Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • White Papers // Sep 2014

    Get Maximum Benefit from Windows Server 2012

    Microsoft Windows Server 2012 is poised to be the cornerstone of today’s more modern, scalable and functionally advanced IT environment. Getting the maximum benefit from the operating system starts with having a clear understanding of all the potential advantages Windows Server 2012 can provide. Download this CIO Guide to learn...

    Sponsored By Dell and Intel® Core™ vPro™ processor family

  • Research // Sep 2014

    Scale Your Data Center - Right into the Cloud

    Ignoring the cloud is no longer an option. The potential benefits in agility and efficiency are simply too great. But turning your data center into a private cloud can be complex. Intel, Microsoft and Dell have found the solution to this major challenge. Download this report to learn how you...

    Sponsored By Dell and Intel® Core™ vPro™ processor family

  • White Papers // Sep 2014

    6 Strategies for Gaining Cost-effective Efficiency with Private Clouds

    Organizations are transitioning to a private cloud to reduce costs, save time, and increase productivity, especially when the effort is coupled with a Business Service Management approach and highly efficient servers. This article reviews the challenges, approaches, and results associated with a move to a private cloud and suggests 6...

    Sponsored By Dell and Intel® Core™ vPro™ processor family

  • Research // Sep 2014

    IDC Server Innovation for Enterprise Datacenters

    With IT environments growing in size, scale, and complexity, CIOs and IT managers are supporting mission-critical business processes with demanding service-level agreements (SLAs) for internal and external customers. This IDC research examines the primary benefits of working with vendors investing in solutions that can process, support, and manage mission-critical...

    Sponsored By Dell and Intel® Core™ vPro™ processor family

  • Research // Sep 2014

    IDC 13G Overview White Paper

    Industries have seen tremendous change in the dynamics of IT datacenters and workloads. But companies require servers that can deliver faster application performance, provide better availability to meet stringent SLAs, handle complex and evolving workloads, and maximize operational efficiency. This white paper also outlines how Dell is delivering improvements in...

    Sponsored By Dell and Intel® Core™ vPro™ processor family

  • Downloads // Feb 2014

    AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

    Provided By Dell Software

  • White Papers // Apr 2014

    Cloud Priorities 2014: Cloud strategies, priorities and implementation plans of North American IT leaders and professionals

    The ZDNet Cloud Priorities 2014 report, sponsored by Windstream, is a research study on cloud in North America and reports on the current and future adoption of the subject technology, the business objectives of adopters, and the experiences of those adopters. The report also covers current budgets and changes in...

    Provided By ZDNet

  • White Papers // Jun 2014

    Dell Case Study: Rich learning outcomes for digitally-connected students

    Somerville House has deployed personal notebooks to students for the past eleven years as part of their integrated approach to technology in education. The school wanted to give their students and teachers access to anytime, anywhere learning through devices with the capability for integrating richer data types into the learning...

    Provided By Dell and Intel® Core™ vPro™ processor family

  • Downloads // Jul 2004

    Microsoft Access Help Desk Database

    Use this sample Microsoft Access Help Desk database as a simple substitute for commercial help desk software. It provides pertinent customer information with tabs to track call details as well as create reports.

    Provided By TechRepublic

  • White Papers // Jun 2014

    Dell Whitepaper: Critical Factors to Endpoint Security

    The modern threatscape of today is very different from the one that existed even five years ago in that organized crime and government operatives are aggressively funding, organizing and building significant offensive capabilities all focused on generating revenue or gaining a competitive advantage in the global economy. “Crimeware” can be...

    Provided By Dell and Intel® Core™ vPro™ processor family

  • White Papers // Mar 2014

    Tips to improve the mobile app experience over Wi-Fi

    As the growing number of people who are using their mobile device access apps at work through Wi-Fi networks, there is an increasing demand on the quality of Wi-Fi signals to improve users’ mobile app experience. This executive brief presents us with 5 tips for ensuring mobile apps run flawlessly....

    Provided By Aruba Networks

  • White Papers // Jul 2013

    2013 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Provided By IBM

  • eBooks // Apr 2014

    BPM for Dummies

    Business Process Management For Dummies, IBM Limited Edition, shows you what BPM is and how it can help your organization. You see how the BPM solutions from IBM help you gain many benefits from higher customer satisfaction to greater agility in adapting to changing market conditions. Chapter 1:Understanding...

    Provided By IBM

  • White Papers // Dec 2012

    Taming the Data Beast: Integrating Systems and Applications for a Better Business

    Businesses are inundated with data from a variety of systems. Customer relationship management (CRM), point-of-sale, Web analytics, logistics, customer support and many other systems create a nearly insurmountable of data that businesses are looking to turn into actionable information. Leveraging data is difficult enough, but tracking and managing change, auditing,...

    Provided By Dell Software

  • White Papers // May 2014

    Managing applications in the age of BYOA: Reclaiming IT's strategic role

    This research report delivers the information you need to manage apps and reclaim your strategic role in the enterprise. You’ll learn: How the risks of the BYOA trend are accelerating Why IT departments are being sidelined Strategies for protecting your most important data How to...

    Provided By LogMeIn

  • White Papers // May 2014

    Cisco WebEx Meeting Center

    Cisco WebEx Meeting Center is the easy-to-use, low-cost way to share ideas with anyone, anywhere, anytime, from any device. Collaborate over the web with remote employees, customers, and suppliers. Deliver presentations, demonstrate applications and update spreadsheets. Save time and money on travel — conduct regular meetings...

    Provided By Cisco Systems

  • eBooks // May 2014

    IBM PureData System E-Guide

    Every business would like to spend more time focused on improving productivity and less on routine maintenance tasks that keep the status quo. Unfortunately, most IT departments spend the bulk of their time and budget on doing just that – keeping the lights on and fighting fires. That is...

    Provided By IBM

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // May 2014

    5 Things You Didn’t Know About Cloud Backup

    IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. For example, did you know: That encryption doesn’t guarantee privacy? That you could lose data by choosing the wrong cloud? That cloud backup doesn't have to be slow? Learn...

    Provided By Druva

  • White Papers // Jun 2014

    Rethink Ink

    If there’s one constant in the world of IT, it’s that the workplace is changing. More than ever, IT needs to meet the demands of a highly distributed workforce that requires access to content and services around the clock and around the globe. And when it’s time to print, people...

    Provided By HP US

  • White Papers // Jul 2014

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Provided By HP US

  • White Papers // Mar 2013

    SPSS Stastics White Paper: The Risk of Using Spreadsheets for Statistical Analysis

    While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they’re not designed to perform, or for a task beyond the limit of their capabilities, using spreadsheets can be risky. Read this paper to learn about more powerful yet...

    Provided By IBM

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Provided By IBM

  • White Papers // May 2014

    Why you need a next-generation firewall?

    Security threats and cyber attacks are very common nowadays. This report explores the top technology and business objectives today as well as provides options to help the risk-exposed take action to protect your business. Discover how HP solutions helped organisations in protecting business assets.

    Provided By HP

  • White Papers // Nov 2004

    SQL Server 2000 Enterprise Edition (64-bit): Advantages of a 64-Bit Environment

    HP has partnered with Microsoft to provide information about the advantages of a 64-Bit Environment. Microsoft SQL Server 2000 Enterprise Edition (64-bit) offers dramatic improvements in memory availability and parallel processing performance compared with SQL Server software running in a 32-bit environment. This paper describes the capabilities of the 64-bit...

    Provided By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    12 things effective intrusion prevention systems should do

    Do you know what to look for in an intrusion protection system? Read our e-book, “12 Things Effective Intrusion Protection Systems Should Do,” and learn to detect and block the latest generation of exploits used to attack computer systems and resist the most sophisticated evasion techniques.

    Provided By Dell Software

  • White Papers // Jul 2008

    Application Retirement: Road Map for Legacy Applications

    As technology becomes obsolete and organizations deploy new applications, many enterprise applications wind up outliving their usefulness and become known as a "Legacy application". Every organization needs to be actively looking at their IT portfolios for applications, systems, and platforms that cost them more to maintain than the value they...

    Provided By Solix Technologies

  • Downloads // May 2009

    Create your own yum repository

    Vincent Danen explains how to create your own yum repository with the createrepo tool. One thing it allows you to do is to distribute specialized packages within an organization.

    Provided By Vincent Danen

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • White Papers // Jun 2014

    HP Data sheet: IT process automation across physical, virtual, and cloud architectures

    In this report HP Data sheet: IT process automation across physical, virtual, and cloud architectures brings some insights on how to overcome the increasingly complex data centre challenges and implement a successful IT process automation.

    Provided By HP US

  • White Papers // Feb 2014

    Insights from the Value Chain Synchronization Study

    Read this executive summary of the Value Chain Synchronization study which gathered insights from 700 companies worldwide and was conducted for IBM by Vanson Bourne.

    Provided By IBM

  • Downloads // Jul 2006

    Download Savvion's Free Business Process Modeling Software

    The first step in improving your business processes is to articulate precisely where bottlenecks exist, and the most efficient way to do that is by simulating your existing processes using business process modeling software. To help you get started, Savvion offers its Process Modeler, a component of Savvion BusinessManager,...

    Provided By Savvion

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Mar 2007

    Create a Process Documentation Guide: Developing a Template That Can Be Used to Document Any Process

    Document the processes by creating a template for the process documentation guide that includes the following items: scope statement, applicability matrix, product lines impacted, process roles involved, process management system procedures, exception management process, and decision matrix. This paper explores how to create a template for the process documentation guide....

    Provided By IBM

  • White Papers // Apr 2014

    Top 5 Reasons to Deploy Desktops as a Service

    No, the personal computer isn't dead, but it looks a whole lot different than it did just a few years ago. Even though organizations need to upgrade or replace many of their client systems, those physical units increasingly are being replaced by virtual machines. Desktops as a service (DaaS) may...

    Provided By Desktone

  • White Papers // May 2014

    Journey to the Hybrid Cloud

    Cloud adoption continues to expand beyond the base of cutting-edge early adopters and is now reaching the "early mainstream" stage, increasingly being looked at by enterprises as a viable model for agile, cost-effective IT delivery. However, the prevailing binary paradigm of cloud infrastructure (public versus private) limits the extent to...

    Provided By VMware

  • White Papers // Jan 2014

    AT&T and IBM's Private Cloud Partnership:  From Competition to Coopetition

    IBM and AT&T have joined forces to create a compelling network-enabled private cloud offering that addresses security, performance and reliability -- concerns that have caused many large enterprises to put off migration to cloud. Read this analyst report to see just what this offering means to its target market: global...

    Provided By IBM

  • Downloads // Feb 2005

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic

  • Downloads // Jan 2006

    Troubleshoot 10 common Exchange problems with these expert answers

    This list outlines 10 common Exchange problems and solutions. This handy two-page list outlines 10 familiar Exchange problems and an assortment of solutions. From user access errors to mail delivery problems, this list is great quick reference for every Exchange administrator.Here's a sample:Number 1: Users cannot access server. -...

    Provided By TechRepublic

  • Downloads // Dec 2005

    10 common SQL Server problems and solutions

    This list outlines 10 common SQL Server problems and solutions. This handy two-page list outlines 10 familiar SQL Server problems and an assortment of solutions. From "Out of Space" errors to a database going suspect, this list is great quick reference for every SQL administrator.Here's a sample:Number 1: Users...

    Provided By TechRepublic