Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • Webcasts // Dec 2010

    Application Aware Virtualization

    Please join Monica Kumar to discuss the value of application aware virtualization. She will discuss the ability to deploy, manage and support applications is critical to organizations using traditional virtualization. Oracle's most complete and integrated virtualization not only enables you to consolidate physical servers, but also helps you to rapidly...

    Provided By Oracle

  • Webcasts // Nov 2009

    Business Productivity Online Suite - Highly Secure and Reliable Cloud Services

    Learn about fully hosted productivity tools in the cloud with Microsoft? Business Productivity Online Suite (BPOS). With real time communication and collaboration tools, including, instant messaging, email, video conferencing, shared calendars, and SharePoint, BPOS is one suite that gets everyone working together. With BPOS, you can collaborate from virtually anywhere...

    Provided By Microsoft

  • Webcasts // Nov 2009

    Business Productivity Online Suite - Communicate Success

    Learn how to boost your team's productivity and collaboration with the Microsoft? Business Productivity Online Suite (BPOS). With instant messaging, email, video conferencing, shared calendars, and one central place on the web to store and share documents, your team will know where to access the info they need, and how...

    Provided By Microsoft

  • Webcasts // Sep 2009

    Overview of New Security Features in Windows Server 2008

    Microsoft Longhorn, otherwise known as Microsoft Windows Server 2008 has a lot of new features, especially deployment and security features. Today we're talking about Bitlocker. No, it isn't a place where you keep all your bits. It is an important component Longhorn that adds two cool new features: Whole disk...

    Provided By Dell

  • Webcasts // Jan 2010

    Smarter Collaboration Cost Reduction Strategy

    Are you CAPEX and OPEX challenged? Looking for ways to free up money in your IT budget immediately that can still help with long term TCO? Looking for rapid ROI? Smarter Collaboration solutions from IBM offers you an unique opportunity to focus, exploit opportunities, and act with speed. This podcast...

    Provided By IBM

  • Webcasts // Jun 2012

    Webinar: The new definition of the CIO

    Five trends are poised to dominate the enterprise this decade -- mobile, social, cloud, analytics, and unified communications -- and they all affect the CIO. In this webinar, Constellation Research CEO Ray Wang and Workday CTO Stan Swete discuss the changing role of the CIO and how Workday solutions...

    Provided By Workday

  • Webcasts // Sep 2009

    How Ready Are You to Upgrade to Microsoft Windows Server 2008?

    There has been a lot of buzz about Server 2008, otherwise known as Longhorn. But the question on many IT peoples' minds is whether their infrastructure is ready for it. Wouldn't it great if there was a tool that would let you know? Fortunately a Readiness Advisory Utility is available...

    Provided By Dell

  • Webcasts // Jun 2011

    Car rental firm drives up customer satisfaction with FileMaker Go for iPad

    See how car rental firm Acorn Rentals drives increased customer satisfaction, and eliminates paperwork, with FileMaker Go for iPad.

    Provided By FileMaker

  • Webcasts // Jan 2014

    Protecting Big Data At Scale

    In this webcast, the presenter will explains the measure and manage data with more precision than ever before using big data. But companies are getting Hadoopy often with little or no consideration of security. The presenter also explains how best to handle the looming big data risk in any environment.

    Provided By

  • Webcasts // Feb 2013

    Mitigating Insider Threats

    IBM Security Privileged Identity Manager can help organizations confidently defend their business against insider threats. Privileged Identity Manager provides a single solution that secures, automates, and tracks use of privileged account access. The solution helps protect clients at their most vulnerable points, from the people who have legitimate access and...

    Provided By IBM

  • Webcasts // May 2010

    On-Demand Infrastructure as a Service

    In this webcast, the presenter explains about Infrastructure-as-a-Service (IaaS). IaaS defined rather than purchasing servers, software, data center space or network equipment, clients instead buy those resources as fully outsourced service, OpEx vs CapEx. Today, leveraging solutions from Citrix like XenServer and NetScaler VPX, service providers are able to make...

    Provided By Citrix Systems

  • Webcasts // Sep 2014

    Data Recovery Techniques

    In this webcast, the presenter explains about data recovery techniques. Salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external Hard Disk Drives...

    Provided By

  • Webcasts // Sep 2014

    A Critical Overview of 10 Years of Privacy Enhancing Technologies

    In this webcast, the presenter will provide a critical overview of \"Privacy research\" within computer science. The mechanisms proposed in the last ten year include mechanisms for anonymous communications, censorship resistance, selective disclosure credentials (and their integration in identity management systems), as well as privacy in databases.

    Provided By