Data Management White Papers

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.

Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management
Results 1 - 25 of 3169Sort Results By: Published Date | Title | Company Name
By: Threat Stack     Published Date: Feb 11, 2015

In this webinar, an expert panel will examine the security needs of a modern, DevOps-managed infrastructure and how this changes how organizations protect their customer data.

Tags : threat stack, security monitoring, cloud security, intrusion detection, hackers, data loss prevention, network security, small business networks
    
By: IBM     Published Date: Jan 30, 2015

IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment. This session provides an overview of IBM Bluemix capabilities.

Tags : paas, ibm, infrastructure solutions, middleware challenges, knowledge management, enterprise applications, data management, data center
    
By: IBM     Published Date: Jan 30, 2015

IBM DevOps for Bluemix provides an integrated set of DevOps services in the IBM Bluemix PaaS. This session provides an overview of IBM DevOps services on Bluemix, focusing on quickly getting started with new projects and collaborative development with agile tracking and planning.

Tags : ibm, devops, developement, product development, agile tracking, collaborative development, knowledge management, enterprise applications
    
By: IBM     Published Date: Jan 30, 2015

Enterprise applications are becoming increasingly complex, leveraging components across multiple platforms, including cloud. Learn how you can leverage IBM DevOps Services for Bluemix to provide full multi-stage release and deployment management to facilitate development.

Tags : cloud development, deployment management, ops solutions, multiple platforms, ibm, knowledge management, enterprise applications, data management
    
By: IBM     Published Date: Jan 26, 2015

IBM Bluemix, a robust platform as a service (PaaS) to host and deploy your app, also provides a wide range of enterprise grade tools that can be used in your applications to run your business needs. The Analytics Warehouse Service available in IBM Bluemix provides a powerful, easy-to-use, and agile platform for business intelligence (BI) and analytics tasks. Check out this upcoming webcast to learn how you can create a ready-to-use BI and analytics service on Bluemix, in just a few clicks, and even access those results on an Android app.

Tags : analytics service, open cloud platform, ibm, web developers, mobile developers, business integration, security, it management
    
By: IBM     Published Date: Jan 26, 2015

Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development.

Tags : mobile quality assurance, mobile apps, time-to-feedback, mobile trends, it management, enterprise applications, data management
    
By: IBM     Published Date: Jan 26, 2015

There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.

Tags : ibm, bluemix, big data, intent, iot, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Jan 23, 2015

Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.

Tags : it trends, it environments, smarter physical infrastructures, data protection, it management, knowledge management, enterprise applications, data management
    
By: IBM     Published Date: Jan 23, 2015

Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Watch this webinar to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.

Tags : storage environment, cloud storage, it efficiency, cloud agility, data-driven analytics, it management, knowledge management, enterprise applications
    
By: Verisign     Published Date: Jan 22, 2015

As a leader in domain management and internet security, Verisign’s network supports more than 82 billion transactions on a daily basis, enabling nearly 50 percent of the internet’s domains. Building networks to survive the largest DDoS attacks on the internet is part of Verisign’s heritage, and Verisign has been using DDoS mitigation techniques for more than 16 years while protecting the .com and .net infrastructures. This gives Verisign the ability to flex its entire 1+ tbps infrastructure as needed in real-time response to attack scenarios against itself and its customers.

Tags : network capabilities, ddos attack mitigation, domain management, internet security, it infrastructure, internet domains, it management, enterprise applications
    
By: Verisign     Published Date: Jan 22, 2015

The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. It represents a unique view into the attack trends unfolding online for the previous quarter, including attack statistics, DDoS malicious code analysis and behavioral trends

Tags : service trends report, ddos, security research, it security analytics, ssdp vulnerability, security, it management, data management
    
By: Verisign     Published Date: Jan 22, 2015

Cyber security threats have become more pervasive and damaging than ever, ranging from advanced persistent threats to massive distributed denial of service (DDoS) attacks. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network even as zero-day threats emerge and known threats evolve.

Tags : ddos protection, cyber security threats, cloud-based protection, best practices, security, it management, enterprise applications, data management
    
By: Verisign     Published Date: Jan 22, 2015

Versign OpenHybridTM is a Verisign DDoS Protection Services architecture that enables interoperability between on-premise and cloud-based platforms. An easy to use tool (Open API), allows customers to leverage existing security perimeter devices to signal threat information to the Verisign DDoS protection cloud, when the capabilities of the device are exceeded. Verisign OpenHybrid™ can also be applied to monitor and protect services hosted within other public and private cloud services.

Tags : api specification, cloud signaling, ddos attacks, threat visibility, risk mitigation, security, it management, knowledge management
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: CareCloud     Published Date: Jan 21, 2015

Watch this on-demand webinar to learn how one scenario can help get the most from its PM and EHR.

Tags : carecloud, pm and ehr, boost revenue, ehr too expensive, practice ehr, revenue cycle management, ehr installation, system implementation
    
By: Dell     Published Date: Jan 21, 2015

Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.

Tags : dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure, infrastructure, storage virtualization, disaster recovery
    
By: SugarCRM     Published Date: Jan 20, 2015

After an initial rollout to more than 45,000 sales users, IBM wanted even greater insights. Thanks to the high usability of Sugar, IBM was able to increase sales data quality - which has gone on to power predictive sales analytics. Learn how IBM and SugarCRM are driving more effective sales teams.

Tags : sales analytics, data quality, sales, high usability, enterprise applications, data management
    
By: IBM     Published Date: Jan 14, 2015

Cloud-delivered big data analytics presents an enormous opportunity for organizations that want to become more agile, more efficient and more competitive. To capitalize on the full potential of this opportunity, businesses need cloud-enabled big data analysis solutions that are flexible, simple, secure and open.

Tags : big data, data management, the cloud, cloud solutions, data, data analytics, client engagement, computing model
    
By: IBM     Published Date: Jan 14, 2015

Decision makers need data and they need it now. As the pace of business continues to accelerate, organizations are leaning heavily on data warehouses to deliver analytical grist for the mill of daily decisions. This Research Report from Aberdeen Group examines the benefits of data warehouse solutions that offer rapid information delivery while minimizing complexity for users and IT.

Tags : aberdeen group, data warehouse, data center, data management, analytic tools, collaboration, data trust, data analytics
    
By: IBM     Published Date: Jan 14, 2015

Big data has been big news in recent years. Organizations recognize that they must now begin to focus on using big data technologies to solve business problems. The pressure is on for organizations to move past the discussion phase toward well-planned projects.

Tags : big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
By: IBM     Published Date: Jan 14, 2015

Bloor Research investigated several key critical success factors for big data analytics. Their findings show that governance, data cleansing, and privacy and security have never been more important. Read this paper to see their conclusions.

Tags : big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
By: IBM     Published Date: Jan 14, 2015

Explore this interactive infographic to discover how IBM makes it possible to manage all of these priorities while significantly reducing storage and maintenance costs.

Tags : big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
By: Dyn     Published Date: Jan 14, 2015

Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.

Tags : cloud based, dns service, ddos attack, user experience, infrastructure, dns performace, ddos, business intelligence
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and running multiple applications from both company and personal devices, sensitive corporate data is more vulnerable than ever before. For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.