Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • White Papers // Mar 2015

    M-Trends 2015 - A View from the Front Lines

    While we have seen modest gains in organizations’ ability to overcome the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. The M-ternds report by Mandiant, provides a brief overview of the how attackers’ motives and tactics changed in 2014....

    Sponsored By FireEye

  • White Papers // Mar 2015

    Top 10 Tips for Cyber Resilience

    Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

    Sponsored By Symantec

  • White Papers // Mar 2015

    Infrastructure Matters: Data Analytics Overview

    Today’s real-time data platforms are helping leading organizations to better utilise information that has always resided within the business, as well as the growing volumes of new data. Read More..

    Sponsored By Fujitsu

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Provided By Global Knowledge

  • White Papers // Aug 2014

    12 Essential Tasks of Active Directory Domain Services

    Discover the 12 major tasks of Active Directory Domain Services (AD DS) administration and management, and how delegation can be an excellent way for administrators to reduce the their workload and streamline management of their AD DS infrastructures. Read the white paper and learn how the implementation of proper...

    Provided By Dell Software

  • White Papers // Sep 2014

    The Forrester Wave Private Cloud Solutions

    Enterprises look to private clouds for more than just virtual infrastructure provisioning. Private cloud vendors have started to bundle additional capabilities into their solutions, including pervasive VM management capabilities, design tools for complex application templates, and service catalogs. HP is the sponsor of this material. By submitting your information...

    Provided By Hewlett-Packard (HP)

  • White Papers // Nov 2014

    IDC Converged and Integrated Datacenter Systems:Creating Operational Efficiencies

    STRUGGLING WITH THE COMPLEXITY OF LEGACY IT? Download this IDC report to learn how your organization can benefit from converged infrastructure. IT has moved away from siloed servers, storage, data, and processes and is embracing converged, virtualized technologies. This IDC Insight report examines the benefits of converged infrastructure...

    Provided By Nutanix

  • Downloads // Jul 2004

    Microsoft Access Help Desk Database

    Use this sample Microsoft Access Help Desk database as a simple substitute for commercial help desk software. It provides pertinent customer information with tabs to track call details as well as create reports.

    Provided By TechRepublic

  • White Papers // Nov 2014

    VDI Solutions Guide

    The IT industry has been abuzz over the past several years promoting the idea of VDI: virtualizing and centralizing desktops to enable IT to deliver a more secure, manageable, less costly, and ultimately more mature end-user computing model. In fact, IT departments are finding that with the right investments in...

    Provided By Pure Storage

  • Downloads // Dec 2005

    10 common SQL Server problems and solutions

    This list outlines 10 common SQL Server problems and solutions. This handy two-page list outlines 10 familiar SQL Server problems and an assortment of solutions. From "Out of Space" errors to a database going suspect, this list is great quick reference for every SQL administrator.Here's a sample:Number 1: Users...

    Provided By TechRepublic

  • Downloads // Feb 2005

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic

  • White Papers // Aug 2013

    Controlling and Managing Superuser Access

    Every business needs privileged account users. Unfortunately, most operating systems offer all-or-nothing solutions. This white paper explores the risks associated with privileged accounts, and explains how Dell solutions can mitigate those risks. Download the white paper today to learn more.

    Provided By Dell Software

  • White Papers // Aug 2014

    Quick Guide SSL VPN Technical Primer

    Use this primer to quickly find answers to many common questions about SSL VPNs, and understand the many advantages of this technology for secure mobile access.

    Provided By Dell Software

  • White Papers // Aug 2012

    The Importance of Managing Privileged Accounts

    Discover invaluable insights on the benefits of properly managing administrative privileges, developing a policy for managing privileged accounts and enforcing those policies. Could you be managing your privileged accounts better? Download the whitepaper today and find out.

    Provided By Dell Software

  • White Papers // Jul 2014

    Upgrading Your vCenter Server and ESXi Host to vSphere 5.5

    There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process,...

    Provided By Global Knowledge

  • White Papers // Aug 2014

    Interactive Infographic: A Personal Training Guide for Your Journey to the Cloud - India

    Is your IT infrastructure healthy or is it struggling to meet the intensifying demands placed on it by today's evolving business environment?, are emerging trends in cloud computing, big data, mobility, and security making your IT organisation leaner, smarter and more agile, or is it making it obsolete, unresponsive, and...

    Provided By NetApp

  • White Papers // Sep 2014

    Executive Guide to Big Data and Apache Hadoop

    This special edition ebook, from the author of Hadoop for Dummies, contains everything you need to know to get started with Big Data and Hadoop. It also recommends how to evaluate Hadoop’s platform offerings so you can meet your business objectives. Download this ebook to learn critical big data...

    Provided By MapR

  • White Papers // Mar 2014

    Tips to improve the mobile app experience over Wi-Fi

    As the growing number of people who are using their mobile device access apps at work through Wi-Fi networks, there is an increasing demand on the quality of Wi-Fi signals to improve users’ mobile app experience. This executive brief presents us with 5 tips for ensuring mobile apps run flawlessly....

    Provided By Aruba Networks

  • White Papers // Jun 2014

    Windows 8.1 Client to Microsoft's Cloud Services

    Over the past several years, Microsoft has reinvented its enterprise technologies in its push toward the cloud. Windows 8 is a key part of making Microsoft customers and devices cloud-ready for the next generation of technology. With Microsoft cloud services such as Office 365, Office Web Apps, and SkyDrive, Windows...

    Provided By Global Knowledge

  • White Papers // Nov 2004

    SQL Server 2000 Enterprise Edition (64-bit): Advantages of a 64-Bit Environment

    HP has partnered with Microsoft to provide information about the advantages of a 64-Bit Environment. Microsoft SQL Server 2000 Enterprise Edition (64-bit) offers dramatic improvements in memory availability and parallel processing performance compared with SQL Server software running in a 32-bit environment. This paper describes the capabilities of the 64-bit...

    Provided By Hewlett-Packard (HP)

  • White Papers // May 2014

    5 Things You Didn’t Know About Cloud Backup

    IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. For example, did you know: That encryption doesn’t guarantee privacy? That you could lose data by choosing the wrong cloud? That cloud backup doesn't have to be slow? Learn...

    Provided By Druva

  • eBooks // Oct 2014

    The Guide to Big Data Analytics

    Based on best practices and subject matter experts, Datameer’s guide to big data analytics discusses everything from the “What” and “Why” of big data analytics to determining the right solution and building success with big data analytics technology. Download this e-book to dive into use cases, buy vs. build considerations,...

    Provided By Datameer

  • eBooks // Nov 2014

    DBAs are from Saturn, Storage Admins are from Neptune

    Have you ever wondered why the DBA - Storage Admin relationship is so complicated? Are DBAs unrealistic and uncooperative? Are Storage Admins slow and prone to overcomplicate? NO! Download this eBook and we'll give you tips to get more out of your DBA - Storage Admin relationship.

    Provided By Pure Storage

  • White Papers // Nov 2014

    Deploying Database-as-a-Service with Pure Storage and VMware

    Database as a service (DBaaS) is a critical aspect of the software-defined data center paradigm and is a key initiative that will enable rapid application development. However, storage performance is often the limiting factor which holds back a DBaaS project. Traditional disk-based storage can't meet the performance needs for DBaaS...

    Provided By Pure Storage

  • White Papers // Dec 2014

    Innovator's Dilemma in Large Business Houses with the Advent of Big Data, Data Science and Internet of Things (IOT)

    A recent paper from Harvard business review claiming the job of a data scientist being the sexiest one of the 21st century and various other groups within the Silicon Valley advocating and questioning the traditional RDBMS and SQL systems have brought the terms data science, big data, NoSQL etc. right...

    Provided By freepdfhosting

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Provided By Global Knowledge

  • Analyst Briefings // Oct 2014

    Harnessing Data in The Internet of Things 

    The number of internet connected devices will explode over the next few years, by 2020 well over twenty billion devices, ranging from complex interactive systems to tiny sensors, will be collecting and transmitting data over the internet. The volume of data generated by the internet of things (IoT) will be...

    Provided By IBM

  • Downloads // Jul 2006

    Download Savvion's Free Business Process Modeling Software

    The first step in improving your business processes is to articulate precisely where bottlenecks exist, and the most efficient way to do that is by simulating your existing processes using business process modeling software. To help you get started, Savvion offers its Process Modeler, a component of Savvion BusinessManager,...

    Provided By Savvion

  • White Papers // Mar 2007

    Create a Process Documentation Guide: Developing a Template That Can Be Used to Document Any Process

    Document the processes by creating a template for the process documentation guide that includes the following items: scope statement, applicability matrix, product lines impacted, process roles involved, process management system procedures, exception management process, and decision matrix. This paper explores how to create a template for the process documentation guide....

    Provided By IBM

  • White Papers // Aug 2014

    Interactive Infographic: A Personal Training Guide for Your Journey to the Cloud

    Is your IT infrastructure healthy or is it struggling to meet the intensifying demands placed on it by today's evolving business environment?, are emerging trends in cloud computing, big data, mobility, and security making your IT organisation leaner, smarter and more agile, or is it making it obsolete, unresponsive, and...

    Provided By NetApp

  • White Papers // Nov 2014

    The BYOD Policy Checklist

    This white paper will help you understand the key challenges of a BYOD Policy, give you a step-by-step guide for creating an effective policy, and information on how to roll out, review and update the policy.

    Provided By Macquarie Telecom Australia

  • eBooks // Oct 2014

    Big Data Analytics Buyers Guide

    Data is the lifeline of any company today. And organizations using big data analytics have a significant competitive edge. Datameer’s big data analytics application can help you get from raw data to insight faster than ever by putting the power of big data directly into the hands of those who...

    Provided By Datameer

  • eBooks // Oct 2014

    Why Big Data Analytics

    It’s hard to overstate the importance of data for businesses in today’s world – it has become the lifeline of any company. With the focus on using big data analytics, opportunities for powerful insights across all areas of operations, customer behavior, and product adoption have arisen, but so have the...

    Provided By Datameer

  • Research // Nov 2014

    2014 is the Year of the All-Flash Array

    Flash is a disruptive technology that has already revolutionized mobile computing once with NAND flash in digital audio players, mobile phones and a handful of other personal devices back in the '90s, but a new revolution in the enterprise storage ecosystem is in the works. All-flash arrays (AFAs) are a...

    Provided By Pure Storage

  • White Papers // Sep 2014

    Forrester: Customer-Focused Organizations Must Take a Strategic Approach to Identity Relationship Management

    Customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before. Forrester finds that to achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity. Fortunately, a...

    Provided By ForgeRock

  • White Papers // Jun 2006

    Forrester Best Practices: How IT Must Shape and Manage Demand

    Download the Forrester Research white paper, "How IT Must Shape and Manage Demand," to read about best practices in IT demand management, a critical IT governance process that: Aligns IT resources to optimize business value Influences and modifies end user behavior by providing meaningful information Enables a more complete...

    Provided By frontrange

  • White Papers // Mar 2010

    Essential Guide to an NDS-to-Active Directory Migration

    With the release of Windows Server 2008 and the latest iteration of Active Directory, many enterprise IT departments have decided that Active Directory is a sufficiently mature and proven technology and that the time has come to move from their current networking environment. Included in this group is a fairly...

    Provided By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Provided By Dell Software

  • White Papers // Feb 2014

    Unchain Your Network with Application Intelligence and Control

    This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.

    Provided By Dell Software

  • White Papers // May 2013

    The Keys to the Kingdom: Limiting Active Directory Administrators

    Many organizations have come to rely heavily on the information stored directly within Active Directory (AD) with other applications using AD for authentication. However, the manual processes used to update Active Directory (AD) can leave organizations vulnerable, and lead to missing, inaccurate or inconsistent information. Learn how the technical considerations...

    Provided By Dell Software