Data Management

Big Data, Hadoop, and analytics help unearth valuable patterns in business information. But without proper management, backup, archiving, and protection, you're taking an unacceptable risk.

  • Towards Efficient Archiving of Dynamic Linked Open Data

    White Papers // Apr 2015 // provided by RWTH Aachen University

    The Linked Data paradigm has enabled a huge shared infrastructure for connecting data from different domains which can be browsed and queried together as a huge knowledge base. However, structured interlinked datasets in this Web of data are not static but continuously evolving, which suggests the investigation of approaches to ...

    Download Now
  • Chase Termination for Guarded Existential Rules

    White Papers // Apr 2015 // provided by RWTH Aachen University

    The chase procedure is considered as one of the most fundamental algorithmic tools in database theory. It has been successfully applied to different database problems such as data exchange, and query answering and containment under constraints, to name a few. One of the central problems regarding the chase procedure is ...

    Download Now
  • Spam, Phish and Other Things Good to Eat

    Webcasts // Apr 2015 // provided by SecurityTube.net

    In this webcast, the presenter will demo and release the source code for FeelingPhishy, a PHP tool the presenter created after getting several complaints from people in the industry that existing open source spam campaign solutions were too difficult to setup, had incomplete instructions or didn't work effectively.

    Watch Now
  • Internet Security Threat Report 2015

    Ebooks // Apr 2015 // provided by Symantec

    The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Key Findings: • ...

    Read more
  • Data Integrity Protection in Cloud Computing for Constrained Computing Resources

    White Papers // Apr 2015 // provided by Creative Commons

    Using cloud computing user will be able to store and secure their data without burden of local computer. Additionally, users should be able to just use the cloud storage as if it is local, without distressing about the need to verify its integrity. By enabling and using public audit for ...

    Download Now
  • 6 Best Practices of Managed Mobility Services

    White Papers // Apr 2015 // provided by Tangoe

    The constant change in the mobility landscape often leads to a convoluted, ineffective process of mobility management. Mobility Managed Services (MMS) is emerging as a response to this complexity. MMS can address the varying levels of challenge through an objective-based setting for management in the enterprise. MMS pre-integrates solutions ...

    Download Now
  • Top 10 Criteria for Selecting a Managed Services Provider

    White Papers // Apr 2015 // provided by IBM

    When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how ...

    Download Now
  • Internet Security Threat Report 2015 - eGuide

    Ebooks // Apr 2015 // provided by Symantec

    This Annual Symantec Internet Security Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future. If there is one thing that can be said about the threat landscape, and Internet security as a whole, it is that the only constant ...

    Download Now
  • Internet Security Threat Report 2015 - Key Findings

    White Papers // Apr 2015 // provided by Symantec

    If there is one thing that can be said about the threat landscape, and cyber security as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code ...

    Download Now
  • Big Data: New Insights Unlocked.

    White Papers // Apr 2015 // provided by Microsoft

    Reveal new insights and drive better decision making with Azure HDInsight, a Big Data solution powered by Apache Hadoop. Learn more about the unique flexibility provided to you by HDInsight and make sure you and your organisation stay ahead of the technological curve

    Learn more