Data Management White Papers

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.

Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management
Results 1 - 25 of 2911Sort Results By: Published Date | Title | Company Name
By: destinationCRM.com     Published Date: Oct 29, 2014

Predictive analytics is a very useful way to "maximize the lifetime value of a customer," which, in many cases, involves optimizing marketing campaigns, increasing website interactions, converting clicks into conversions, and generally providing an intelligent next-best offer. This Roundtable Webcast will explore some of the ingenious ways predictive analytics is being used and driving positive outcomes.

Tags : predictive analytics, business intelligence, business analytics, data management, crm, intelligence, business metrics, customer relationship management
    
By: Sourcefire, LLC     Published Date: Sep 30, 2014

Download this infographic today to gain a better understanding of integrated threat defense and the visibility to discover and protect against socially engineered exploits.

Tags : cisco, sourcefire, network security, integrated threat defense, big data analysis, real-time monitoring, security, business analytics
    
By: SAS     Published Date: Sep 30, 2014

This piece explores some of the social, technological, data, and business trends driving the visual organization. We will see that employees and organizations are willingly representing—or, in some cases, being forced to represent—their data in more visual ways.

Tags : sas, visual organizations, data visualization, big data, data warehousing
    
By: xMatters     Published Date: Sep 22, 2014

When it comes to data breaches and service outages, it’s no longer a question of if but when. Governments worldwide increasingly have new laws, pending legislation, privacy regulations and “strong suggestions” for protecting sensitive information and taking action when breaches or service outages occur. Get the Complimentary White Paper and learn how you need to prepare for these new laws and more. The white paper examines current regional legislation and how you can implement communication best practices for maintaining transparency and trust in the face of consumer-facing service disruptions.

Tags : communication, best practices, data, breaches, enterprise, consumer, confidence, science
    
By: Global Knowledge     Published Date: Sep 22, 2014

Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.

Tags : global knowledge, packet delivery, networked device, moving data, directly connected, remotely connected, data delivery, networking
    
By: Global Knowledge     Published Date: Sep 22, 2014

Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.

Tags : global knowledge, packet delivery, networked device, moving data, directly connected, remotely connected, data delivery, networking
    
By: Foxit     Published Date: Sep 18, 2014

IT organizations are being asked do to more with less, as tight budgets get stretched ever tighter. Companies of all sizes are being challenged to find savings that can be reinvested in new money-saving or revenue-generating technologies. From storage to security, every cost is being scrutinized in the search for savings, yet many organizations overlook one area—document management—where significant savings can be readily had. Now is definitely the time to take a close look at your PDF solution, and ask a basic question: Can you get the same capabilities from new PDF solution but at much lower cost?

Tags : foxit, document management strategy, revenue generated technology, storage, security, tight budgets, pdf solutions, enterprise applications
    
By: Foxit     Published Date: Sep 18, 2014

This white paper will focus on a solution to create, collaborate, edit, and secure PDF documents.

Tags : foxit, pdf documents, hardcopy documents, softcopy, document archiving, document creation, digital rights management, information rights management
    
By: CDW     Published Date: Sep 17, 2014

You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs

Tags : storage, tiering, performance, availability, media, feeds, system, netgear
    
By: CDW     Published Date: Sep 17, 2014

We now live in a flash centric world where all active data must be on flash. This doesn’t mean, however, that all data must be on flash. The best approach is to understand your application mix and workload requirements. Some key apps, like databases, are latency intolerant and should be pinned to flash. Others apps can benefit from fully-automated storage tiering. EMC’s market leading VMAX and VNX systems are flexible choices that can deliver all-flash and hybrid services. CDW and EMC has you covered!

Tags : data, market, flash, systems, key apps, centric, application, tiering
    
By: Arbor     Published Date: Sep 17, 2014

Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables

Tags : firewall, firewall protection, it security, cyber defense, security, it management, business activity monitoring, business intelligence
    
By: IBM     Published Date: Sep 16, 2014

To compete in today’s rapidly changing business environment, organizations need to capture, analyze and act on information rapidly. If they can quickly identify trends, discover patterns and generate new insights, they can address a wide array of strategic and operational goals—from increasing customer loyalty and creating targeted marketing offers to enhancing operational efficiency and reducing risk. In their report, Business Value of Big Data on Power Systems, NC State University talks about unlocking the business value of big data, and how IBM Power Systems can deliver the foundation for organizations to bring insight to the point of impact faster.

Tags : big data, targeted marketing offers, ibm power systems, structured data, data management, business analytics, business intelligence, business management
    
By: IBM     Published Date: Sep 16, 2014

IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."

Tags : power-based systems, big data, linux, fast deployment, open source infrastructure, data management, server hardware, application performance management
    
By: Lenovo     Published Date: Sep 16, 2014

Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, is it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services are most compatible, agencies can take a smarter approach to these difficult decisions. Understand the tradeoffs, and learn why more agencies are taking notice to emerging web technologies through this executive summary.

Tags : vdi, cloud alternatives, byod demands, emerging web technologies, business intelligence, data protection, database security, productivity
    
By: Lenovo     Published Date: Sep 16, 2014

Agency IT is tasked with building smarter and more responsive state and local government, with CTOs looking to enable government workforce mobility and address strategic issues like BYOD. Adding to the challenge is a rise in devices and data that IT must deliver, support, and secure. Combined with the decline in traditional Windows-based computing, these challenges are driving agencies toward web and cloud solutions that don't sacrifice security or manageability. See the solution that has government agencies re-thinking how they enable mobile productivity.

Tags : agency it, workforce mobility, mobile productivity, cloud computing, it management, project management, web services, database security
    
By: CDW     Published Date: Sep 15, 2014

An affordably priced, unified storage platform for smaller businesses, the EMC VNXe Series delivers automated, application-ready storage with solution-focused software that’s easy to manage, provision and protect.

Tags : affordable, solution-focused, unified, storage, platform, smaller businesses, software, application
    
By: IBM     Published Date: Sep 15, 2014

In business timing is everything, especially for business-critical applications. Delays in delivering critical data and processing can significantly increase business and financial risks. IBM’s new eBook FlashAhead discusses these challenges and offers up the all-flash storage system as a solution.

Tags : data center economics, application performance, critical data, big data, flash storage, storage system, data management, storage management
    
By: CDW     Published Date: Sep 15, 2014

EMC’s unified storage solution provides the efficiency, scalability and performance needed to manage today’s influx of data. It consolidates your growing piles of data into a single, easy-to-use system and can easily expand with your organization’s needs, so you’ll never waste money on unused drive space again. And your workers will be able to quickly and safely access their data wherever they go.

Tags : affordable, solution-focused, unified, storage, platform, smaller businesses, software, application
    
By: Cisco     Published Date: Sep 15, 2014

Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.

Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
By: ClickSoftware     Published Date: Sep 12, 2014

This report will take an in depth look at the 90 capital equipment manufacturers to better understand the key trends and challenges facing this industry vertical.

Tags : delivering exceptional service, mission critical service, capital equipment manufacturers, customer service, resolution of service requests, software development, enterprise applications, platforms
    
By: Cisco     Published Date: Sep 12, 2014

Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.

Tags : cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network
    
By: Cisco     Published Date: Sep 12, 2014

Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper

Tags : firewall, buying, next-generation, companies, midsize, strengthen, network, security
    
By: NEC     Published Date: Sep 10, 2014

Download this white paper to learn how to cut your licensing, support and hardware costs by 50% for mission critical virtualization – and deliver 99.999% availability.

Tags : virtualization, availability, mission, server, hardware, licensing, support, safe
    
By: Cloudera     Published Date: Sep 10, 2014

In 2014, traditional data warehouse vendors continue to face the challenge emerging from new processing techniques such as MapReduce/Hadoop distributions. These new techniques are often referred to as "big data solutions" in the popular press, and the continued hype regarding new approaches has continued.

Tags : data warehouse, database management, processing techniques, warehouse vendors, magic quadrant, enterprise applications, data management
    
By: Cloudera     Published Date: Sep 10, 2014

This Critical Capabilities research focuses primarily on existing customer implementations and their experiences with data warehouse DBMS products. Together with its companion Magic Quadrant, this report will help information leaders to select the right technology to meet their own use cases.

Tags : data management systems, existing customer implementations, data warehouse, data experience, dbms, information leaders, enterprise applications, data management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.