Data Management White Papers

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.

Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management
Results 1 - 25 of 3458Sort Results By: Published Date | Title | Company Name
By: Singtel     Published Date: Apr 30, 2015

Join us at this webinar to learn more about this region and its data center landscape. From the latest developments and regulations, to potential opportunities and pitfalls, gain insight to the business advantages and challenges operating in key Asian countries.

Tags : singtel, data center, data center, asia data center, best practices, remote access, remote network management, backup and recovery
    
By: Iron Mountain     Published Date: Apr 29, 2015

Join Iron Mountain and EMC in this webinar to understand best practices on optimizing backup and off-site data protection.

Tags : iron mountain, backup, off site data protection, data protection, cloud, disk, tape, infrastructure
    
By: IBM     Published Date: Apr 23, 2015

With IBM analytics for big data with a smart mobile strategy, banks can increase wallet share and assets under management while lowering the organization’s operating ratio by using more efficient channels.

Tags : ibm, analytics, efficiencies, digital banking, management, strategy, data management, data center
    
By: IBM     Published Date: Apr 23, 2015

Banks face many challenges as they strive to return to pre-2008 profit margins including reduced interest rates, unstable financial markets, tighter regulations and lower performing assets. Fortunately, banks taking advantage of big data and analytics can generate new revenue streams. Watch this real-life example of how big data and analytics can improve the overall customer experience.

Tags : ibm, big data, profit margins, regulations, analytics, customer experience, banking, bank
    
By: CrownPeak     Published Date: Apr 17, 2015

Websites today are required to meet comprehensive safety, security and confidentiality measures. However, dangerous cyber attacks like Distributed Denial of Service (DDoS) can temporarily, or worse, permanently, affect the accessibility and availability of a website. So how does a website protect itself from these malicious attacks to ensure safety, scalability and security for its users? They must build services and applications which are resilient to these security threats.

Tags : amazon web services, aws, ddos attacks, resilient architecture, crownpeak, websites security, it solutions, it management
    
By: Acquia     Published Date: Apr 16, 2015

Recently, a giant in the pharmaceutical industry found that the number of its digital properties had exploded. Most sites were custom developed to support individual brands or markets, and few shared a common platform.

Tags : digital, drupal, acquia, acquia cloud, digital experience cloud, cloud management system, digital presence, application integration
    
By: Microsoft Dynamics     Published Date: Apr 15, 2015

If you aren’t tapping into social selling, you’re missing out. Customers want to be treated like individuals, not psychographic profiles. The more connected you are to today’s social and mobile customer, the better chance you have of establishing trust and having an honest dialogue. Social doesn’t replace email. Cold calls aren’t dead. These tactics all have their time and place, but social represents the most exciting channel that sales has had in a long time to stay connected and informed.

Tags : crm, microsoft crm, microsoft dynamics, crm online, free crm for small business, social media marketing, social media sales, best crm online
    
By: Citrix Systems     Published Date: Apr 15, 2015

When evaluating which app and desktop virtualization solution you should adopt, it is important to start your comparison using information you can trust. Learn how 3 companies benefited from true mobility and IT efficiency with Citrix Desktop Virtualization.

Tags : citrix, desktop virtualization, vmware, efficiency, virtualization, mobile computing, migration, application integration
    
By: IBM     Published Date: Apr 15, 2015

Business Process Management For Dummies, IBM Limited Edition, shows you what BPM is and how it can help your organization. You see how the BPM solutions from IBM help you gain many benefits from higher customer satisfaction to greater agility in adapting to changing market conditions. Chapter 1:Understanding BPM Chapter 2: Getting Started with BPM Chapter 3: Putting BPM to Work for your Organization Chapter 4: Improving BPM Automation and Decision Management Chapter 5: Checking out BPM Success Stories Chapter 6: Reasons to Choose BPM from IBM

Tags : ibm, dummies, business process management, business intelligence, best practices, automation, application integration, application performance management
    
By: IBM     Published Date: Apr 15, 2015

With IBM MobileFirst and IBM’s Smarter Process, you can redesign how you deliver services and support more streamlined business processes. Therefore, you can help enable your customers to have a more superior mobile experience.

Tags : ibm, mobile computing, customer satisfaction, mobile experience, optimization, customer centric, mobile data systems, mobile workers
    
By: IBM     Published Date: Apr 14, 2015

Whether it's a web application or an enterprise cloud application, Websphere Application Server has the right fit-for-purpose cloud environment for your business.

Tags : web application, ibm, enterprise cloud application, cloud environment, application server, it management, data management, data center
    
By: Seagate Technology     Published Date: Apr 14, 2015

You can have all the latest features of iOS 8 on your iPhone, but if you’re still using an iPhone 4s, you won’t be able to take advantage of most of them. This should serve as an appropriate metaphor for this audience because when it comes to data storage, many of today’s storage solutions have been around since the 1970s…as in the the world of mobile, today’s data storage needs are revealing just how limited those older solutions are. Even if a company has updated almost everything in its IT ecosystem, it takes only one unchanged layer to prevent them from realizing the benefits of the latest technology. With petabyte scale, reliability, performance, and efficiency the order of the day we are fast approaching that point with storage. There is without question a need to change in the current storage paradigm. In this webinar you will learn about current IT storage challenges and useful insights about next-generation storage solutions.

Tags : storage solutions, mobile data storage, it ecosystem, petabyte scale, network architecture, network attached storage, storage management, data integration
    
By: Seagate Technology     Published Date: Apr 14, 2015

Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.

Tags : surveillance, security system, virtual management software, cameras, network performance management, intrusion prevention, network security appliance, security management
    
By: Seagate Technology     Published Date: Apr 14, 2015

Gartner's 2015 top 10 strategic technology trends for IT leaders are the prime enablers behind new digital business opportunities. Their disruptive power stems from merging virtual and physical worlds, the growth of intelligence everywhere, and the emerging new realities of IT. Read this white paper to learn the top ten strategic technology trends organizations can follow to deliver high value and drive change.

Tags : intelligence, cloud, 3d printing, internet of things, digital business, network management, best practices, data integration
    
By: Seagate Technology     Published Date: Apr 14, 2015

Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.

Tags : cloud, security, network attached storage system, customization, affordability, network security, network attached storage, storage management
    
By: Basho     Published Date: Apr 13, 2015

Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.

Tags : riak, basho, telecommunications service provider, license fees, scalability, availability, data usage, big data
    
By: Adobe     Published Date: Apr 13, 2015

This Gigaom Research study aims to help technology decision-makers better understand the role of IT in supporting the need for business agility and pace. In this report you will gain insight into: - How to increase business agility with the best tools for your workforce - Strategies to speed up new tool adoption so the workforce has a range of work tools that match different sorts of work activities and interactions - The shifting role of IT to create a technology landscape in which productivity and innovation flourish Download this Gigaom Research white paper to learn more.

Tags : adobe, it tools, modern workforce, business agility, it productivity, business intelligence, collaboration, intranets
    
By: Adobe     Published Date: Apr 13, 2015

The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.

Tags : adobe, document security, cloud services, it research, global insights, security management, business intelligence, productivity
    
By: IBM     Published Date: Apr 09, 2015

This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.

Tags : data security, ibm, ibm infosphere, privacy strategy, big data security, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.

Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security
    
By: IBM     Published Date: Apr 09, 2015

As The Business Becomes Digital, Security Must Become Data-Centric S&R leaders of enterprises undergoing a digital transformation will soon realize that in order to adequately ensure customer protection and enable a digital workforce, S&R pros must abandon traditional perimeter-based security and put the focus on the data by embracing Forrester’s Zero Trust Model.

Tags : data security, ibm, customer protection, digital workforce, zero trust model, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.

Tags : data security, ibm, risk management, network security, security threat, networking, security, it management
    
By: IBM     Published Date: Apr 09, 2015

Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.

Tags : data security, ibm, converged network security, security risk, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.

Tags : magic quadrant, ibm, intrusion prevention systems, security, security risk, data security, networking, it management
    
By: IBM     Published Date: Apr 09, 2015

Enterprise applications are becoming increasingly complex, leveraging components across multiple platforms, including cloud. Learn how you can leverage IBM DevOps Services for Bluemix to provide full multi-stage release and deployment management to facilitate development.

Tags : enterprise applications, platforms, cloud computing, cloud management, application integration
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.