Data Management White Papers

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.

Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management
Results 1 - 25 of 3648Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 07, 2015

In this book you will also learn how cognitive computing systems, like IBM Watson, fit into the Big Data world. Learn about the concept of data-in-motion and InfoSphere Streams, the world’s fastest and most flexible platform for streaming data.

Tags : big data, mobility, compute-intensive apps, virtualization, cloud computing, scalable infrastructure, reliability, data management
    
By: IBM     Published Date: Jul 07, 2015

Learn about information integration and governance for data warehousing and big data and analytics.

Tags : data warehouse, bad data, big data, mobility, compute-intensive apps, virtualization, cloud computing, scalable infrastructure
    
By: Simplivity     Published Date: Jul 02, 2015

SimpliVity's true hyperconverged infrastructure solution helped Waypoint Capital consolidate their data center. After implementing 2U OmniCube systems, they were able to immensely reduce their IT complexity, increase performance, and dramatically improve their operational efficiency.

Tags : robo, storage, disaster recovery, operational efficiency, aging infrastructure, high it costs, data management, wan optimization
    
By: Simplivity     Published Date: Jul 02, 2015

ActualTech Media and SimpliVity have partnered to create a new report that presents data from surveyed IT professionals and their experiences with hyperconverged infrastructure. The report defines Hyperconvergence and outlines the future of the industry.

Tags : hyperconvergence, robo, market report, storage, disaster recovery, operational efficiency, high it costs, data protection
    
By: Simplivity     Published Date: Jul 02, 2015

SimpliVity’s solution is a great fit for today’s midmarket data center. This hyperconverged infrastructure simplifies an otherwise complex system that would require frequent maintenance and upgrades. SimpliVity offers an affordable solution that addresses major challenges of midmarket I&O teams.

Tags : hyperconvergence, midmarket, virtualization, deduplication, compression, optimization, data management, data protection
    
By: IBM     Published Date: Jul 01, 2015

This webcast talks about decentralizing the IoT by leveraging the “block chain”-- the technology platform underlying Bitcoin.

Tags : internet of things, iot, cloud computing, data security, blockchain, big data, app infrastructure, data analytics
    
By: CDW     Published Date: Jun 30, 2015

Total Mobility Management (TMM) is a comprehensive platform that makes implementing, managing, and securing mobile devices simple.

Tags : mobility, apps, strategy, platform, tmm, risk management, productivity, mobile computing
    
By: Cisco     Published Date: Jun 29, 2015

In this video F5’s SVP of WW Marketing discusses the benefits of Cisco ACI–F5 Big IQ joint solution.

Tags : partnership cisco aci and f5, cisco aci, data center, solution data center, cisco solutions, storage management, storage virtualization, application integration
    
By: Marketo     Published Date: Jun 26, 2015

Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on completeness of vision and the ability to execute.

Tags : data management
    
By: Mimecast     Published Date: Jun 25, 2015

In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.

Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
    
By: Lucidworks     Published Date: Jun 24, 2015

Using content, context, and the crowd to build better search applications.

Tags : search platform, search query, search technologies, big data, high-volume data, database advancements, it management, knowledge management
    
By: F5 Networks Inc     Published Date: Jun 24, 2015

To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.

Tags : appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency
    
By: F5 Networks Inc     Published Date: Jun 24, 2015

To meet the challenges of IT organizations, Cisco and F5 have developed a shared architectural vision and joint solution to simplify networking and solve pain points in next-generation data centers. The solution extends the F5 Synthesis architecture and programmable Software-Defined Application Services (SDAS) within the Cisco Application Centric Infrastructure (ACI), helping customers efficiently deliver applications that are fast, secure and available. Read the whitepaper to learn more.

Tags : appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency
    
By: Cisco     Published Date: Jun 24, 2015

This paper explores the main benefits of Cisco ACI Security.

Tags : cisco aci security, csico, virtualization, integration, security, application integration, data center, ynified
    
By: Mimecast     Published Date: Jun 22, 2015

Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, data management
    
By: IBM     Published Date: Jun 22, 2015

According to Forrester Research, we have entered the era of Continuous Delivery. Clients are shifting from agile transformation to DevOps, while modern application delivery leaders are embracing DevOps to accelerate delivery of innovation.

Tags : financial services, best practices, continuous delivery, ibm, software development, it management, knowledge management, data management
    
By: IBM     Published Date: Jun 22, 2015

This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.

Tags : ibm, compliance requirements, quality management tools, quality management, best practices, software development, it management, knowledge management
    
By: Mimecast     Published Date: Jun 22, 2015

To find out if your data is being put at risk, get practical advice on how to eliminate this risk, and find out which vendor hits the ‘Bloor Bullseye’.

Tags : file sharing security, file sharing services, best practices, storage services, email security, security management, business intelligence, collaboration
    
By: Tricentis     Published Date: Jun 22, 2015

Read this paper to find out how Tosca Testsuite can help you to lower the maintenance effort of your test data and operating costs of your test environment while building an efficient test data management strategy.

Tags : data management, tosca testsuit, test data, test data management strategy, testing, test, test and measurement, database development
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.

Tags : testing, tosca testsuit, test, sap, test portfolios, technology support, sap interfaces, technology
    
By: Mimecast     Published Date: Jun 22, 2015

Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying its Unified Email Management solution.

Tags : unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals the reason why people love E2E tests.

Tags : end to end testing, testing, test, e2e testing, manual testing, it landscapes, test environment, e2e tests
    
By: ConceptShare     Published Date: Jun 17, 2015

This white paper is written as an introduction to the idea of Creative Operations Business Intelligence. The marketing and creative production organizations that embrace this concept will maximize their work in progress performance.

Tags : conceptshare, market intelligence, business intelligence, strategy, big data, business analytics, marketing automation, collaboration
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.