Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • White Papers // Aug 2009

    Declarative Management in Microsoft SQL Server

    This paper describes the principles and practice of Declarative Management - a new approach to the management of database systems. The standard approach to database systems management involves a brittle coupling of interactive operations and procedural scripts. Such ad hoc approach results in incorrect administration, which leads to increased management...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Efficient Outer Join Data Skew Handling in Parallel DBMS

    Large enterprises have been relying on Parallel DataBase Management Systems (PDBMS) to process their ever-increasing data volume and complex queries. The scalability and performance of a PDBMS comes from load balancing on all nodes in the system. Skewed processing will significantly slow down query response time and degrade the overall...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Path Oracles for Spatial Networks

    The advent of location-based services has led to an increased demand for performing operations on spatial networks in real time. The challenge lies in being able to cast operations on spatial networks in terms of relational operators so that they can be performed in the context of a database. A...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    On Chase Termination Beyond Stratification

    The authors study the termination problem of the chase algorithm, a central tool in various database problems such as the constraint implication problem, Conjunctive Query optimization, rewriting queries using views, data exchange, and data integration. The basic idea of the chase is, given a database instance and a set of...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Mining Document Collections to Facilitate Accurate Approximate Entity Matching

    Many entity extraction techniques leverage large reference entity tables to identify entities in documents. Often, an entity is referenced in document collections differently from that in the reference entity tables. Therefore, the authors study the problem of determining whether or not a substring "Approximately" matches with a reference entity. Similarity...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Reference-Based Alignment in Large Sequence Databases

    This paper introduces a novel method, called Reference-Based String Alignment (RBSA), that speeds up retrieval of optimal subsequence matches in large databases of sequences under the edit distance and the Smith-Waterman similarity measure. RBSA operates using the assumption that the optimal match deviates by a relatively small amount from the...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Predictable Performance for Unpredictable Workloads

    This paper introduces Crescando: a scalable, distributed relational table implementation designed to perform large numbers of queries and updates with guaranteed access latency and data freshness. To this end, Crescando leverages a number of modern query processing techniques and hardware trends. Specifically, Crescando is based on parallel, collaborative scans in...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    SIMD-Scan: Ultra Fast In-Memory Table Scan Using On-Chip Vector Processing Units

    The availability of huge system memory, even on standard servers, generated a lot of interest in main memory database engines. In data warehouse systems, highly compressed column-oriented data structures are quite prominent. In order to scale with the data volume and the system load, many of these systems are highly...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Lazy Updates: An Efficient Technique to Continuously Monitoring Reverse k-NN

    In this paper, the authors study the problem of continuous monitoring of reverse k nearest neighbor queries. Existing continuous reverse nearest neighbor monitoring techniques are sensitive towards objects and queries movement. For example, the results of a query are to be recomputed whenever the query changes its location. They present...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Adaptively Parallelizing Distributed Range Queries

    The authors consider the problem of how to best parallelize range queries in a massive scale distributed database. In traditional systems the focus has been on maximizing parallelism, for example by laying out data to achieve the highest throughput. However, in a massive scale database such as the authors' PNUTS...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Synergy-Based Workload Management

    Workload management aims at the efficient execution of queries on a database. In this paper, scheduling plays a crucial role. A vast number of scheduling approaches have been developed, most of them belonging to one of two categories: analysis and monitoring. However, they mainly either focus only on one possible...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Linkage Query Writer

    The authors present Linkage Query Writer (LinQuer), a system for generating SQL queries for semantic link discovery over relational data. The LinQuer framework consists of LinQL, a language for specification of linkage requirements; a web interface and an API for translating LinQL queries to standard SQL queries; an interface that...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    Tuning Database Configuration Parameters With iTuned

    Database systems have a large number of configuration parameters that control memory distribution, I/O optimization, costing of query plans, parallelism, many aspects of logging, recovery, and other behavior. Regular users and even expert database administrators struggle to tune these parameters for good performance. The wave of research on improving database...

    Provided By VLDB Endowment

  • White Papers // Aug 2009

    MCC-DB: Minimizing Cache Conflicts in Multi-Core Processors for Databases

    In a typical commercial multi-core processor, the Last Level Cache (LLC) is shared by two or more cores. Existing studies have shown that the shared LLC is beneficial to concurrent query processes with commonly shared data sets. However, the shared LLC can also be a performance bottleneck to concurrent queries,...

    Provided By VLD Digital

  • Case Studies // Aug 2009

    US Retail Major Streamlines Its Indirect Procurement Spend

    Leading US based general merchandise discounter with indirect spend of over $ 6 billion decided to change its SI partner and engaged Infosys to take the program forward to Pilot implementation and beyond. A core strategy of the program was developed to migrate a sprawling array of sourcing and procurement...

    Provided By Infosys Technologies

  • White Papers // Aug 2009

    Break The Golden Rule

    It's not hard for most of the people to recall a time when one lets people down by inaccurately anticipating their preferences or expectations. Whether it's the wrong birthday gift for a spouse or sales approach for a customer, the culprit is often thinking that what one would want for...

    Provided By American Express

  • White Papers // Aug 2009

    A Computational Framework for Certificate Policy Operations

    The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as in PGP and SDSI/SPKI or explicitly required as in X.509, document expectations for trust in a PKI. The widespread use of X.509 in...

    Provided By Dartmouth College

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Protect More and Store Less (Part 4 of 4)

    Backup vs. archiving? Recovery vs. discovery? Which protects the data and which keeps the legal department off the back? This webcast looks at backup, recovery, and archiving. The presenter will discuss the business needs driving these areas of IT, as well as technical differentiation to demonstrate which information management solutions...

    Provided By Symantec

  • Case Studies // Aug 2009

    IBM Reduces Cost and Supports Growth With a Consolidated Solution for Wells' Dairy

    Founded in 1913 and based in Le Mars, Iowa, Wells' Dairy, Inc., is the largest family-owned and managed dairy processor in the United States, known for their popular BLUE BUNNY ice cream and novelties. Wells' Dairy was looking for an infrastructure refresh to improve performance while providing operating system flexibility,...

    Provided By IBM

  • White Papers // Aug 2009

    Generic Interactive Natural Language Interface to Databases (GINLIDB)

    To override the complexity of SQL and to facilitate the manipulation of data in databases for common people (not SQL professionals), many researches have turned out to use natural language instead of SQL. The idea of using natural language instead of SQL has prompted the development of new type of...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2009

    SOA-Based Integration of the Internet of Things in Enterprise Services

    Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This "Internet of Things" infrastructure will be strongly integrated...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    Business Process Management (BPM) Standards: A Survey

    Through the combination of SOA (Service Oriented Architecture) with an intelligent Business Process Management that guaranties the immediate execution of the defined processes in multiple IT-environments, SOA evolves into SOB (Service Oriented Business). SOB delivers a flexible and efficient business environment that supports and guides each and every person involved...

    Provided By Nanyang Technological University

  • White Papers // Aug 2009

    Data Quality Management in Wireless Sensor Networks: Guest Editorial

    As new fabrication and integration technologies continue to reduce the cost and size of wireless sensors, the observation and control of the physical world will expand dramatically with the temporally and spatially dense monitoring afforded by wireless sensor network technology. Several applications such as ZebraNet, Counter-sniper system, environment sampling, target...

    Provided By Inderscience Enterprises

  • White Papers // Aug 2009

    Enhancing XML Data Warehouse Query Performance by Fragmentation

    XML data warehouses form an interesting basis for decision support applications that exploit heterogeneous data from multiple sources. However, XML-native database systems currently suffer from limited performances in terms of manageable data volume and response time for complex analytical queries. Fragmenting and distributing XML data warehouses (e.g., on data grids)...

    Provided By University of Lyon 2

  • White Papers // Aug 2009

    Rhizoma: A Runtime for Self-Deploying, Self-Managing Overlays

    The trend towards cloud and utility computing infrastructures raises challenges not only for application development, but also for management: diverse resources, changing resource availability, and differing application requirements create a complex optimization problem. Most existing cloud applications are managed externally, and this separation can lead to increased response time to...

    Provided By University of Washington

  • Webcasts // Aug 2009

    BMC MainView for IMS 4.4 - What's New and What Has Changed?

    This new release of BMC MainView for IMS has some major changes. This webcast will point out the new functions of BMC MainView for IMS and what has changed. An update that will hopefully point out changes one might have missed, if he/she doesn't read the release notes.

    Provided By BMC Software

  • White Papers // Aug 2009

    UIM Evaluation: IBM Information on Demand

    IBM can claim what is arguably the industry's broadest portfolio of unified information management (UIM) software, serves and industry-specific solutions. IBM is promoting the importance of companies establishing an "information agenda." The information agenda is intended to map out corporate business and technology goals and to create a roadmap to...

    Provided By IBM

  • Case Studies // Aug 2009

    Customer Video: Cardinal Health

    Cardinal Health manufactures, packages, and distributes pharmaceuticals and medical surgical products around the globe. They use DB2v9 to optimize SAP and reduce storage capacity needs.

    Provided By IBM

  • Case Studies // Aug 2009

    Customer Video: Siemens

    Siemens is one of the largest technology companies with six major business divisions. They chose DB2 and SAP for scalability, performance, increased savings, and lower TCO.

    Provided By IBM

  • Case Studies // Aug 2009

    Customer Video: SAP IT Chooses DB2

    SAP's main driver for choosing IBM on DB2 was about the simple question: "What do we get for the money?". Find out why SAP Corporate Business Systems chose IBM DB2.

    Provided By IBM

  • White Papers // Aug 2009

    IBM DB2 9 Optimized for SAP Software

    IBM and SAP? have a unique partnership that was established with the goal of delivering the very best enterprise IT solutions to SAP customers. Both companies are leaders in their field: SAP brings industry-leading applications and IBM brings world-class infrastructure components, including hardware and softwareConsidering the vast amount of data...

    Provided By IBM

  • Case Studies // Aug 2009

    Low Rate Financing: Get competitive rates on virtually every IBM brand

    Improve your cash flow and return on investment with IBM Low Rate Financing?the best way to get the IT solutions your organization needs.

    Provided By IBM

  • White Papers // Aug 2009

    Vertical Paxos and Primary-Backup Replication

    This paper introduces a class of Paxos algorithms called Vertical Paxos, in which reconfiguration can occur in the middle of reaching agreement on an individual state-machine command. Vertical Paxos algorithms use an auxiliary configuration master that facilitates agreement on reconfiguration. A special case of these algorithms leads to traditional primary-backup...

    Provided By Microsoft

  • White Papers // Aug 2009

    Exploiting Behavioral Analytics Throughout Internet Sites

    This white paper examines how business managers at e-commerce, media and content sites are using behavioral analytics to increase revenue and lifetime value of their online audience. The paper explores how behavioral analytics focuses on visitor behavior patterns to uncover value-creating insights from website data. Delving deeper into the application...

    Provided By Quantivo Corporation

  • White Papers // Aug 2009

    The Case for Software-as-a-Service Analytics

    Software-as-a-Service (SaaS) has many advantages over traditional "on-premise" enterprise software, causing companies increasingly to consider SaaS solutions. Compared to most Business Intelligence options, managers and business analysts are finding SaaS solutions to be less expensive and easier to deploy and use. Today's newest analytics technologies are available as SaaS offerings,...

    Provided By Quantivo Corporation

  • White Papers // Aug 2009

    Measuring Knowledge Management Performance

    This is a theoretical paper that has the purpose of reviewing previous experiences based on surveying the extant literature with the aim of delving into the subject of Knowledge Management (KM) Performance. It is an attempt to try to identify performance indicators for measuring KM systems. The paper presents important...

    Provided By EuroJournals

  • White Papers // Aug 2009

    Transparent Mobile Storage Protection in Trusted Virtual Domains

    Mobile Storage Devices, such as USB flash drives, offer a flexible solution for the transport and exchange of data. Nevertheless, in order to prevent unauthorized access to sensitive data, many enterprises require strict security policies for the use of such devices with the effect of rendering their advantages rather unfruitful....

    Provided By Ruhr-University Bochum

  • White Papers // Aug 2009

    A Collaboration and Productiveness Analysis of the BPM Community

    The main scientific event for academics working in the field of business process management is the international BPM conference. In this paper, social network analysis techniques are used to unveil the co-authorship networks that can be derived from the papers presented at this conference. Links between two researchers are established...

    Provided By Springer Healthcare

  • Tools & Templates // Aug 2009

    IBM DB2 Compression ROI Tool

    To find out how much space a company can save by using the feature, the user can use the Data Storage Analyzer that employs the exact same algorithm as the Deep Compression feature to arrive at a very accurate estimate of the size of the compressed database.

    Provided By IBM

  • Training // Aug 2009

    IOD Portfolio Overview Demo

    Watch this video to see how IBM can help you unlock the business value of information for competitive advantage. Whether you are planning an initiative that requires master data management (MDM), information integration, enterprise content management (ECM), data warehousing and business intelligence, an SAP information infrastructure, or data server innovations;...

    Provided By IBM