Find White Papers
Home
About Us
List Your Papers
    
> Technology > Data Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Data Management

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.
Results 1251 - 1275 of 4548Sort Results By: Published Date | Title | Company Name
Case Study Published By: Teradata     Published Date: Jan 16, 2015
Teradata Analytics for SAP success story with customer BCC, an electronic retail company based in the Netherlands.
Tags : 
teradata, sap, electronic retail, sap success, data management
    
Teradata
Case Study Published By: Teradata     Published Date: Jan 16, 2015
Companies that use SAP® need to have a method to access all valuable information that is recorded in order to make the best business decisions and establish a sustainable competitive advantage. With Teradata Analytics for SAP®, Lamb Weston, a global frozen potato product producer, has been able to generate their business intelligence reports quickly and effortlessly. BI that lets you focus on running the business…Download now!
Tags : 
teradata, sap, product producer, sap success, data management
    
Teradata
White Paper Published By: Teradata     Published Date: Jan 16, 2015
Teradata® Analytics for SAP® Solutions performs high-value business analytics on integrated data.
Tags : 
data analytics, high-value, integrated data, intelligence, data management
    
Teradata
White Paper Published By: Teradata     Published Date: Jan 16, 2015
This data sheet introduces Teradata Analytics for SAP® product, modules and business value.
Tags : 
analytics, sap solutions, modules, business value, data
    
Teradata
White Paper Published By: Pentaho     Published Date: Jan 16, 2015
Download if you need to make decisions about the architecture of the systems you work on. Sponsored by Pentaho.
Tags : 
embedded, big data, nosql, hadoop, customer analytics
    
Pentaho
White Paper Published By: Pentaho     Published Date: Jan 16, 2015
This ebook is recommended for IT managers, developers, data analysts, system architects, and similar technical workers, who are faced with having to replace current systems and skills with the new set required by NoSQL and Hadoop, or those who want to deepen their understanding of complementary technologies and databases. Sponsored by Pentaho.
Tags : 
big data, hadoop, data delivery, data management, business intelligence
    
Pentaho
Webinar Published By: Entrust     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication
    
Entrust
White Paper Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security
    
Cisco
Webinar Published By: Cisco     Published Date: Jan 15, 2015
In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.
Tags : 
operating costs, capital, threat detection, visibility, networks
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : 
attacks, viruses, protection, networks, threats
    
Cisco
White Paper Published By: Comcast Business     Published Date: Jan 15, 2015
For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.
Tags : 
comcast, technology, business, blueprint, plan
    
Comcast Business
White Paper Published By: Comcast Business     Published Date: Jan 15, 2015
Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.
Tags : 
comcast, technology, business, blueprint, plan
    
Comcast Business
White Paper Published By: Comcast Business     Published Date: Jan 15, 2015
It’s the challenge businesses of every size wrestle with: How to improve employee productivity while driving down costs. Technology can help achieve that goal – when the right tools are used.
Tags : 
comcast, technology, business, blueprint, plan
    
Comcast Business
White Paper Published By: IBM     Published Date: Jan 14, 2015
Cloud-delivered big data analytics presents an enormous opportunity for organizations that want to become more agile, more efficient and more competitive. To capitalize on the full potential of this opportunity, businesses need cloud-enabled big data analysis solutions that are flexible, simple, secure and open.
Tags : 
big data, data management, the cloud, cloud solutions, data
    
IBM
White Paper Published By: IBM     Published Date: Jan 14, 2015
Decision makers need data and they need it now. As the pace of business continues to accelerate, organizations are leaning heavily on data warehouses to deliver analytical grist for the mill of daily decisions. This Research Report from Aberdeen Group examines the benefits of data warehouse solutions that offer rapid information delivery while minimizing complexity for users and IT.
Tags : 
aberdeen group, data warehouse, data center, data management, analytic tools
    
IBM
White Paper Published By: IBM     Published Date: Jan 14, 2015
Big data has been big news in recent years. Organizations recognize that they must now begin to focus on using big data technologies to solve business problems. The pressure is on for organizations to move past the discussion phase toward well-planned projects.
Tags : 
big data, data management, data exploration, gain visibility, security extension
    
IBM
White Paper Published By: IBM     Published Date: Jan 14, 2015
Bloor Research investigated several key critical success factors for big data analytics. Their findings show that governance, data cleansing, and privacy and security have never been more important. Read this paper to see their conclusions.
Tags : 
big data, data management, data exploration, gain visibility, security extension
    
IBM
White Paper Published By: IBM     Published Date: Jan 14, 2015
Explore this interactive infographic to discover how IBM makes it possible to manage all of these priorities while significantly reducing storage and maintenance costs.
Tags : 
big data, data management, data exploration, gain visibility, security extension
    
IBM
White Paper Published By: CDW     Published Date: Jan 14, 2015
Learn why teams and fans love the benefits a stadium network upgrade can bring and see what your organization should do to capitalize on these business advantages.
Tags : 
network, upgrade, business advantages, benefits, networking
    
CDW
White Paper Published By: Dyn     Published Date: Jan 14, 2015
Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.
Tags : 
cloud based, dns service, ddos attack, user experience, infrastructure
    
Dyn
White Paper Published By: General Atomics     Published Date: Jan 13, 2015
The term “Big Data” has become virtually synonymous with “schema on read” unstructured data analysis and handling techniques like Hadoop. These “schema on read” techniques have been most famously exploited on relatively ephemeral human-readable data like retail trends, twitter sentiment, social network mining, log files, etc.
Tags : 
general atomics, big data, metadata, nirvana, hadoop
    
General Atomics
White Paper Published By: IBM     Published Date: Jan 09, 2015
This white paper describes how an enterprise asset management system can help transit organizations efficiently address the challenges of infrastructure development, inner-city congestion, carbon emissions and regulatory compliance - while supporting more riders with a shrinking budget.
Tags : 
inner-city transportation, enterprise asset management system, asset management, infrastructure delevopment, it management
    
IBM
Start   Previous    44 45 46 47 48 49 50 51 52 53 54 55 56 57 58    Next    End


Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management

Search