do,” and learn to detect and block the latest generation of exploits used to attack computer systems and resist the most sophisticated evasion techniques.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Considerations for Owning vs. Outsourcing Data Center Physical Infrastructure

    When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes HIPAA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet HIPAA guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • eBooks // Feb 2014

    Help Desk Best Practices for IT Departments

    A help desk is critical to the operations of an IT department. As a centralized intake location for technical issues, it allows for a responsive and timely solution to get employees back to business as usual. In addition to handling immediate IT issues, a help desk performs several proactive tasks...

    Sponsored By LabTech Software

  • White Papers // Jun 2014

    Rethink Ink

    If there’s one constant in the world of IT, it’s that the workplace is changing. More than ever, IT needs to meet the demands of a highly distributed workforce that requires access to content and services around the clock and around the globe. And when it’s time to print, people...

    Sponsored By HP US

  • White Papers // Jul 2014

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Sponsored By HP US

  • White Papers // Jun 2014

    Securing and controlling data in the cloud

    The Securing and Controlling Data in the Cloud white paper evaluates the benefits of cloud computing, the security challenges posed by the cloud and provides recommendations to secure and control sensitive data in cloud environments.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Secure sensitive data encryption tech guide

    This report surveys the various encryption approaches for securing data at rest to understand what the technology does along with where each provides an optimal fit. After comparing the various encryption technologies, this paper explains why file level transparent data encryption provides the optimal balance of data type coverage, security,...

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Securing Big Data

    This White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal and within acceptable norms of performance vs. security tradeoffs.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Enterprise encryption architecture

    This white paper Enterprise Encryption Architecture explores data security threats and provides some encryption strategies in order to protect private and confidential information.

    Sponsored By Vormetric

  • White Papers // Jul 2014

    Data Centre Projects: System Planning

    Planning of a data centre physical infrastructure project need not be a time consuming or frustrating task. Experience shows that if the right issues are resolved in the right order by the right people, vague requirements can be quickly translated into a detailed design. This paper outlines practical steps to...

    Sponsored By APC by Schneider Electric

  • Case Studies // Apr 2014

    IDC Report - Managed Services: Business Value

    Research shows that today’s business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this analyst report to...

    Sponsored By IBM

  • White Papers // May 2014

    Journey to the Hybrid Cloud

    Cloud adoption continues to expand beyond the base of cutting-edge early adopters and is now reaching the "early mainstream" stage, increasingly being looked at by enterprises as a viable model for agile, cost-effective IT delivery. However, the prevailing binary paradigm of cloud infrastructure (public versus private) limits the extent to...

    Sponsored By VMware

  • White Papers // Jun 2014

    The Evolution of MEM Infographic

    Get up to speed quickly about Mobile Enterprise Management (MEM) in this insightful infographic. Find out what’s driving this evolution, and its benefits to end users and IT departments.

    Sponsored By Dell Software

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • White Papers // May 2014

    Maintaining AD: An Ounce of Prevention or Pound of Cure?

    Read about three commonly overlooked tasks by administrators that can improve Active Directory (AD) performance: monitoring replication, recovering objects and cleaning the database. Find out how to do these quickly and easily.

    Sponsored By Dell Software

  • White Papers // Jul 2011

    How Data Center Infrastructure Management Software Improves Planning and Cuts Operational Costs

    Business executives are challenging their IT staffs to convert data centers from cost centers into producers of business value. Data centers can make a significant impact to the bottom line by enabling the business to respond more quickly to market demands. This paper demonstrates, through a series of examples, how...

    Sponsored By APC by Schneider Electric

  • White Papers // Nov 2013

    Best Practices Guide for IT Governance & Compliance

    Federal regulations require businesses to know exactly what changes are made to structured and unstructured data within their corporate networks. Learn how the best practices for implementing a compliance solution in this white paper can help you minimize stress during your next IT compliance audit.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Classification of Data Center Infrastructure Management (DCIM) Tools

    Data centers today lack a formal system for classifying software management tools. As a result, confusion exists regarding which management systems are necessary and which are optional for secure and efficient data center operation. This paper divides the realm of data center management tools into four distinct subsets and compares...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    AT&T and IBM's Private Cloud Partnership:  From Competition to Coopetition

    IBM and AT&T have joined forces to create a compelling network-enabled private cloud offering that addresses security, performance and reliability -- concerns that have caused many large enterprises to put off migration to cloud. Read this analyst report to see just what this offering means to its target market: global...

    Sponsored By IBM

  • White Papers // Apr 2012

    Data Center Projects: Advantages of Using a Reference Design

    It is no longer practical or cost-effective to completely engineer all aspects of a unique data center. Re-use of proven, documented subsystems or complete designs is a best practice for both new data centers and for upgrades to existing data centers. Adopting a well-conceived reference design can have a positive...

    Sponsored By APC by Schneider Electric

  • eBooks // Apr 2014

    Best Practices for Choosing the Right Accounting Software

    Is your accounting software holding you back? Maybe it's time to trade in your aging infrastructure and embrace a new generation of cloud-based financial systems that streamline your processes, improve productivity, and generate greater insights and visibility. As you embark on a challenging evaluation cycle, download our free...

    Sponsored By Intacct

  • White Papers // May 2014

    Modern Mobile World: Evolving Your IT Services Offering

    To stay competitive, IT solution providers must evolve their IT services offering and embrace the modern needs of mobility through service-oriented and mobile safeguard technology. Get enabled to answer the IT service calls of clients wanting to get connected to their data, stay connected to their data and ensure they...

    Sponsored By LabTech Software

  • Downloads // Jan 2014

    Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

    Sponsored By SolarWinds

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2013

    Tips for Choosing a Cloud Service Provider

    For many enterprises, the cloud is no longer a curiosity, but an opportunity to transform IT. As they think beyond one or two isolated workloads, their criteria in selecting a cloud provider become more stringent. To meet business goals for efficiency, cost-reduction, and simplification of processes, enterprises must look for...

    Sponsored By IBM

  • White Papers // Jul 2014

    The business of social business.

    A new IBM Institute for Business Value study reveals how organizations can use social approaches to create meaningful business value.

    Sponsored By IBM

  • White Papers // Jan 2014

    Avoiding the pitfalls of outdated disaster recovery plans: Evolving business expectations and threats may require new disaster recovery approaches

    IBM has identified seven outdated assumptions on which many organizations base their disaster recovery plans. This white paper lists them and discusses how to modernize disaster recovery operations.

    Sponsored By IBM

  • White Papers // Jul 2014

    Evolution: Business Resiliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency...

    Sponsored By IBM

  • White Papers // Jul 2014

    A Successful Roadmap to Cloud

    Watch the video “Building a Successful Roadmap to the Cloud” to learn how a cloud roadmap can: Ensure that your cloud decisions work together to maximize the overall value to your business Give you greater control over security, performance, and consistency of your cloud workloads Protect...

    Sponsored By IBM