Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • Webcasts // Jan 2014

    Live Webcast - Wakeup Call: A survival guide for the changing face of customer service

    Join us for this LIVE event! Thursday, February 13th 10:00 AM PDT / 1:00 PM EDT Almost everything you know about customer service is wrong ‒ or will be soon. Soon, very soon, Gen Y consumers (the famed Millennials) will hit service providers with a force larger than...

    Provided By Citrix Online

  • Webcasts // Jan 2014

    Live Webcast - Guarantee Growth: Leveraging Neuroscience for Predictable Revenue, Passionate Teams & Profitable Growth

    Join us for this LIVE event! Thursday, February 13th 9:00 AM PDT / 12:00 PM EDT Are you consistently growing revenues and profits each year? Are your team members highly efficient, energized and emotionally engaged? Are your salespeople able to accurately predict their performance? In today’s highly competitive...

    Provided By Citrix Online

  • Webcasts // Jan 2014

    On-demand Webcast: 5 Key Components to Improve Service & Maintenance Costs with a Standard Operating Environment (SOE)

    Enterprise IT organizations today require more flexible IT services, greater capacity, and tighter service-level agreements (SLAs). All while system management requirements are becoming more complex and associated compliance and audit overhead is increasing. It is more important than ever to increase IT operational efficiency by streamlining deployment and management of...

    Provided By Red Hat

  • Webcasts // Jan 2014

    Socially Owned in the Cloud

    In this webcast, the presenter will present a survey of the most popular cloud/web applications and their responses to a questioner regarding their data retention, data ownership, their commercial use of the data they have harvested.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    How to Use SQLNINJA to Takeover MS-SQL Database Servers

    In this podcast, the user will learn how to exploit MS-SQL. The speaker will explore advanced MS-SQL Database. For Exploiting a MS-SQL Database Hoody is using a tool called SQLNINJA. SQLNINJA is a very powerful SQLI exploitation tool.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Transcending Cloud Limitations By Obtaining Inner Piece

    With the abundance of cloud storage providers competing for the users' data, some have taken to offering services in addition to free storage. In this webcast, the presenter demonstrates the ability to gain unlimited cloud storage by abusing an overlooked feature of some of these services.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hivemind: Distributed File Storage Using Javascript Botnets

    In this webcast, the presenter will explains the methodology and tools required to create a distributed file store built on top of a JavaScript botnet. This type of data storage offers redundancy, encryption, and plausible deniability, but still allows the user to store a virtually unlimited amount of data in...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Flash Storage Forensics

    In this webcast, the presenter explains about the modern devices by using flash memory as primary storage, and some of those devices (e.g. Smartphone's) often hold private data. The speaker also explains the logical characteristics of flash memory.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Securing Redis with Sedona

    Redis is an open-source network-based key-value store. Redis allows developers to store and retrieve strings, lists, sets and hashes rapidly and at scale. As a result Redis does not include many of the native security features that developers have come to expect from network-based storage solutions.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 4 (Troubleshooting)

    In this webcast, the presenter introduces the support features in the Office Mail App. Along with the presenter will also explain how to troubleshoot any issues the users' may come across when deployin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 1 (Introduction)

    In this webcast, the presenter provides a brief introduction to the new look & feel of the enterprise vault office mail app, demonstrating what users can expect. Enterprise vault 10.0.3 introduces support for archive access from the outlook web app in exchange.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part:3 (Deployment)

    Enterprise Vault 10.0.3 introduces support for archive access from the outlook web app in exchange 2013. In this webcast, learn how to use the PowerShell console to deploy the new enterprise vault mail app to the end-users, and explains how the users' can mix.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 2 (User Actions)

    Enterprise Vault 10.0.3 introduces support for Archive access. In this webcast, the presenter introduces the various user actions that end-users have come to expect from Enterprise Vault, including archiving, restoring and deletin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Florida School District Protects and Manages Its Endpoints With Symantec

    Hillsborough County Public Schools centralized the management of its 85,000-plus endpoints with solutions from Symantec. The solution simplifies and consolidates licensing, improves risk posture, and maintains remote management of all endpoints.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    How Safe Is Our Data on Computers?

    How safe is the users' data on computers? The movement the users connect to any network the data becomes unsafe. In this webcast the presenter going to explain about the data safety in computer.

    Provided By ViMedicus, Inc.

  • Webcasts // Jan 2014

    Data Management

    In this webcast, the presenter explains about the data management the file storage environment where the users' need to store the complete data. The presenter focuses on the latest capabilities and benefits of efficient data management.

    Provided By Novell

  • Webcasts // Jan 2014

    Dynamic Storage Technology

    In this webcast, the presenter going to explain about the dynamic storage technology can help the users' to reduce costs in their storage infrastructure through a method of managing the files.

    Provided By Novell

  • Webcasts // Jan 2014

    Filtering Data

    In this webcast, the presenter will explain about the data-filtering tool in novell privileged user manager, which allows administrators to display only high-risk events that have occurred within a specified time period.

    Provided By Novell

  • Webcasts // Jan 2014

    OwnCloud

    The advantages of storing data in the cloud are many: ubiquitous access to data from multiple devices, social interaction and sharing with others on the web and no extra software to install. In this webcast, the presenter will give an overview of this market and on getting ownCloud running in...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Protecting Big Data At Scale

    In this webcast, the presenter will explains the measure and manage data with more precision than ever before using big data. But companies are getting Hadoopy often with little or no consideration of security. The presenter also explains how best to handle the looming big data risk in any environment.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Webcast: 3 Steps to Content Sharing and Collaboration ft. Forrester Research

    Consumer sync and share tools help people access and send personal files, but smart IT leaders know that businesses require more than just ease-of-use. Strong security, mobile support, and deployment architecture are just a few of the many important factors to consider when evaluating vendors for a company-wide solution. Where...

    Provided By Box

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Dec 2013

    Going Beyond Application Data Normalization to True Software License Optimization

    In this webcast, the presenter discusses about how Software License Optimization goes beyond application data normalization to deliver unique business problems. The speaker also provides specific example of how to focus on application data normalization can leave the users exposed when dealing with software license audits.

    Provided By DABCC

  • Webcasts // Nov 2013

    Analytics: The Key to Unlocking the Intelligence in Data

    Discover the many ways Dr. Kirk Kelly of Hamilton County Department of Education uses predictive analytics to uncover hidden patterns and associations within massive amounts of data in this on-demand webinar. See firsthand how he uses business intelligence to issue daily reports so staff across the district can identify at-risk...

    Provided By IBM

  • Webcasts // Nov 2013

    Datacenter Virtualization Application Considerations and Best Practices

    In this webcast, the presenter discusses the accelerating trend of datacenter virtualization. They presenter also explain the applications within this environment, some of the challenges and best practice approaches, so the companies can leverage to ensure that applications function properly in a virtualized environment.

    Provided By DABCC

  • Webcasts // Nov 2013

    Changing the Perception of IT – What Your Customers Wont Tell You

    To reach the customers of IT services, you have to abandon long-entrenched models of IT thinking & replace them with a customer-focused model that focuses on value, experience & context. Join the webinar to understand the issues internal customers face with IT, & see how IT can evolve from being...

    Provided By ServiceNow

  • Webcasts // Nov 2013

    Trust, But Verify: Configuration Management with Data Certification

    Certifying the accuracy of a CMDB with inconsistent, manual methods is unreliable. ServiceNow's built-in data certification gives you the ability to automate the process. Learn how data certification works with the ServiceNow CMDB to deliver a trustworthy single system of record you can rely on.

    Provided By ServiceNow

  • Webcasts // Nov 2013

    The Future of IT: Managing Service Relationships

    Every department in the enterprise is a service provider. Yet, very few have matured the service model to the level of enterprise IT. They are often inefficient, unstructured, or non-existent in other enterprise service domains. Savvy IT leaders view this as an opportunity to leverage IT service expertise and enable...

    Provided By ServiceNow

  • Webcasts // Nov 2013

    CIOs: Market Like Your Career Depends On It

    Are IT budgets discussed more often than IT’s contribution to the business? IT delivers more value to the business than most executives know. And it’s up to IT leaders to communicate how IT is enabling their peers to achieve their goals. Hear from a panel of esteemed CIOs and IT...

    Provided By ServiceNow

  • Webcasts // Nov 2013

    Enterprise IT Now

    Learn why an enterprise IT cloud is so critical to IT and the business. Hear ServiceNow customers like Loyola Marymount University, KPN, Land O' Lakes, World Wide Technologies, Lennox International, Standard Life and Maritz describe what enterprise IT cloud means to them and what they have achieved using ServiceNow as...

    Provided By ServiceNow

  • Webcasts // Nov 2013

    Transform IT Now

    Find out how IT executives from MetroPCS, Morrison & Foerster, CareWorks, Knorr-Bremse and RedHat describe their approach to IT transformation.

    Provided By ServiceNow

  • Webcasts // Nov 2013

    Reinvent Your Branch Offices

    Internet and mobile banking are quickly replacing the original purpose of your bank’s branch offices – to manage deposits, withdrawals and other transactions. However, there is significant evidence that maintaining a presence in your community in the form of a physical branch is still very important.

    Provided By IBM

  • Webcasts // Oct 2013

    Webcast: Active Directory Forest Recovery: What You Don’t Know WILL Hurt You

    A complete Active Directory forest failure could be catastrophic to your business’ bottom line. This webcast explores case studies on actual forest disasters, and how Recovery Manager for Active Directory Forest Edition can save the day – and possibly your job. Watch the Webcast.

    Provided By Dell Software

  • Webcasts // Oct 2013

    SQL Performance Monitoring Best Practices

    In this webcast, the presenter explains about the SQL performance monitoring. The presenter will describe best practices for monitoring SQL server performance to include SQL performance issues like database file size, index fragmentation, and sloppy queries.

    Provided By SolarWind

  • Webcasts // Oct 2013

    Morneau Shepell boosts storage with IBM Storwize V7000

    IBM helps Morneau Shepell meeting the challenge of growing storage demands.

    Provided By IBM

  • Webcasts // Oct 2013

    Canucks Sports & Entertainment wins at the storage expansion game

    Canucks Sports & Entertainment, owners of the Vancouver Canucks hockey team, needed to expand their storage capacity to handle exponential growth in digital media. They needed a scalable storage system, and they were able to implement an IBM solution that surpassed their expectations.

    Provided By IBM

  • Webcasts // Oct 2013

    Marienhospital Stuttgart finds the cure to escalating volumes of data

    The need To improve patient care, Marienhospital Stuttgart wanted to extend the use of modern medical equipment and provide a single source of patient data. Both aims necessitated more storage capacity.The solution Marienhospital Stuttgart deployed a virtualized storage solution based on IBM technology to meet escalating data storage requirements and...

    Provided By IBM

  • Webcasts // Oct 2013

    Live Webcast: Introducing New Technology to Your Users: A Make or Break Moment

    Join us for this LIVE event! Tuesday, October 8th 10:00 AM PDT / 1:00 PM EDT You only get one chance to make a first impression. You might be delivering brilliant, flawless technology, but if users are confused when they first encounter it, they’ll be disappointed. And, you...

    Provided By Citrix Online

  • Webcasts // Oct 2013

    The Best of Strata Santa Clara 2013: SQL on Hadoop

    The analytics and data warehousing industries are in the midst of a major period of transformation and upheaval. Since the publication nearly a decade ago of Google's seminal MapReduce and GFS papers, the presenter have witnessed the appearance of Apache Hadoop, followed closely by the arrival of batch-oriented SQL systems...

    Provided By oreilly

  • Webcasts // Sep 2013

    What’s New in VMware vCloud Director 5.1

    VMware vCloud® Director™ orchestrates the provisioning of software-defined datacenter services as complete virtual datacenters (VDCs) that are ready for consumption in a matter of minutes. While a virtual machine provides only virtualized compute, the virtual datacenter provides virtualized compute, networking, storage, security and availability. With vCloud Director, an administrator can...

    Provided By VMware