Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • Podcasts // Jan 2013

    Encryption - Encrypt Data Written to Removable Storage Devices

    Database users and applications need not be aware of the fact that the data they are accessing is stored in encrypted form. In this podcast, the speaker going to explain how to enforce encryption for files written to removable storage devices.

    Provided By Novell

  • Podcasts // Jan 2013

    Get into the Cloud: Novell Cloud Manager Overview

    Chances are the users' data center is a lot more complicated (and expensive) than it has to be. Cloud computing can help simplify things, and lower their IT costs dramatically, but it feels way too risky to a lot of people. In this podcast, learn how Novell cloud manager can...

    Provided By Novell

  • Podcasts // Jan 2013

    BSM in the Cloud With Forrester Research Part 1: Managing an End-to-End View Made Simple

    Take advantage of the flexibility and cost reductions virtualizing the people environment brings. In this podcast, learn how to remove the risk of a service impacting event and enjoy further cost reductions in management of their virtualized environment.

    Provided By Novell

  • Podcasts // Jan 2013

    Rethink Your Disaster Recovery Plan

    Many disaster recovery plans are not up to the complex task of protecting physical server workloads on multiple platforms. In a challenging economy, the business risks associated with downtime - lost revenue opportunity, customer loyalty, and productivity - are even greater. In this podcast, learn how solutions leverage virtualization to...

    Provided By Novell

  • Podcasts // Jan 2013

    Storage Control - Enforce Read Only Access and Disable Removable Storage Devices

    In this podcast, the speaker going to discuss about the storage device control which enforce read only access and disable removable storage devices. And also learn how to disable storage, enforce to read only access to storage and white list storage devices.

    Provided By Novell

  • Podcasts // Jan 2013

    Introducing NetIQ Cloud Manager 2.0 Web Seminar

    In this podcast, learn about the easiest and most secure way to build and manage the users' private cloud. The speaker will also discuss about the consumerization of IT along with the service delivery in the enterprise.

    Provided By Novell

  • Podcasts // Jan 2013

    Provisioning Business Services With Cloud Manager

    It takes too long to provision new business services. IT provisioning processes are manual, error-prone and poorly coordinated. In this podcast, learn how the user can provision business services faster using the automated workflows and provisioning engine in Novell cloud manager.

    Provided By Novell

  • Podcasts // Oct 2013

    Transforming Your Datacenter with Cloud

    Click now to hear how enterprise organizations are transforming their data center into a cloud and the types of workloads they are running.

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Why care about managed services? Transformational benefits, that's why

    This mini paper and podcast features Lynn Koch discussing the benefits of managed services.

    Provided By IBM

  • Podcasts // Nov 2013

    Private clouds have come of age

    With CIOs and IT managers increasingly challenged to do more with less, they really need to be selective about their investments. Many are turning to private clouds.

    Provided By IBM

  • Podcasts // Dec 2014

    Data Loss Prevention: Databases and Web Loss

    In this podcast, the speaker will explain about data loss prevention and Web loss. In this podcast, speaker will cover topics like SQL Misuse, cross-site scripting, Web scanning, honeypots etc.

    Provided By SecurityTube.net

  • Podcasts // Dec 2014

    Identifying Web Attacks Via Data Analysis

    In this podcast, the speaker will look at detection of SQL injection using machine learning as well as profiling web traffic to find misbehaving hosts. The goal is to get beyond "Top N" types of analysis and begin using multiple features to guide the users towards interesting traffic.

    Provided By SecurityTube.net

  • Podcasts // Jun 2014

    Xen Mobile 9 Device Manager Cluster Upgrade

    With the Release of Xen Mobile 9, the legacy tomcast (multicast) clustering feature is being replaced with a multi-node direct connection to the database architecture. It removes the need of multicast broadcast providing a more scalable and enhanced environment.

    Provided By Citrix Systems

  • Podcasts // Nov 2013

    PHD Virtual Recovery Time Actual (RTA) Tool

    In this podcast, the speaker describes the new free Recovery Time Actual (RTA) tool that PHD virtual created to allow IT professionals to calculate and determine their actual recovery time objectives within a matter of seconds or minutes.

    Provided By DABCC

  • Podcasts // May 2013

    Asynchronous Replication for Disaster Recovery

    DataCore offers a unique long-distance replication feature ideally suited for a Disaster Recovery (DR) project. Asynchronous Remote Replication (ARR) uses standard IP protocols to replicate virtual disks between storage servers, checked summed and compressed. ARR can be used over any of the server's network connections to implement replication over an...

    Provided By DABCC

  • Podcasts // Mar 2013

    CloudHook: Configuring Cloud Backup Storage

    PHD Virtual Backup & Replication Version 6.2 introduces CloudHook, which selects the user store their virtual machine backup in the cloud. CloudHook is the first virtual data protection solution to offer a seamless link to cloud storage for backup, archiving and disaster recovery.

    Provided By DABCC

  • Podcasts // Feb 2013

    Enhanced Backup and Recovery for VMware vCloud Director

    Veeam has revealed enhanced backup and recovery for VMware vCloud Director (vCD). Using the vCD API, Veeam will display the vCD infrastructure directly in Veeam backup & replication, backup all vApp metadata and attributes, and restore vApps and VMs directly to vCD.

    Provided By DABCC

  • Podcasts // Feb 2013

    Splunk App for Citrix XenApp

    The Splunk for Citrix XenApp allows administrators to very easily correlate data across all components of all the user's XenApp deployments. When a performance issues arises, this 360 degree view provides a concise and detailed snapshot of any point in time, allowing administrators to quickly pinpoint and resolve any issues.

    Provided By DABCC

  • Podcasts // Jan 2013

    How to Successfully Deploy VMware vSphere Storage Appliance 5.1 in Brownfield Deployments

    In Brownfield deployments the VMware vSphere Storage Appliance (VSA) is used to create VSA clusters on existing ESXi hosts that have running virtual machines running on their local data stores. In order to successfully deploy and configure a VSA cluster in a Brownfield environments with zero or minimal down-time the...

    Provided By DABCC

  • Podcasts // Jan 2013

    How, When and Why to Recommend Software Storage Virtualization

    In this podcast, the speaker will explore how the installation of DataCore SANsymphony-V removes storage-related roadblocks to virtualization deals, How one installation of DataCore SANsymphony-V can dramatically speed up the adoption and standardization of virtual infrastructures and when budgets have changed, installation of SANsymphony-V means that the user don't have...

    Provided By DABCC

  • Podcasts // Jan 2013

    Overcoming the Performance Hurdle - Optimize and Virtualise Your Critical Apps

    In this podcast, the speaker explains about overcoming the performance hurdle and how to optimize and virtualized the users' critical business applications with the use of DataCore's SANsymphony-V Storage Hypervisor. Understand the demands of Tier-1 applications such as Sharepoint, SQL server, SAP, or any application that requires high availability, scalability,...

    Provided By DABCC

  • Podcasts // Jan 2013

    Virsto Technical Architecture Overview

    Virsto software is purpose built to unlock the potential of existing block and SSD storage in virtualized environments. The Virsto Storage Hypervisor is essential to achieve the potential of software defined storage. Virsto provides differentiated data services at the per-VM level - such as high performance snapshots, clones, and thin...

    Provided By DABCC

  • Podcasts // Dec 2012

    Database and Hadoop as a Service with VMware Data Director

    VMware Data Director allows administrators to create standardized database templates for virtualized deployment on vSphere, enabling end users to self-service perform routine tasks like provisioning, refresh, backup, and restore. Data Director supports Oracle, SQL server, Postgres, and Hadoop.

    Provided By DABCC

  • Podcasts // Dec 2012

    Veeam Backup Management Suite 6.5 - Advanced Monitoring for Backup

    Veeam Backup Management Suite offers capabilities that make it easier than ever to know the user's virtual environment is protected. With 24x7 monitoring of the backup infrastructure and features that let the user easily identify unprotected VMs, optimize backup resources, automatically document backup status, and more.

    Provided By DABCC

  • Podcasts // Jan 2014

    There's Gold in Them Thar Package Management Database

    There is a lot of useful file metadata stored in package management databases for popular Linux distributions. The RedHat Package Manager (RPM) and Debian's dpkg are two examples. In this podcast, the speaker focus on how to leverage RPM in forensic investigations, as it can provide a quick and effective...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    The DevOps of Everything

    Although the movement started out as a problem statement to solve developer and operations collaboration, it quickly moved into other disciplines such as security, networking and storage. In this podcast, the speaker will take a look at the DevOps affect on things like converged infrastructure, software defined networking, software defined...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Autoscaling Web Application Security in the Cloud

    Securing web applications has placed extreme demands on security professionals - in addition to understanding attack patterns and defense tactics, effectively protecting web apps requires some level of programming and database management expertise. With broad adoption of public clouds, this bar is rising once again. Today's cloud enabled applications scale-up...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Bringing a Machete to the Amazon

    With concrete examples and new techniques in this podcast, the speaker will explore \"Full stack\" vulnerabilities and their effect on security and how they create new pitfalls when migrating to and operating in an Amazon Web Services (AWS) world. From the simple (checking in the user AWS credentials to github...

    Provided By SecurityTube.net

  • Podcasts // Oct 2014

    CMOD Customer Self Service Animated Video

    An animated video showing how IBM Content Manager OnDemand drives customer engagement to increase satisfaction, raise ROI

    Provided By IBM

  • Podcasts // Sep 2014

    Blended Web and Database Attacks on Real-time, In-Memory Platforms

    It is well known there is a race going on in the \"Big data\" arena. One of the stronger competitors in the \"Big data\" market is real-time, in-memory platforms. An interesting thing about this platform and, the one the speakers will explain about specifically, is that it blends everything to...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    IBM SmartCloud Entry for Power Systems

    The IBM SmartCloud™ Entry on Power Systems™ solution provides a cost-competitive, entry-level private cloud solution that helps speed time to value of your service deployments on your IBM Power Systems servers.

    Provided By IBM

  • Podcasts // Jan 2014

    The Manager of Managers Approach to Running Your IT Environment Virtual Event

    Do you have a single console to view, control, and manage your IT environment? Is automation built into your monitoring strategy? As IT environments become more dynamic, your operations teams need a unified view for management and monitoring. Automatic detection, and automated monitoring setup and configuration are two ways to...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    McKesson Cloud Automation Podcast

    Download the podcast on how McKesson accomplished a multi-year, pan-IT management transformation. Learn how McKesson's performance journey, from 2005 to the present, has enabled it to better leverage an agile, hybrid cloud model. How McKesson gained a standardized services orientation to achieve agility in deploying its many active applications is...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    Virtual Event: SaaS and codeless configuration for the service desk. What you need to know.

    Moving to a SaaS-based service desk platform is the rage, but what is best for your organization? This expert perspective session will explore the pros and cons of SaaS-based service desk platforms, including cost-savings benefits, when and why to do it, and important considerations. We’ll also discuss codeless configuration, which...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    Virtual Event: Test without writing a single line of code…really

    Testing business-critical packaged applications is a high priority for many organizations. These applications must meet the same aggressive project time frames and operations benchmarks as internally-developed software. In this session, you will learn how Turnkey Solutions is helping Iron Mountain increase the speed and effectiveness of its packaged apps testing...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Feb 2014

    Using the IBM PureApplication System and patterns of expertise for consolidation, optimization, innovation and cloud acceleration

    IBM PureApplication System environments employ embedded patterns that deliver all of the expertise needed to deploy, manage and maintain an application. IT departments can save time and eliminate risk while gaining an efficient deployment option that ensures configuration consistency.

    Provided By IBM

  • Podcasts // Jan 2014

    BYOEF Video

    Learn how build your own a highly resilient, high-performance Brocade Ethernet fabric.

    Provided By Brocade

  • Podcasts // Jan 2014

    Building A Successful Roadmap to Cloud

    To get the most from your cloud experience, you need a roadmap. Watch the video “Building a Successful Roadmap to the Cloud” to learn how a cloud roadmap can: Ensure that your cloud decisions work together to maximize the overall value to your business Give you greater...

    Provided By IBM

  • Podcasts // Jan 2014

    NetBackup 7.5 Replication Director

    NetBackup 7.5 now offers replication director which integrates and unifies the management and recovery of array-based snapshots and replicated snapshots across the entire backup environment reducing complexity and costs while improving SLA performance.

    Provided By SYMA S.C.

  • Podcasts // Jan 2014

    NetBackup 7.5 Accelerator

    NetBackup accelerator dramatically reduces the time it takes to do backups by eliminating the scan to determine file change percentages, leveraging client-side de-duplication, and then synthetically constructing a full backup image - with full recovery.

    Provided By SYMA S.C.