Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • eBooks // Apr 2013

    7 Steps to Next-Gen IT Managed Services

    Managed service providers are expanding their service offerings and adopting a more active role in the management and planning of their clients’ IT infrastructures. How can your business stay up-to-date with the most recent industry trends? This eBook presents seven steps to creating a next-generation IT managed services business. Learn...

    Sponsored By LabTech Software

  • White Papers // Oct 2014

    BLU Acceleration changes the game

    Born from new advances in data processing from IBM Research, IBM® DB2® with BLU Acceleration is a leap forward in database technology that raises the bar for performance and value. BLU Acceleration uses patented technologies to deliver a unique combination of performance, ease of use and cost-efficiency—with 8 to 25...

    Sponsored By IBM

  • White Papers // Oct 2014

    Considerations for Maximising Analytic Performance

    Philip Howard of Bloor Research compares performance capabilities of the leading BI platforms. Companies studied in this comparison are IBM (Cognos, DB2 with BLU Acceleration), SAP (BusinessObjects, HANA), Oracle (Business Intelligence, Exadata) and Microsoft (Business Intelligence, SQL Server). His conclusion? "DB2 with BLU Acceleration should not only provide better performance...

    Sponsored By IBM

  • White Papers // Oct 2014

    The Forrester Wave Report: Enterprise Mobile Management, Q3 2014

    According to Forrester, early MDM solutions that focused on device management are growing into broader enterprise mobile management (EMM) solutions which can help I&O professionals mature their mobile strategy. In the Forrester Wave report, Forrester evaluates the 15 most significant EMM providers and details how each vendor fulfills the 27...

    Sponsored By Citrix Systems

  • White Papers // Oct 2014

    Learn the four stages to operational excellence

    The key to effective management is having the right information at your disposal. It does little good to have an “as-designed” document in your hands when there’s a more accurate “as-built” document that you can’t locate. When information is missing mistakes are made.

    Sponsored By EMC

  • White Papers // Oct 2014

    Learn how to make archiving an enterprise advantage: eBook

    Digital information is the lifeblood of the enterprise. Every day, business applications generate invoices, account statements, voice recordings and many other forms of information that must be preserved for business and regulatory purposes. More often than not, this information is inactive and stored in legacy applications that have been replaced...

    Sponsored By EMC

  • White Papers // Jul 2014

    Nucleus Research Note - Increasing Profitability with Analytics in Midsize Companies

    Business analytics can empower your business managers to make more fact-based, data-driven decisions that improve operating results. Learn more in a report from Nucleus Research.

    Sponsored By IBM

  • White Papers // Oct 2014

    Addressing key issues for managers of complex contracts in energy and engineering

    Contract and project management is a significant challenge in the energy and engineering industries. Supplier Exchange will allow participants to define workflows and collaboration methods that improve contract management by greatly reducing the time and cost to find and validate relevant information.

    Sponsored By EMC

  • White Papers // Oct 2014

    Managing Assets for Maximum Performance and Value

    State-of-the-art asset management is critical in industries such as oil and gas exploration and production, oil refining and gas processing, and utilities that rely heavily on expensive and aging physical assets. Among other benefits, effective asset management reduces costs and risks, improves process flows and business continuity, increases profit margins,...

    Sponsored By EMC

  • White Papers // Nov 2013

    The Essential Guide to IT Transformation

    Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.

    Sponsored By ServiceNow

  • White Papers // Nov 2013

    Boost IT Visibility and Value with Service Catalog

    Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.

    Sponsored By ServiceNow

  • Downloads // Apr 2014

    One Tool that Makes Server & Application Performance Monitoring Simple

    SolarWinds Server & Application Monitor (SAM) gives you the ability to proactively identify problems and isolate the root cause of performance issues. Rather than only responding to problems, fire drills and endless help tickets, stop poor performance before it affects service availability. Four reasons to consider SolarWinds Server & Application...

    Sponsored By SolarWinds

  • Downloads // Aug 2014

    Secure FTP Server Software for Managed File Transfer & File Sharing - Extremely Affordable & Easy-to-Use

    Serv-U® Managed File Transfer (MFT) Server from SolarWinds® is an easy-to-use FTP server software that delivers security, automation, and centralized control for file transfers in your organization. Deployed within your datacenter, Serv-U MFT Server allows you to securely transfer and share files with your business partners. Serv-U MFT Server supports...

    Sponsored By SolarWinds

  • Downloads // Jan 2014

    Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

    Sponsored By SolarWinds

  • White Papers // Oct 2014

    Ovum Decision Matrix: Selecting a Virtualization and Cloud Management Solution

    This report provides a side-by-side comparison of leading virtualization and cloud management solutions, looking at IT modernization from a data center infrastructure perspective. It considers the significance of management in the virtualization and cloud environments and how this influences the way in which technology is deployed, used, and controlled. Learn...

    Sponsored By HP

  • White Papers // Nov 2014

    Bare Metal Cloud- A Non-Virtualized Cloud Option for Performance-Sensitive Workloads

    This provides the results of a buyer/demand-side survey of U.S. enterprises with 1,000+ employees, involving more than 400 respondents, on their perceptions of the preferred business models & service providers–outsourcers from which they would want to procure private or public cloud & IaaS

    Sponsored By IBM

  • White Papers // Nov 2014

    Leveraging the Cloud for your ERP Workload

    This report explores that ERP workloads are too important and complex to risk in a commodity cloud service but too costly and labor-intense to be left out of the cloud strategy suggesting they are best served in a flexible hybrid cloud environ, designed for ERP software, managed by experts

    Sponsored By IBM

  • White Papers // Nov 2014

    Leveraging the Cloud for your DevOps Workload

    This report explores that by choosing the right PaaS, an IT organization can align development and operations resources, ensuring that applications are deployed quickly, cost-effectively, and error-free.

    Sponsored By IBM

  • White Papers // Nov 2014

    Leveraging the Cloud for your Big Data Workload

    This report explores how with the right partner, enterprises can ensure that their Big Data workloads perform consistently, securely, and cost effectively while delivering to a line-of-business colleagues’ need for on-demand, real-time analytics to make smart business decisions.

    Sponsored By IBM

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Real CIOs of the Cloud

    As cloud computing becomes the dominant technology of this decade, today's CIOs are the catalysts for change. This whitepaper published by Techweb features two technology leaders discussing their cloud strategy.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Forrester Report: The ROI of Software as a Service

    Read Forrester's review of 11 vendors in SaaS enterprise resource planning (ERP), customer relationship management (CRM), and supply chain management (SCM). The report confirms that, motivated by heavy competition for new customers, these resource management software vendors remain vigilant in mitigating such end-user concerns.

    Sponsored By Workday

  • White Papers // Nov 2014

    Pure Storage Reference Architecture for Oracle Databases

    The goal of this document is to demonstrate the ease with which Oracle can be deployed on, or migrated to, a Pure Storage Flash Array. We also take a look at the resulting performance improvements, and simplification of administrative tasks such as storage provisioning, database backup and recovery using snapshots....

    Sponsored By Pure Storage

  • White Papers // Nov 2014

    How Flash Changes Everything

    Servers and networks get continually faster and cheaper under Moore's Law, and as a result, are now substantially faster than the mechanical disk storage to which they connect. As a result of this growing mismatch, much of consumer technology has already transitioned from disk to flash memory; flash powers our...

    Sponsored By Pure Storage

  • White Papers // Sep 2014

    It's A Hybrid Cloud World. Are You Managing Your Hybrid State?

    If your company is using cloud computing services today, it’s highly likely you are already in a hybrid cloud configuration. The key question is whether you are actively managing this reality. In January 2014, Forester Consulting evaluated the state of enterprise hybrid cloud environments and how they are being managed....

    Sponsored By Hewlett-Packard (HP)

  • White Papers // May 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • Videos // Mar 2014

    Product Preview: Operational Intelligence Through Actionable Analytics

    In this product preview, you will learn how simple it is for managers to get the right data, analyze the information, and respond immediately to what they’ve learned. With Workday built-in actionable analytics, all users can get relevant information to help improve the overall operational intelligence throughout the organization.

    Sponsored By Workday

  • Research // Nov 2014

    Busting Myths About Mobility

    Innovations in mobile computing have radically changed the way we interact. Now they’re changing the way we do business. While many companies still see mobile solutions as too costly, risky or hard to manage, organizations that see beyond these misconceptions gain access to tremendous possibilities across the enterprise. Dell found...

    Sponsored By Dell and Intel

  • White Papers // Nov 2014

    Enabling Devices & Device Management for your Mobility-BYOD Program

    Enterprise initiatives designed to facilitate mobile productivity can deliver important benefits to your organization and your employees. To maximize mobile productivity, your employees need the right devices — devices that not only match employee preferences but also meet both business and IT requirements. This paper suggests best practices for selecting...

    Sponsored By Dell and Intel

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for Security Intelligence & Event Management

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • White Papers // Aug 2014

    Enterprise Security in Transition - An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Aug 2014

    Identity Management in an interconnected world: When Millions need access

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Aug 2014

    Buyer's Guide: Identity and Access Management

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection - Integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Aug 2014

    Reducing the Cost and Complexity of Endpoint Management - Report

    Discover how midsized organizations can improve endpoint security, patch compliance and lifecycle management on a limited budget.

    Sponsored By IBM

  • White Papers // Aug 2014

    IBM X-Force Threat Intelligence Quarterly Report Q2 2014

    This quarterly report from the IBM X-Force research and development team looks at how application vulnerabilities, spam threats and incident response are evolving - based on the latest data and ongoing analysis. It also includes insights from the IBM Global Technology Services division.

    Sponsored By IBM

  • White Papers // Aug 2014

    Enterprise Security: Avoiding Insider Threats

    IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling...

    Sponsored By IBM

  • White Papers // Aug 2014

    Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM