Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • White Papers // Apr 2009

    Change Management Best Practices for the Engineering and Construction Industry

    Construction contracts differ from most legal agreements in that they expect and plan for changes. The purpose of this white paper is to highlight best practices of identifying and managing changes that might occur on a constructing project, and provide a process to effectively manage changes on construction projects. It...

    Provided By Oracle

  • White Papers // May 2008

    eTOM and ITIL: A Powerful Combination for End-to-End Service Management

    This white paper discusses the benefits of using the Tele Management Forum (TMF) Enhanced Telecom Operations Map (eTOM) and the Office of Government Commerce (OGC) IT Infrastructure Library (ITIL) process frameworks together. In combination, these tools and techniques enhance their individual capabilities to deliver high-quality and timely solutions. This process...

    Provided By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Infrastructure Matters: Disaster Recovery Overview

    This solution overview guide demonstrates how our services can help to give your users the level of data availability they have come to expect everywhere else. Read More..

    Provided By Fujitsu

  • White Papers // Nov 2014

    VDI Solutions Guide

    The IT industry has been abuzz over the past several years promoting the idea of VDI: virtualizing and centralizing desktops to enable IT to deliver a more secure, manageable, less costly, and ultimately more mature end-user computing model. In fact, IT departments are finding that with the right investments in...

    Provided By Pure Storage

  • White Papers // Aug 2012

    The Importance of Managing Privileged Accounts

    Discover invaluable insights on the benefits of properly managing administrative privileges, developing a policy for managing privileged accounts and enforcing those policies. Could you be managing your privileged accounts better? Download the whitepaper today and find out.

    Provided By Dell Software

  • White Papers // Mar 2010

    Essential Guide to an NDS-to-Active Directory Migration

    With the release of Windows Server 2008 and the latest iteration of Active Directory, many enterprise IT departments have decided that Active Directory is a sufficiently mature and proven technology and that the time has come to move from their current networking environment. Included in this group is a fairly...

    Provided By Dell Software

  • White Papers // Sep 2006

    Customer Relationship Management in Banking Sector and a Model Design for Banking Performance Enhancement

    Nowadays, many businesses such as banks, insurance companies, and other service providers realize the importance of Customer Relationship Management (CRM) and its potential to help them acquire new customers retain existing ones and maximize their lifetime value. At this point, close relationship with customers will require a strong coordination between...

    Provided By Yildiz Technical University

  • White Papers // Mar 2007

    Create a Process Documentation Guide: Developing a Template That Can Be Used to Document Any Process

    Document the processes by creating a template for the process documentation guide that includes the following items: scope statement, applicability matrix, product lines impacted, process roles involved, process management system procedures, exception management process, and decision matrix. This paper explores how to create a template for the process documentation guide....

    Provided By IBM

  • Downloads // Feb 2009

    How to print multiple labels for a single record in Access

    Label printing is often more complex than generating a single label for each record. Users might need one label for multiple records or multiple labels for one record -- or something in between. Susan Harkins offers a VBA alternative that's more flexible than the Access wizard.This article portion of this...

    Provided By Susan Harkins

  • White Papers // Feb 2009

    Building a Low Latency Infrastructure for Electronic Trading

    As the global financial markets continue to shift towards electronic trading, the speed at which trading is able to take place establishes the winners and the losers among participants in the trading chain. Latency, wherever and however it is introduced, is the enemy of speed. Market participants are continuously driving...

    Provided By Sun Microsystems

  • Downloads // Aug 2010

    Sample storage service catalog

    This sample Excel worksheet allows administrators to quantify the storage offering for their storage area network (SAN) and data protection infrastructures. The material is an adaptation of the Storage Networking Industry Association's Tiered Services Catalog. Read the related entry in our Servers and Storage blog.

    Provided By Rick Vanover

  • White Papers // Mar 2015

    Infrastructure Matters: Virtualisation Overview

    Whether you are operating a mature strategy or just starting out on your virtualisation journey, our services are designed to ensure your ICT benefits from simpler scalability, reliability and performance. Read More..

    Provided By Fujitsu

  • White Papers // Mar 2015

    Infrastructure Matters: Cloud Security Overview

    This solution overview guide explores how secure the cloud really is, and how Fujitsu services are designed to ensure your information is protected at every level. Read More..

    Provided By Fujitsu

  • White Papers // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

    Provided By IBM

  • White Papers // Oct 2014

    BLU Acceleration changes the game

    Born from new advances in data processing from IBM Research, IBM® DB2® with BLU Acceleration is a leap forward in database technology that raises the bar for performance and value. BLU Acceleration uses patented technologies to deliver a unique combination of performance, ease of use and cost-efficiency—with 8 to 25...

    Provided By IBM

  • Analyst Briefings // Apr 2014

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Provided By IBM

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Provided By Global Knowledge

  • Downloads // May 2014

    IBM Platform LSF Evaluation/Download

    IBM Platform LSF is a powerful workload management platform for demanding, distributed HPC environments. It provides a comprehensive set of intelligent, policy-driven scheduling features that enable you to utilize all of your compute infrastructure resources and ensure optimal application performance.

    Provided By IBM

  • White Papers // May 2013

    The Keys to the Kingdom: Limiting Active Directory Administrators

    Many organizations have come to rely heavily on the information stored directly within Active Directory (AD) with other applications using AD for authentication. However, the manual processes used to update Active Directory (AD) can leave organizations vulnerable, and lead to missing, inaccurate or inconsistent information. Learn how the technical considerations...

    Provided By Dell Software

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Provided By Symantec

  • White Papers // Nov 2013

    The Essential Guide to IT Transformation

    Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.

    Provided By ServiceNow

  • White Papers // Apr 2015

    The ABC’s of Mobile Device Management

    Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!

    Provided By IBM

  • White Papers // Oct 2010

    Bank Frauds In Nigeria: Underlying Causes, Effects And Possible Remedies

    This paper sets out to find the common types of bank fraud that are frequently carried out in the banking system, the underlying causes, level of staff involvement, consequences and possible means of ameliorating the problem. A sample of 100 respondents taken in Benin City, capital of Edo State, Nigeria...

    Provided By University of Benin

  • White Papers // Mar 2011

    How to build custom business solutions for iPhone and iPad

    The iPad and iPhone are winning over businesses, and desk-bound databases are a thing of the past. With FileMaker Pro and FileMaker Go, you can create custom-tailored business solutions that run not only on desktops and laptops but also on Apple's iPhone and iPad, with all the elegance of a...

    Provided By FileMaker

  • eBooks // Apr 2011

    Storage Tiering for Dummies e-book

    Welcome to Storage Tiering For Dummies, Oracle Special Edition. Today, explosive growth in storage requirements due to technology shifts, unstructured data, and regulatory mandates is more than traditional storage techniques can handle. IT budgets cannot support the growth necessary without a change in storage practices. Tiered storage is the smart...

    Provided By Oracle

  • White Papers // Apr 2011

    Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data

    With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based...

    Provided By Illinois Institute of Technology

  • Book chapters // Jan 2006

    Use these risk-assessment methodologies to protect your IT infrastructure

    No matter what methodology or approach is used, it is important that the organization address how asset management and proper inventorying of the organizations IT assets are to be handled.This sample chapter, taken from Inside Network Security Assessment: Guarding Your IT Infrastructure, discusses different methodologies and approaches for conducting a...

    Provided By Sams Publishing

  • Downloads // Jan 2006

    Troubleshoot 10 common Exchange problems with these expert answers

    This list outlines 10 common Exchange problems and solutions. This handy two-page list outlines 10 familiar Exchange problems and an assortment of solutions. From user access errors to mail delivery problems, this list is great quick reference for every Exchange administrator.Here's a sample:Number 1: Users cannot access server. -...

    Provided By TechRepublic

  • Downloads // Jan 2007

    TechRepublic's ultimate guide to enterprise wireless LAN security

    Enterprise wireless LAN security is a persistent concern for every system administrator and CIO. Threats from both within and without the enterprise threaten your data each and every day. This download gives you the basic foundation you need to secure your enterprise wireless connections by detailing security protocols such...

    Provided By George Ou

  • Book chapters // Oct 2006

    Master advanced searching to take your SQL query skills to the next level

    If you know the rudiments of the SQL query language but want to take your skills to the next level, learn how to take full advantage of SQL's expressive power: work more with SQL inside the database before pushing data across the network to your applications. Focus on advanced...

    Provided By O'Reilly Media

  • White Papers // Sep 2004

    Active Directory Benefits for Smaller Enterprises

    Microsoft Active Directory (AD) has been available since early 2000, and while most organizations have completed their AD deployment and are realizing the many business benefits of having deployed Active Directory, there are still organizations that have either not completed their deployment or have yet to take advantage of some...

    Provided By Microsoft

  • White Papers // Jan 2009

    9 Steps for Implementing Business Process Management

    The benefits of Business Process Management (BPM) implementation are enormous in any economic environment. But achieving business agility in a turbulent, competitive global market is all the easier with BPM tools, as success stories of BPM-driven companies show. Spread across industry sectors, these companies stand out for their nimble response...

    Provided By TooStep

  • White Papers // Dec 2005

    Gartner's Magic Quadrant for Product Information Management

    This report is a must-read if you're an IT strategist who's currently evaluating product information management (PIM) technologies. It explains why the as-yet-immature PIM market is evolving quickly and presents Gartner's Magic Quadrant for this emerging tech sector. There are a variety of differences that separate the companies Gartner classifies...

    Provided By IBM

  • White Papers // Sep 2006

    The Business Case for Disaster Recovery Planning: Calculating the Cost of Downtime

    IT leaders recognize that a disaster can be any event that prevents a business from accessing the data and systems it needs to operate. This could encompass everything from regional power outages, to virus outbreaks, to employee sabotage, to external data fraud, to devastating terrorist attacks. Virtually every company faces...

    Provided By Iron Mountain

  • Research // Dec 2004

    Best Practices for Service-Level Management

    Aligning IT with business objectives and showing the value of IT to the business is often seen as the Holy Grail by many CIOs. Among the potential ways of demonstrating IT value, reporting and constantly improving the quality of IT services is an effective first step. But service-level management (SLM)...

    Provided By Forrester Research

  • Downloads // Feb 2008

    How do I... Add items to an Access combo box on the fly?

    On occasion, an application developer working with Microsoft Access may need a list control that's a bit more flexible by allowing users to update the control's list. Handing over a bit of control, in the right circumstances, can be helpful for everyone, including you. Susan Sales Harkins shows you how...

    Provided By Susan Harkins

  • Downloads // Mar 2008

    10 reasons to explicitly convert SQL Server data types

    SQL Server converts data types in two ways -- the way it wants to and the way you tell it to. Most implicit conversions work the way you expect. It's those surprise conversions that cause trouble. Unless you know exactly how SQL Server converts a data type, it's a good...

    Provided By Susan Harkins

  • White Papers // Jul 2008

    Managed Hosting Services Checklist

    Do you know what to ask before you buy? The Web Hosting Unleashed Managed Hosting Services Checklist gives you a comprehensive list of questions and a step-by-step approach to evaluating managed-hosting vendors and providers. Be armed with the right questions, market research and criteria to select the right managed-hosting solution...

    Provided By Web Hosting Unleashed

  • White Papers // Dec 2008

    The Importance of an Information Strategy

    Since its inception, IT has focused on reducing costs through process automation and the implementation of applications. However, that is no longer enough to sustain competitive advantage in a rapidly changing world. Today, important business decisions depend on having up-to-date, trustworthy information. At the same time, you need to assess...

    Provided By IBM

  • White Papers // Jan 2009

    Moving an MS Access Database Application to the Web With Alpha Five Version 9

    This paper explains the need to seriously consider moving the MS Application to the Web. It turns out that the Web provides a number of very compelling reasons for doing this such as: once the application has been moved to the Web, any authorized user can log onto the application...

    Provided By Alpha Software