Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • White Papers // May 2015

    Superior VMware® Protection for Limited IT Budgets

    A complete VMware data-protection strategy should offer protection for mission-critical applications, along with automated nightly backup and replication for less critical data. Find out the four major criteria for implementing cost-effective data protection in your own VMware environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // May 2015

    Disaster Avoidance vs Disaster Recovery

    Disaster Avoidance (DA) and Disaster Recovery (DR) are both critical elements of a general disaster-coping strategy.This paper explores the difference between the two and what each can do to prepare companies for disaster. This report explores such topics as: Why is disaster preparedness important? Stopping disasters before they start Which...

    Sponsored By Macquarie Telecom Australia

  • White Papers // May 2015

    How to develop a Business Continuity Plan

    A disaster or interruption can occur at any time without any warning—your company’s survival depends on the steps you take to prepare for these potentially catastrophic events. The most effective preparation takes the form of a written document called a Business Continuity Plan (BCP). This document serves as a guide...

    Sponsored By Macquarie Telecom Australia

  • White Papers // May 2015

    The Complete Guide to Disaster Recovery Planning

    Whether man made or naturally occurring, disasters can be a real threat to a company’s survival. Some common disasters include : Catastrophic security compromise Fire Flood Earthquake Power failure This comprehensive guide will help you understand what a disaster recovery plan is and how to effectively implement one for your...

    Sponsored By Macquarie Telecom Australia

  • White Papers // May 2015

    Internet Security Threat Report 2015 - Key Findings

    If there is one thing that can be said about the threat landscape, and cyber security as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code...

    Sponsored By Symantec

  • eBooks // May 2015

    Internet Security Threat Report 2015 - eGuide

    This annual Symantec Internet Security Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future. If there is one thing that can be said about the threat landscape, and Internet security as a whole, it is that the only constant...

    Sponsored By Symantec

  • Research // May 2015

    Busting Myths About Mobility

    Innovations in mobile computing have radically changed the way we interact. Now they’re changing the way we do business. While many companies still see mobile solutions as too costly, risky or hard to manage, organizations that see beyond these misconceptions gain access to tremendous possibilities across the enterprise. Dell found...

    Sponsored By Dell and Intel

  • Downloads // May 2015

    Microsoft Access Help Desk Database

    Use this sample Microsoft Access Help Desk database as a simple substitute for commercial help desk software. It provides pertinent customer information with tabs to track call details as well as create reports.

    Provided By TechRepublic

  • eBooks // May 2015

    Software Defined Storage for Dummies

    This book examines data storage and management challenges and explains software-defined storage, an innovative solution for high-performance, cost-effective storage using the IBM General Parallel File System (GPFS).

    Provided By IBM

  • Downloads // May 2015

    Download Savvion's Free Business Process Modeling Software

    The first step in improving your business processes is to articulate precisely where bottlenecks exist, and the most efficient way to do that is by simulating your existing processes using business process modeling software. To help you get started, Savvion offers its Process Modeler, a component of Savvion BusinessManager,...

    Provided By Savvion

  • White Papers // May 2015

    SPSS Stastics White Paper: The Risk of Using Spreadsheets for Statistical Analysis

    While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they’re not designed to perform, or for a task beyond the limit of their capabilities, using spreadsheets can be risky. Read this paper to learn about more powerful yet...

    Provided By IBM

  • Webcasts // May 2015

    On-demand Webcast: Don't Drown in Your Data Lake. Improve Productivity and Decisions with a Well Governed Data Reservoir

    Many organizations are updating their data architectures to include one or more data lakes -- large pools of unstructured data that are available for multiple, unpredictable queries and uses. When you draw data from the lake, how confident are you that it’s not only relevant but also timely and clean?...

    Provided By IBM

  • White Papers // May 2015

    Magic Quadrant for Intrusion Prevention Systems

    According to Gartner, “Leaders produce products that embody NGIPS capabilities, provide high signature quality and low latency, innovate with or ahead of customer challenges (such as providing associated advanced targeted attack, ATA, technologies to make enriched IPS intelligence) and have a range of models. Leaders continually win selections and are...

    Provided By Sourcefire, Inc.

  • White Papers // May 2015

    IDC Converged and Integrated Datacenter Systems:Creating Operational Efficiencies

    STRUGGLING WITH THE COMPLEXITY OF LEGACY IT? Download this IDC report to learn how your organization can benefit from converged infrastructure. IT has moved away from siloed servers, storage, data, and processes and is embracing converged, virtualized technologies. This IDC Insight report examines the benefits of converged infrastructure...

    Provided By Nutanix

  • White Papers // May 2015

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // May 2015

    12 Essential Tasks of Active Directory Domain Services

    Discover the 12 major tasks of Active Directory Domain Services (AD DS) administration and management, and how delegation can be an excellent way for administrators to reduce the their workload and streamline management of their AD DS infrastructures. Read the white paper and learn how the implementation of proper...

    Provided By Dell Software

  • White Papers // May 2015

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Provided By IBM

  • Downloads // May 2015

    10 common SQL Server problems and solutions

    This list outlines 10 common SQL Server problems and solutions. This handy two-page list outlines 10 familiar SQL Server problems and an assortment of solutions. From "Out of Space" errors to a database going suspect, this list is great quick reference for every SQL administrator.Here's a sample:Number 1: Users...

    Provided By TechRepublic

  • White Papers // May 2015

    VDI Solutions Guide

    The IT industry has been abuzz over the past several years promoting the idea of VDI: virtualizing and centralizing desktops to enable IT to deliver a more secure, manageable, less costly, and ultimately more mature end-user computing model. In fact, IT departments are finding that with the right investments in...

    Provided By Pure Storage

  • White Papers // May 2015

    Change Management Best Practices for the Engineering and Construction Industry

    Construction contracts differ from most legal agreements in that they expect and plan for changes. The purpose of this white paper is to highlight best practices of identifying and managing changes that might occur on a constructing project, and provide a process to effectively manage changes on construction projects. It...

    Provided By Oracle

  • Downloads // May 2015

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic

  • Downloads // May 2015

    How do I... fill Word form fields with Access data?

    Filling a Word form with Access data can be useful when you need to use Word's formatting features to present that data in just the right way. Fortunately, the process is simple, whether sharing one record or thousands. Access expert Susan Harkins walks through this technique and provides the VBA...

    Provided By Susan Harkins

  • White Papers // May 2015

    The Importance of Managing Privileged Accounts

    Discover invaluable insights on the benefits of properly managing administrative privileges, developing a policy for managing privileged accounts and enforcing those policies. Could you be managing your privileged accounts better? Download the whitepaper today and find out.

    Provided By Dell Software

  • White Papers // May 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Provided By Symantec

  • White Papers // May 2015

    eTOM and ITIL: A Powerful Combination for End-to-End Service Management

    This white paper discusses the benefits of using the Tele Management Forum (TMF) Enhanced Telecom Operations Map (eTOM) and the Office of Government Commerce (OGC) IT Infrastructure Library (ITIL) process frameworks together. In combination, these tools and techniques enhance their individual capabilities to deliver high-quality and timely solutions. This process...

    Provided By Hewlett-Packard (HP)

  • White Papers // May 2015

    SQL Server 2000 Enterprise Edition (64-bit): Advantages of a 64-Bit Environment

    HP has partnered with Microsoft to provide information about the advantages of a 64-Bit Environment. Microsoft SQL Server 2000 Enterprise Edition (64-bit) offers dramatic improvements in memory availability and parallel processing performance compared with SQL Server software running in a 32-bit environment. This paper describes the capabilities of the 64-bit...

    Provided By Hewlett-Packard (HP)

  • Downloads // May 2015

    IBM Platform LSF Evaluation/Download

    IBM Platform LSF is a powerful workload management platform for demanding, distributed HPC environments. It provides a comprehensive set of intelligent, policy-driven scheduling features that enable you to utilize all of your compute infrastructure resources and ensure optimal application performance.

    Provided By IBM

  • White Papers // May 2015

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Provided By Global Knowledge

  • White Papers // May 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Provided By Symantec

  • White Papers // May 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

    Provided By IBM

  • White Papers // May 2015

    Customer Relationship Management in Banking Sector and a Model Design for Banking Performance Enhancement

    Nowadays, many businesses such as banks, insurance companies, and other service providers realize the importance of Customer Relationship Management (CRM) and its potential to help them acquire new customers retain existing ones and maximize their lifetime value. At this point, close relationship with customers will require a strong coordination between...

    Provided By Yildiz Technical University

  • Downloads // May 2015

    How to print multiple labels for a single record in Access

    Label printing is often more complex than generating a single label for each record. Users might need one label for multiple records or multiple labels for one record -- or something in between. Susan Harkins offers a VBA alternative that's more flexible than the Access wizard.This article portion of this...

    Provided By Susan Harkins

  • White Papers // May 2015

    Create a Process Documentation Guide: Developing a Template That Can Be Used to Document Any Process

    Document the processes by creating a template for the process documentation guide that includes the following items: scope statement, applicability matrix, product lines impacted, process roles involved, process management system procedures, exception management process, and decision matrix. This paper explores how to create a template for the process documentation guide....

    Provided By IBM

  • White Papers // May 2015

    Building a Low Latency Infrastructure for Electronic Trading

    As the global financial markets continue to shift towards electronic trading, the speed at which trading is able to take place establishes the winners and the losers among participants in the trading chain. Latency, wherever and however it is introduced, is the enemy of speed. Market participants are continuously driving...

    Provided By Sun Microsystems

  • Downloads // May 2015

    Sample storage service catalog

    This sample Excel worksheet allows administrators to quantify the storage offering for their storage area network (SAN) and data protection infrastructures. The material is an adaptation of the Storage Networking Industry Association's Tiered Services Catalog. Read the related entry in our Servers and Storage blog.

    Provided By Rick Vanover

  • White Papers // May 2015

    Essential Guide to an NDS-to-Active Directory Migration

    With the release of Windows Server 2008 and the latest iteration of Active Directory, many enterprise IT departments have decided that Active Directory is a sufficiently mature and proven technology and that the time has come to move from their current networking environment. Included in this group is a fairly...

    Provided By Dell Software

  • White Papers // May 2015

    The Keys to the Kingdom: Limiting Active Directory Administrators

    Many organizations have come to rely heavily on the information stored directly within Active Directory (AD) with other applications using AD for authentication. However, the manual processes used to update Active Directory (AD) can leave organizations vulnerable, and lead to missing, inaccurate or inconsistent information. Learn how the technical considerations...

    Provided By Dell Software

  • Analyst Briefings // May 2015

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Provided By IBM

  • White Papers // May 2015

    BLU Acceleration changes the game

    Born from new advances in data processing from IBM Research, IBM® DB2® with BLU Acceleration is a leap forward in database technology that raises the bar for performance and value. BLU Acceleration uses patented technologies to deliver a unique combination of performance, ease of use and cost-efficiency—with 8 to 25...

    Provided By IBM

  • White Papers // May 2015

    Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

    Provided By Dell Software