Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • Podcasts // Feb 2013

    Splunk App for Citrix XenApp

    The Splunk for Citrix XenApp allows administrators to very easily correlate data across all components of all the user's XenApp deployments. When a performance issues arises, this 360 degree view provides a concise and detailed snapshot of any point in time, allowing administrators to quickly pinpoint and resolve any issues.

    Provided By DABCC

  • Podcasts // Jan 2013

    How to Successfully Deploy VMware vSphere Storage Appliance 5.1 in Brownfield Deployments

    In Brownfield deployments the VMware vSphere Storage Appliance (VSA) is used to create VSA clusters on existing ESXi hosts that have running virtual machines running on their local data stores. In order to successfully deploy and configure a VSA cluster in a Brownfield environments with zero or minimal down-time the...

    Provided By DABCC

  • Podcasts // Jan 2013

    How, When and Why to Recommend Software Storage Virtualization

    In this podcast, the speaker will explore how the installation of DataCore SANsymphony-V removes storage-related roadblocks to virtualization deals, How one installation of DataCore SANsymphony-V can dramatically speed up the adoption and standardization of virtual infrastructures and when budgets have changed, installation of SANsymphony-V means that the user don't have...

    Provided By DABCC

  • Podcasts // Jan 2013

    Overcoming the Performance Hurdle - Optimize and Virtualise Your Critical Apps

    In this podcast, the speaker explains about overcoming the performance hurdle and how to optimize and virtualized the users' critical business applications with the use of DataCore's SANsymphony-V Storage Hypervisor. Understand the demands of Tier-1 applications such as Sharepoint, SQL server, SAP, or any application that requires high availability, scalability,...

    Provided By DABCC

  • Podcasts // Jan 2013

    Virsto Technical Architecture Overview

    Virsto software is purpose built to unlock the potential of existing block and SSD storage in virtualized environments. The Virsto Storage Hypervisor is essential to achieve the potential of software defined storage. Virsto provides differentiated data services at the per-VM level - such as high performance snapshots, clones, and thin...

    Provided By DABCC

  • Podcasts // Dec 2012

    Database and Hadoop as a Service with VMware Data Director

    VMware Data Director allows administrators to create standardized database templates for virtualized deployment on vSphere, enabling end users to self-service perform routine tasks like provisioning, refresh, backup, and restore. Data Director supports Oracle, SQL server, Postgres, and Hadoop.

    Provided By DABCC

  • Podcasts // Dec 2012

    Veeam Backup Management Suite 6.5 - Advanced Monitoring for Backup

    Veeam Backup Management Suite offers capabilities that make it easier than ever to know the user's virtual environment is protected. With 24x7 monitoring of the backup infrastructure and features that let the user easily identify unprotected VMs, optimize backup resources, automatically document backup status, and more.

    Provided By DABCC

  • Podcasts // Jan 2014

    There's Gold in Them Thar Package Management Database

    There is a lot of useful file metadata stored in package management databases for popular Linux distributions. The RedHat Package Manager (RPM) and Debian's dpkg are two examples. In this podcast, the speaker focus on how to leverage RPM in forensic investigations, as it can provide a quick and effective...

    Provided By SecurityTube.net

  • Podcasts // Oct 2014

    CMOD Customer Self Service Animated Video

    An animated video showing how IBM Content Manager OnDemand drives customer engagement to increase satisfaction, raise ROI

    Provided By IBM

  • Podcasts // Sep 2014

    Blended Web and Database Attacks on Real-time, In-Memory Platforms

    It is well known there is a race going on in the \"Big data\" arena. One of the stronger competitors in the \"Big data\" market is real-time, in-memory platforms. An interesting thing about this platform and, the one the speakers will explain about specifically, is that it blends everything to...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    The DevOps of Everything

    Although the movement started out as a problem statement to solve developer and operations collaboration, it quickly moved into other disciplines such as security, networking and storage. In this podcast, the speaker will take a look at the DevOps affect on things like converged infrastructure, software defined networking, software defined...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Autoscaling Web Application Security in the Cloud

    Securing web applications has placed extreme demands on security professionals - in addition to understanding attack patterns and defense tactics, effectively protecting web apps requires some level of programming and database management expertise. With broad adoption of public clouds, this bar is rising once again. Today's cloud enabled applications scale-up...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Bringing a Machete to the Amazon

    With concrete examples and new techniques in this podcast, the speaker will explore \"Full stack\" vulnerabilities and their effect on security and how they create new pitfalls when migrating to and operating in an Amazon Web Services (AWS) world. From the simple (checking in the user AWS credentials to github...

    Provided By SecurityTube.net

  • Podcasts // Nov 2013

    Why care about managed services? Transformational benefits, that's why

    This mini paper and podcast features Lynn Koch discussing the benefits of managed services.

    Provided By IBM

  • Podcasts // Nov 2013

    Private clouds have come of age

    With CIOs and IT managers increasingly challenged to do more with less, they really need to be selective about their investments. Many are turning to private clouds.

    Provided By IBM

  • Podcasts // Dec 2014

    Data Loss Prevention: Databases and Web Loss

    In this podcast, the speaker will explain about data loss prevention and Web loss. In this podcast, speaker will cover topics like SQL Misuse, cross-site scripting, Web scanning, honeypots etc.

    Provided By SecurityTube.net

  • Podcasts // Dec 2014

    Identifying Web Attacks Via Data Analysis

    In this podcast, the speaker will look at detection of SQL injection using machine learning as well as profiling web traffic to find misbehaving hosts. The goal is to get beyond "Top N" types of analysis and begin using multiple features to guide the users towards interesting traffic.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    IBM SmartCloud Entry for Power Systems

    The IBM SmartCloud™ Entry on Power Systems™ solution provides a cost-competitive, entry-level private cloud solution that helps speed time to value of your service deployments on your IBM Power Systems servers.

    Provided By IBM

  • Podcasts // Jan 2014

    BYOEF Video

    Learn how build your own a highly resilient, high-performance Brocade Ethernet fabric.

    Provided By Brocade

  • Podcasts // Jan 2013

    Encryption - Encrypt Data Written to Removable Storage Devices

    Database users and applications need not be aware of the fact that the data they are accessing is stored in encrypted form. In this podcast, the speaker going to explain how to enforce encryption for files written to removable storage devices.

    Provided By Novell

  • Podcasts // Jan 2013

    Get into the Cloud: Novell Cloud Manager Overview

    Chances are the users' data center is a lot more complicated (and expensive) than it has to be. Cloud computing can help simplify things, and lower their IT costs dramatically, but it feels way too risky to a lot of people. In this podcast, learn how Novell cloud manager can...

    Provided By Novell

  • Podcasts // Jan 2013

    BSM in the Cloud With Forrester Research Part 1: Managing an End-to-End View Made Simple

    Take advantage of the flexibility and cost reductions virtualizing the people environment brings. In this podcast, learn how to remove the risk of a service impacting event and enjoy further cost reductions in management of their virtualized environment.

    Provided By Novell

  • Podcasts // Jan 2013

    Rethink Your Disaster Recovery Plan

    Many disaster recovery plans are not up to the complex task of protecting physical server workloads on multiple platforms. In a challenging economy, the business risks associated with downtime - lost revenue opportunity, customer loyalty, and productivity - are even greater. In this podcast, learn how solutions leverage virtualization to...

    Provided By Novell

  • Podcasts // Jan 2013

    Storage Control - Enforce Read Only Access and Disable Removable Storage Devices

    In this podcast, the speaker going to discuss about the storage device control which enforce read only access and disable removable storage devices. And also learn how to disable storage, enforce to read only access to storage and white list storage devices.

    Provided By Novell

  • Podcasts // Jan 2013

    Introducing NetIQ Cloud Manager 2.0 Web Seminar

    In this podcast, learn about the easiest and most secure way to build and manage the users' private cloud. The speaker will also discuss about the consumerization of IT along with the service delivery in the enterprise.

    Provided By Novell

  • Podcasts // Jan 2013

    Provisioning Business Services With Cloud Manager

    It takes too long to provision new business services. IT provisioning processes are manual, error-prone and poorly coordinated. In this podcast, learn how the user can provision business services faster using the automated workflows and provisioning engine in Novell cloud manager.

    Provided By Novell

  • Podcasts // Jan 2013

    Backup Exec Highlights

    In this podcast, the speaker going to highlight the reasons why businesses need to choose Backup Exec for their entire virtual and physical backup, data de-duplication and disaster recovery needs.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Better Information Governance

    Learn how Symantec's vision for Better Information Governance can help the user officially understand the context and relevance of their information so they can better mitigate risks while lowering their costs and reducing their workloads.

    Provided By Symantec Corp.

  • Podcasts // Apr 2014

    IBM MobileFirst - Infrastructure Consulting Services

    Mobile technology can be overwhelming, that’s why leaders have told us that they look to external IT service providers to help them reach their mobility goals. Watch the video to learn how IBM MobileFirst Infrastructure Consulting services can help you identify important aspects of mobility you may be overlooking; address...

    Provided By IBM

  • Podcasts // Apr 2014

    Eliminate the Challenges of Managing and Monitoring Your Systems

    Many organizations face a staggering amount of costs, complexity and inefficiency when it comes to managing and monitoring IT systems. IBM Managed Services can reduce and even eliminate the burden of systems management, free organizations to focus on inno

    Provided By IBM

  • Podcasts // Apr 2014

    Basics of Hardware Snapshots

    CommVault’s Phil Philip Curran (@PhilJPhilip Curran) discusses how integrated snapshots and data replication technologies can quickly create multiple recovery-ready copies of production data without impacting server performance. In addition, CommVault’s deep integration with VMware vStorage APIs for data protection (VADP) helps customers protect their virtual machines as they come online.Learn...

    Provided By CommVault Systems

  • Podcasts // Jan 2014

    Best Practices for Designing, Formatting and Publishing Better Reports

    In this podcast, the speaker explains the business intelligence and analytics product evangelist for Dell software group. It helps the user will learn tips and tricks for better reporting like: visually designing world-class reports, reporting tips for formatting, filtering and grouping data, sharing, publishing and exporting reports with business users...

    Provided By Modern Analyst Media LLC

  • Podcasts // Apr 2014

    Extend the Cloud to the Branch with Citrix CloudBridge (ANZ)

    In this podcast, the speaker will cover the comprehensive enhancements to the Citrix CloudBridge platform, including new appliances, new solution partners and new features that expand and enhance application delivery and management to the branch. Gain a better understanding of the new CloudBridge 800 and 400 appliances for small and...

    Provided By Citrix Systems

  • Podcasts // Jun 2011

    SolarWinds Storage Manager Overview

    In this webcast, the presenter will give an overview about the storage manager. The presenter will also describe how it helps the user to optimize storage performance and capacity for virtualized environments.

    Provided By SolarWind

  • Podcasts // Jan 2014

    View Historical Blocking in SQL Server

    In this podcast, the speakers explain how database performance analyzer for SQL server records historical blocking relationships, so the user can rewind time to see what blocking occurred and how it affected their end users and applications.

    Provided By SolarWind

  • Podcasts // Jan 2014

    Business Requirements Scoping Techniques

    In this podcast, the user will learn how to define clear business objectives and corresponding success metrics, how to craft a focused vision statement and how to specify other elements of the business requirements.

    Provided By Modern Analyst Media LLC

  • Podcasts // Mar 2012

    Fingerbank - Open DHCP Fingerprints Database

    In this podcast, the speakers will first take a step back and offer a basic reminder of what passive fingerprinting is and, more precisely, DHCP fingerprinting. Then they will offer defensive and offensive use cases for DHCP fingerprinting.

    Provided By SecurityTube.net

  • Podcasts // Mar 2012

    Gone in 60 Minutes: Stealing Sensitive Data From Thousands of Systems Simultaneously With OpenDLP

    OpenDLP is an open source, agent-based, massively distributable, centrally managed data discovery program that runs as a service on Windows systems and is controlled from a centralized web application. OpenDLP also supports scanning databases for sensitive information. It can also perform agentless scans of Windows systems over SMB and UNIX/Linux...

    Provided By SecurityTube.net

  • Podcasts // Mar 2012

    VDLDS: All Your Voice Are Belong to Us

    Anytime the users want to bypass the system, they tend to have a telephone conversation instead of leaving a paper trail. Data Leakage Prevention (DLP) is on top of the list for most organizations, be it financial or medical industry. In order to overcome this issue the speakers need to...

    Provided By SecurityTube.net

  • Podcasts // Mar 2012

    Hacking and Securing DB2 LUW

    DB2 for Linux, Unix and Windows is one of the databases where only little bit information about security problems is available. Nevertheless DB2 LUW is installed in many corporate networks and if not hardened properly could be an easy target for attackers.

    Provided By SecurityTube.net