Data Management

Big Data, Hadoop, and analytics help unearth valuable patterns in business information. But without proper management, backup, archiving, and protection, you're taking an unacceptable risk.

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Provided By Symantec

  • White Papers // Mar 2015

    Infrastructure Matters: Virtualisation Overview

    Whether you are operating a mature strategy or just starting out on your virtualisation journey, our services are designed to ensure your ICT benefits from simpler scalability, reliability and performance. Read More..

    Provided By Fujitsu

  • White Papers // Mar 2015

    Infrastructure Matters: Cloud Security Overview

    This solution overview guide explores how secure the cloud really is, and how Fujitsu services are designed to ensure your information is protected at every level. Read More..

    Provided By Fujitsu

  • White Papers // Oct 2014

    BLU Acceleration changes the game

    Born from new advances in data processing from IBM Research, IBM® DB2® with BLU Acceleration is a leap forward in database technology that raises the bar for performance and value. BLU Acceleration uses patented technologies to deliver a unique combination of performance, ease of use and cost-efficiency—with 8 to 25...

    Provided By IBM

  • White Papers // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

    Provided By IBM

  • White Papers // Nov 2013

    The Essential Guide to IT Transformation

    Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.

    Provided By ServiceNow

  • White Papers // Apr 2015

    Internet Security Threat Report 2015 - Key Findings

    If there is one thing that can be said about the threat landscape, and cyber security as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code...

    Provided By Symantec

  • White Papers // May 2015

    Best Practices Checklist: Email Security Cloud and Virtual Migration

    Looking for best practices to ensure a secure email for cloud and virtual migration? If you are considering migrating email security to the cloud, read this paper and discover best practices for planning and executing an email security migration that minimizes the risk of business disruption.

    Provided By Dell Software

  • White Papers // Oct 2010

    Bank Frauds In Nigeria: Underlying Causes, Effects And Possible Remedies

    This paper sets out to find the common types of bank fraud that are frequently carried out in the banking system, the underlying causes, level of staff involvement, consequences and possible means of ameliorating the problem. A sample of 100 respondents taken in Benin City, capital of Edo State, Nigeria...

    Provided By University of Benin

  • White Papers // Mar 2011

    How to build custom business solutions for iPhone and iPad

    The iPad and iPhone are winning over businesses, and desk-bound databases are a thing of the past. With FileMaker Pro and FileMaker Go, you can create custom-tailored business solutions that run not only on desktops and laptops but also on Apple's iPhone and iPad, with all the elegance of a...

    Provided By FileMaker

  • eBooks // Apr 2011

    Storage Tiering for Dummies e-book

    Welcome to Storage Tiering For Dummies, Oracle Special Edition. Today, explosive growth in storage requirements due to technology shifts, unstructured data, and regulatory mandates is more than traditional storage techniques can handle. IT budgets cannot support the growth necessary without a change in storage practices. Tiered storage is the smart...

    Provided By Oracle

  • White Papers // Apr 2011

    Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data

    With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based...

    Provided By Illinois Institute of Technology

  • Webcasts // Nov 2009

    Managing a Large JBoss Infrastructure With JBoss Operations Network: Travelers Insurance

    In this webcast the will learn how Travelers Insurance successfully manages a large JBoss infrastructure with JBoss Operations Network. The webinar will also cover highlights from the latest JBoss Operations Network 2.3 release. Senior Technologist from Travelers Insurance will present how the company is at the forefront of technology innovation...

    Provided By Red Hat

  • Downloads // Feb 2009

    10 tips for securing a Microsoft Access database

    A few best practices can go a long way toward protecting your Access data from careless or overly curious users. Here are some simple ways to add a few layers of security to a database.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • White Papers // Jan 2009

    9 Steps for Implementing Business Process Management

    The benefits of Business Process Management (BPM) implementation are enormous in any economic environment. But achieving business agility in a turbulent, competitive global market is all the easier with BPM tools, as success stories of BPM-driven companies show. Spread across industry sectors, these companies stand out for their nimble response...

    Provided By TooStep

  • White Papers // Sep 2004

    Active Directory Benefits for Smaller Enterprises

    Microsoft Active Directory (AD) has been available since early 2000, and while most organizations have completed their AD deployment and are realizing the many business benefits of having deployed Active Directory, there are still organizations that have either not completed their deployment or have yet to take advantage of some...

    Provided By Microsoft

  • Book chapters // Oct 2006

    Master advanced searching to take your SQL query skills to the next level

    If you know the rudiments of the SQL query language but want to take your skills to the next level, learn how to take full advantage of SQL's expressive power: work more with SQL inside the database before pushing data across the network to your applications. Focus on advanced...

    Provided By O'Reilly Media

  • Downloads // Jan 2007

    TechRepublic's ultimate guide to enterprise wireless LAN security

    Enterprise wireless LAN security is a persistent concern for every system administrator and CIO. Threats from both within and without the enterprise threaten your data each and every day. This download gives you the basic foundation you need to secure your enterprise wireless connections by detailing security protocols such...

    Provided By George Ou

  • White Papers // Dec 2005

    Gartner's Magic Quadrant for Product Information Management

    This report is a must-read if you're an IT strategist who's currently evaluating product information management (PIM) technologies. It explains why the as-yet-immature PIM market is evolving quickly and presents Gartner's Magic Quadrant for this emerging tech sector. There are a variety of differences that separate the companies Gartner classifies...

    Provided By IBM

  • Book chapters // Jan 2006

    Use these risk-assessment methodologies to protect your IT infrastructure

    No matter what methodology or approach is used, it is important that the organization address how asset management and proper inventorying of the organizations IT assets are to be handled.This sample chapter, taken from Inside Network Security Assessment: Guarding Your IT Infrastructure, discusses different methodologies and approaches for conducting a...

    Provided By Sams Publishing

  • Downloads // Jan 2006

    Troubleshoot 10 common Exchange problems with these expert answers

    This list outlines 10 common Exchange problems and solutions. This handy two-page list outlines 10 familiar Exchange problems and an assortment of solutions. From user access errors to mail delivery problems, this list is great quick reference for every Exchange administrator.Here's a sample:Number 1: Users cannot access server. -...

    Provided By TechRepublic

  • Downloads // Feb 2008

    How do I... Add items to an Access combo box on the fly?

    On occasion, an application developer working with Microsoft Access may need a list control that's a bit more flexible by allowing users to update the control's list. Handing over a bit of control, in the right circumstances, can be helpful for everyone, including you. Susan Sales Harkins shows you how...

    Provided By Susan Harkins

  • Downloads // Mar 2008

    10 reasons to explicitly convert SQL Server data types

    SQL Server converts data types in two ways -- the way it wants to and the way you tell it to. Most implicit conversions work the way you expect. It's those surprise conversions that cause trouble. Unless you know exactly how SQL Server converts a data type, it's a good...

    Provided By Susan Harkins

  • White Papers // Sep 2006

    The Business Case for Disaster Recovery Planning: Calculating the Cost of Downtime

    IT leaders recognize that a disaster can be any event that prevents a business from accessing the data and systems it needs to operate. This could encompass everything from regional power outages, to virus outbreaks, to employee sabotage, to external data fraud, to devastating terrorist attacks. Virtually every company faces...

    Provided By Iron Mountain

  • Research // Dec 2004

    Best Practices for Service-Level Management

    Aligning IT with business objectives and showing the value of IT to the business is often seen as the Holy Grail by many CIOs. Among the potential ways of demonstrating IT value, reporting and constantly improving the quality of IT services is an effective first step. But service-level management (SLM)...

    Provided By Forrester Research

  • Downloads // Jun 2008

    10+ mistakes to avoid when using VBA Recordset objects

    As an Access developer or power user, you won't get far if you can't work with the Recordset object. But it's easy to go astray, and even the most seasoned experts make mistakes. Susan Harkins explains 12 common Recordset pitfalls you can anticipate and avoid.This download is also available as...

    Provided By Susan Harkins

  • White Papers // Nov 2007

    Captaris RightFax and Microsoft SQL Server: An Overview of the Technical Relationship Between the Two Products

    This paper describes the relationship between RightFax and SQL Server, and is intended for SQL Server administrators and other key stakeholders who need to know what occurs (and does not occur) on the SQL Server as it interacts with RightFax. RightFax metadata is stored in the RightFax database on SQL...

    Provided By Captaris

  • White Papers // Feb 2007

    Effective Practices for Data Management in the Oil and Gas Industry

    Effective information and data management (also known as information lifecycle management) consists of managing data from its creation to when it is no longer needed. In the upstream oil and gas industry, this involves actually managing the ever-increasing volume of data that oil and gas enterprises generate, while also managing...

    Provided By NetApp

  • White Papers // May 2008

    Top 10 Failure Points in Information System Implementation - How to Avoid the Press

    The most common failure in any information system implementation is end user rejection. This is true of many projects including ERP, EDRMS, and FMIS. One must therefore acknowledge that unlike many technical projects - new server installation, desktop refresh, etc. what makes information system deployments that much more challenging is...

    Provided By Hindin Solutions

  • Resource Center // Jul 2009

    Give your infrastructure a checkup: Four areas of security vital to business health

    Does your IT infrastructure need a physical? System-wide security checkups are essential to strategically assess areas of potential weaknesses, before it can cause problems. This article covers the four areas a checkup of your information security should cover: overall security capabilities, privacy, risk management and compliance.

    Provided By IBM

  • White Papers // Mar 2009

    EMC Captiva UCR Multi-Percentile Fee Database - A Detailed Review

    The Fee Database tool serves the medical community of providers and payers with a credible source of fees against which to benchmark healthcare services. This white paper provides a brief overview of the EMC Captiva Multi-Percentile Fee Database and how it provides both medical providers and healthcare payers a statistically...

    Provided By EMC

  • Downloads // Jun 2009

    10+ tips for working smarter with SQL

    The sharper your SQL skills become, the more robust and error-free your solutions will be. Here are a dozen practical tips to get you started.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • White Papers // Jul 2008

    Managed Hosting Services Checklist

    Do you know what to ask before you buy? The Web Hosting Unleashed Managed Hosting Services Checklist gives you a comprehensive list of questions and a step-by-step approach to evaluating managed-hosting vendors and providers. Be armed with the right questions, market research and criteria to select the right managed-hosting solution...

    Provided By Web Hosting Unleashed

  • White Papers // Jan 2009

    Moving an MS Access Database Application to the Web With Alpha Five Version 9

    This paper explains the need to seriously consider moving the MS Application to the Web. It turns out that the Web provides a number of very compelling reasons for doing this such as: once the application has been moved to the Web, any authorized user can log onto the application...

    Provided By Alpha Software

  • White Papers // Dec 2008

    The Importance of an Information Strategy

    Since its inception, IT has focused on reducing costs through process automation and the implementation of applications. However, that is no longer enough to sustain competitive advantage in a rapidly changing world. Today, important business decisions depend on having up-to-date, trustworthy information. At the same time, you need to assess...

    Provided By IBM

  • Case Studies // Sep 2008

    Microsoft IT Business Case for System Center Configuration Manager 2007 in a Data Center

    This paper will demonstrate the business case that Microsoft IT made to implement System Center Configuration Manager in a data center to reduce costs through optimized IT resources, improve efficiency, and enable the data center to meet its data and computing needs. Additionally, this paper will detail how the implementation...

    Provided By Microsoft

  • Downloads // Oct 2008

    Log errors in Microsoft Access with a simple function

    If you Google "error logging in Microsoft Access," you'll find a number of complex solutions. The process doesn't have to that difficult. Most of us need only a simple function to log specific information about the current error. This download includes a demonstration database and a several .bas module files...

    Provided By Susan Harkins

  • White Papers // Sep 2008

    Best Practices for Migrating to Oracle Exadata Storage Server

    Oracle Exadata Storage Server is a revolutionary advancement in database technology where database intelligence has been implemented at the storage level resulting in significant application performance gains. This paper defines best practices for pie-migration, migration, and post migration from legacy storage to Oracle Exadata Storage Server. The best practices aid...

    Provided By Oracle

  • Related Offers // Feb 2010

    SUSE LInux Enterprise Server with Expanded Support Exclusive Offer

    Many of you want to move between platforms, but business realities slow you down. You may be dealing with IT resource limitations or application migration challenges. Even training costs can keep you from making the move to SUSE Linux Enterprise Server as rapidly as you'd like. This offering takes the...

    Provided By Novell

  • Tools & Templates // Aug 2009

    IDC ROI Calculator for IBM Tivoli Netcool

    This ROI calculator from IDC will help you quickly and easily understand the average annual benefit that you may be able to achieve using IBM? Tivoli? Netcool?. The tool and underlying calculations and metrics are based on IDC research of 14 IBM Tivoli Netcool implementations, which have yielded an average...

    Provided By IBM