Data Management

Big Data, Hadoop, and analytics help unearth valuable patterns in business information. But without proper management, backup, archiving, and protection, you're taking an unacceptable risk.

  • White Papers // Mar 2015

    Infrastructure Matters: Data Analytics Overview

    Today’s real-time data platforms are helping leading organizations to better utilise information that has always resided within the business, as well as the growing volumes of new data. Read More..

    Provided By Fujitsu

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Provided By IBM

  • Downloads // Feb 2005

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic

  • Downloads // Jun 2007

    How do I... fill Word form fields with Access data?

    Filling a Word form with Access data can be useful when you need to use Word's formatting features to present that data in just the right way. Fortunately, the process is simple, whether sharing one record or thousands. Access expert Susan Harkins walks through this technique and provides the VBA...

    Provided By Susan Harkins

  • White Papers // Nov 2004

    SQL Server 2000 Enterprise Edition (64-bit): Advantages of a 64-Bit Environment

    HP has partnered with Microsoft to provide information about the advantages of a 64-Bit Environment. Microsoft SQL Server 2000 Enterprise Edition (64-bit) offers dramatic improvements in memory availability and parallel processing performance compared with SQL Server software running in a 32-bit environment. This paper describes the capabilities of the 64-bit...

    Provided By Hewlett-Packard (HP)

  • White Papers // Apr 2009

    Change Management Best Practices for the Engineering and Construction Industry

    Construction contracts differ from most legal agreements in that they expect and plan for changes. The purpose of this white paper is to highlight best practices of identifying and managing changes that might occur on a constructing project, and provide a process to effectively manage changes on construction projects. It...

    Provided By Oracle

  • White Papers // May 2008

    eTOM and ITIL: A Powerful Combination for End-to-End Service Management

    This white paper discusses the benefits of using the Tele Management Forum (TMF) Enhanced Telecom Operations Map (eTOM) and the Office of Government Commerce (OGC) IT Infrastructure Library (ITIL) process frameworks together. In combination, these tools and techniques enhance their individual capabilities to deliver high-quality and timely solutions. This process...

    Provided By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Infrastructure Matters: Disaster Recovery Overview

    This solution overview guide demonstrates how our services can help to give your users the level of data availability they have come to expect everywhere else. Read More..

    Provided By Fujitsu

  • White Papers // Nov 2014

    VDI Solutions Guide

    The IT industry has been abuzz over the past several years promoting the idea of VDI: virtualizing and centralizing desktops to enable IT to deliver a more secure, manageable, less costly, and ultimately more mature end-user computing model. In fact, IT departments are finding that with the right investments in...

    Provided By Pure Storage

  • White Papers // Jun 2015

    Cyber Risk Report 2015 – Executive Summary

    The headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers exploit them to penetrate defenses and steal data. The HP Cyber Risk Report 2015 provides a broad...

    Provided By Hewlett-Packard (HP)

  • White Papers // Jul 2015

    Fighting today’s Advanced Attacks

    Constructing a network security defense ad hoc, that is one product at a time as the need presents itself creates weak links in the overall strategy, weak links that can easily be broken. With multiple attack vectors and malware constantly increasing in volume and sophistication, what is needed is a...

    Provided By FORTINET

  • White Papers // Sep 2006

    Customer Relationship Management in Banking Sector and a Model Design for Banking Performance Enhancement

    Nowadays, many businesses such as banks, insurance companies, and other service providers realize the importance of Customer Relationship Management (CRM) and its potential to help them acquire new customers retain existing ones and maximize their lifetime value. At this point, close relationship with customers will require a strong coordination between...

    Provided By Yildiz Technical University

  • White Papers // Mar 2007

    Create a Process Documentation Guide: Developing a Template That Can Be Used to Document Any Process

    Document the processes by creating a template for the process documentation guide that includes the following items: scope statement, applicability matrix, product lines impacted, process roles involved, process management system procedures, exception management process, and decision matrix. This paper explores how to create a template for the process documentation guide....

    Provided By IBM

  • White Papers // Feb 2009

    Building a Low Latency Infrastructure for Electronic Trading

    As the global financial markets continue to shift towards electronic trading, the speed at which trading is able to take place establishes the winners and the losers among participants in the trading chain. Latency, wherever and however it is introduced, is the enemy of speed. Market participants are continuously driving...

    Provided By Sun Microsystems

  • Downloads // Feb 2009

    How to print multiple labels for a single record in Access

    Label printing is often more complex than generating a single label for each record. Users might need one label for multiple records or multiple labels for one record -- or something in between. Susan Harkins offers a VBA alternative that's more flexible than the Access wizard.This article portion of this...

    Provided By Susan Harkins

  • Downloads // Aug 2010

    Sample storage service catalog

    This sample Excel worksheet allows administrators to quantify the storage offering for their storage area network (SAN) and data protection infrastructures. The material is an adaptation of the Storage Networking Industry Association's Tiered Services Catalog. Read the related entry in our Servers and Storage blog.

    Provided By Rick Vanover

  • Downloads // May 2014

    IBM Platform LSF Evaluation/Download

    IBM Platform LSF is a powerful workload management platform for demanding, distributed HPC environments. It provides a comprehensive set of intelligent, policy-driven scheduling features that enable you to utilize all of your compute infrastructure resources and ensure optimal application performance.

    Provided By IBM

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Provided By Global Knowledge

  • Analyst Briefings // Apr 2014

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Provided By IBM

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Provided By Symantec

  • White Papers // Mar 2015

    Infrastructure Matters: Virtualisation Overview

    Whether you are operating a mature strategy or just starting out on your virtualisation journey, our services are designed to ensure your ICT benefits from simpler scalability, reliability and performance. Read More..

    Provided By Fujitsu

  • White Papers // Mar 2015

    Infrastructure Matters: Cloud Security Overview

    This solution overview guide explores how secure the cloud really is, and how Fujitsu services are designed to ensure your information is protected at every level. Read More..

    Provided By Fujitsu

  • White Papers // Oct 2014

    BLU Acceleration changes the game

    Born from new advances in data processing from IBM Research, IBM® DB2® with BLU Acceleration is a leap forward in database technology that raises the bar for performance and value. BLU Acceleration uses patented technologies to deliver a unique combination of performance, ease of use and cost-efficiency—with 8 to 25...

    Provided By IBM

  • White Papers // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

    Provided By IBM

  • White Papers // Nov 2013

    The Essential Guide to IT Transformation

    Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.

    Provided By ServiceNow

  • White Papers // Apr 2015

    Internet Security Threat Report 2015 - Key Findings

    If there is one thing that can be said about the threat landscape, and cyber security as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code...

    Provided By Symantec

  • White Papers // May 2015

    The Importance of Cyber Threat Intelligence to a Strong Security Posture

    Recently, the Ponemon Institute surveyed 693 IT security professionals from Fortune 1000, Global 2000 and the Forbes List of Largest Private Companies in order to understand how organizations are using, gathering and analyzing threat intelligence as part of their broader cybersecurity strategy. The resulting report answers the following questions: •...

    Provided By Webroot

  • White Papers // May 2015

    Best Practices Checklist: Email Security Cloud and Virtual Migration

    Looking for best practices to ensure a secure email for cloud and virtual migration? If you are considering migrating email security to the cloud, read this paper and discover best practices for planning and executing an email security migration that minimizes the risk of business disruption.

    Provided By Dell Software

  • White Papers // Mar 2010

    Essential Guide to an NDS-to-Active Directory Migration

    With the release of Windows Server 2008 and the latest iteration of Active Directory, many enterprise IT departments have decided that Active Directory is a sufficiently mature and proven technology and that the time has come to move from their current networking environment. Included in this group is a fairly...

    Provided By Dell Software

  • White Papers // Jul 2015

    Cohesive Approach to Addressing Advanced Targeted Attacks

    2013 and 2014 saw many major brands and large companies making headlines for massive data breaches. More than 100 million customers had personal and/or credit card information stolen through just one of these bold and extended attacks. Malicious hackers have attempted to conceal malware by using different file types and...

    Provided By FORTINET

  • White Papers // Oct 2010

    Bank Frauds In Nigeria: Underlying Causes, Effects And Possible Remedies

    This paper sets out to find the common types of bank fraud that are frequently carried out in the banking system, the underlying causes, level of staff involvement, consequences and possible means of ameliorating the problem. A sample of 100 respondents taken in Benin City, capital of Edo State, Nigeria...

    Provided By University of Benin

  • White Papers // Mar 2011

    How to build custom business solutions for iPhone and iPad

    The iPad and iPhone are winning over businesses, and desk-bound databases are a thing of the past. With FileMaker Pro and FileMaker Go, you can create custom-tailored business solutions that run not only on desktops and laptops but also on Apple's iPhone and iPad, with all the elegance of a...

    Provided By FileMaker

  • eBooks // Apr 2011

    Storage Tiering for Dummies e-book

    Welcome to Storage Tiering For Dummies, Oracle Special Edition. Today, explosive growth in storage requirements due to technology shifts, unstructured data, and regulatory mandates is more than traditional storage techniques can handle. IT budgets cannot support the growth necessary without a change in storage practices. Tiered storage is the smart...

    Provided By Oracle

  • White Papers // Apr 2011

    Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data

    With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based...

    Provided By Illinois Institute of Technology

  • Webcasts // Nov 2009

    Managing a Large JBoss Infrastructure With JBoss Operations Network: Travelers Insurance

    In this webcast the will learn how Travelers Insurance successfully manages a large JBoss infrastructure with JBoss Operations Network. The webinar will also cover highlights from the latest JBoss Operations Network 2.3 release. Senior Technologist from Travelers Insurance will present how the company is at the forefront of technology innovation...

    Provided By Red Hat

  • Downloads // Feb 2009

    10 tips for securing a Microsoft Access database

    A few best practices can go a long way toward protecting your Access data from careless or overly curious users. Here are some simple ways to add a few layers of security to a database.This download is also available as an entry in our 10 Things blog.

    Provided By Susan Harkins

  • White Papers // Jan 2009

    9 Steps for Implementing Business Process Management

    The benefits of Business Process Management (BPM) implementation are enormous in any economic environment. But achieving business agility in a turbulent, competitive global market is all the easier with BPM tools, as success stories of BPM-driven companies show. Spread across industry sectors, these companies stand out for their nimble response...

    Provided By TooStep

  • White Papers // Sep 2004

    Active Directory Benefits for Smaller Enterprises

    Microsoft Active Directory (AD) has been available since early 2000, and while most organizations have completed their AD deployment and are realizing the many business benefits of having deployed Active Directory, there are still organizations that have either not completed their deployment or have yet to take advantage of some...

    Provided By Microsoft

  • Book chapters // Oct 2006

    Master advanced searching to take your SQL query skills to the next level

    If you know the rudiments of the SQL query language but want to take your skills to the next level, learn how to take full advantage of SQL's expressive power: work more with SQL inside the database before pushing data across the network to your applications. Focus on advanced...

    Provided By O'Reilly Media

  • Downloads // Jan 2007

    TechRepublic's ultimate guide to enterprise wireless LAN security

    Enterprise wireless LAN security is a persistent concern for every system administrator and CIO. Threats from both within and without the enterprise threaten your data each and every day. This download gives you the basic foundation you need to secure your enterprise wireless connections by detailing security protocols such...

    Provided By George Ou