Find White Papers
Home
About Us
List Your Papers
    
> Technology > Data Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Data Management

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.
Results 1251 - 1275 of 3404Sort Results By: Published Date | Title | Company Name
White Paper Published By: Teradata     Published Date: Feb 26, 2013
This report explores the evolution of big data analytics and its maturity within the enterprise. It discusses the approaches and economics to using a Discovery platform and Apache Hadoop within the same unified analytical architecture.
Tags : 
big data analytics, experiences with teradata, apache hadoop, analytics, discovery platform
    
Teradata
White Paper Published By: Sponsored by HP and Intel ®     Published Date: Feb 21, 2013
Read this white paper to separate the technology and business potential from the marketing fluff. Get answers to your most pressing cloud questions and better understand when and where the cloud makes the most sense for your organization.
Tags : 
cloud, cloud computing, storage, networks, high availability
    
Sponsored by HP and Intel ®
White Paper Published By: Sponsored by HP and Intel®     Published Date: Feb 20, 2013
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP’s new B6200 StoreOnce Backup System versus EMC Data Domain.
Tags : 
hp storeonce, leadership, deduplication, industry leadership, emc
    
Sponsored by HP and Intel®
White Paper Published By: Sponsored by HP and Intel®     Published Date: Feb 20, 2013
Between increased use of server virtualization, the dynamic proliferation of private cloud, the ever-growing unstructured data pool, and the advent of “big data,” organizational data is going to continue to grow. Learn more about what HP has in store
Tags : 
dedupe 2.0, store(once), deduplication, strategy, data source
    
Sponsored by HP and Intel®
White Paper Published By: Sponsored by HP and Intel®     Published Date: Feb 20, 2013
This Evaluator Group report discusses the performance and high availability findings from the product testing done on the HP B6200 StoreOnce Backup System w/ Catalyst Software and compares it against industry competitors.
Tags : 
hp storeonce, b6200, backup lab validation report, catalyst software, industry competitors
    
Sponsored by HP and Intel®
White Paper Published By: Sponsored by HP and Intel®     Published Date: Feb 20, 2013
This paper looks at the benefits to be realized in the combined scenario of HP StoreOnce appliances being used with HP’s own Data Protector 7 backup software while considering the topic of “where” the deduplication occurs.
Tags : 
hp storeonce, better together, hp data protector, deduplication, data protector 7
    
Sponsored by HP and Intel®
White Paper Published By: Sponsored by HP and Intel®     Published Date: Feb 20, 2013
The early days of the de-duplication target market could be characterized as the Wild West, with a slew of start-ups shooting it out in an emerging market with tremendous potential. HP has a good chance of joining the ranks of IBM and EMC.
Tags : 
de-duplication appliances, emc, hegemony, acquire, de-duplication
    
Sponsored by HP and Intel®
White Paper Published By: HP and Intel® Xeon® processors     Published Date: Feb 12, 2013
In this paper, we highlight the features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components, with a particular focus on the role that storage plays in the evolution of the data center.
Tags : 
datacenter, data center, architecture, virtualization, network
    
HP and Intel® Xeon® processors
Case Study Published By: Silver Peak     Published Date: Feb 12, 2013
When faced with their EqualLogic replication not completing due to limited WAN bandwidth and consistently missing their RPO, ZLTO needed a solution. Learn how Silver Peak’s virtual appliances reduced their bandwidth used for replication by 86%.
Tags : 
wan, bandwith, rpo, zlto, virtualization
    
Silver Peak
White Paper Published By: Silver Peak     Published Date: Feb 12, 2013
An optimized WAN environment can increase network reliability and availability and improve cost profiles. It also improves the performance and reliability of data backup, replication, and recovery processes.
Tags : 
virtualization, wan, optimization, data center, network
    
Silver Peak
White Paper Published By: Oracle Corp.     Published Date: Feb 12, 2013
As the technologies and business practices surrounding Social, Mobile and BPM mature, IT and business stakeholders are discovering new ways to collaborate and engage customers via dynamic business processes that address several business imperatives.
Tags : 
customer experience, business process management, social, mobile, bpm
    
Oracle Corp.
White Paper Published By: McAfee     Published Date: Feb 08, 2013
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
mcafee, epp, endpoint, protection, threats
    
McAfee
Free Offer Published By: F5     Published Date: Feb 07, 2013
Load balancers are officially dead; refocus on application delivery. Read this report and you’ll learn about enterprises that are still focused on load balancing, improving application performance and security, increasing efficiency and more.
Tags : 
application delivery, load balancer, officially dead, gartner report, adc
    
F5
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies.
Tags : 
big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti
    
McAfee
Free Offer Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring
    
McAfee
White Paper Published By: Datto Inc.     Published Date: Feb 05, 2013
In this white paper Datto explores the different types of risk in IT infrastructure and the ways intelligent business continuity can best mitigate that risk.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud
    
Datto Inc.
Case Study Published By: LifeSize, a division of Logitech     Published Date: Feb 01, 2013
LifeSize was called upon to offer a solution for health emergencies and rare medical conditions, rural and smaller hospitals have always struggled with access to specialists. LifeSize offers a solution that allows access to any specialist - Learn how
Tags : 
knowledge management, enterprise applications, data management
    
LifeSize, a division of Logitech
White Paper Published By: Red Hat     Published Date: Feb 01, 2013
IDC looked at the growing capabilities of open source KVM as a hypervisor for Linux and Windows. In particular, they noted that oVirt, commercially supported by Red Hat with Red Hat Enterprise Virtualization, has emerged as the open source standard for base KVM management.
Tags : 
idc, red hat, virtualization, enterprise grade, server virtualization
    
Red Hat
White Paper Published By: F5     Published Date: Jan 31, 2013
Organizations are increasingly adopting a hybrid cloud computing strategy to realize the benefits without compromising on security and control. Learn of the 3 categories of solutions focused on integrating data centers with cloud.
Tags : 
cloud, integration, bridges, brokers, gateways
    
F5
White Paper Published By: F5     Published Date: Jan 31, 2013
Whether critical applications live in the cloud, in the data center, or both, organizations need a strategic point of control for application security. Learn how you can achieve the security, intelligence, and performance for today's standards.
Tags : 
application, security, cloud, cloud security, f5 networks
    
F5
White Paper Published By: F5     Published Date: Jan 31, 2013
Cloud computing is becoming a key IT resource, but securing applications and data in the cloud remains a concern. Secure remote access tech, web application firewalls, network-side scripting and other strategies can make cloud deployments secure.
Tags : 
securing cloud, cloud computing, security, cloud security, authenticaion
    
F5
White Paper Published By: Arbor Networks     Published Date: Jan 31, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and more.
Tags : 
security, it management, data management, data center
    
Arbor Networks
Start   Previous    44 45 46 47 48 49 50 51 52 53 54 55 56 57 58    Next    End


Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management

Search