Find White Papers
Home
About Us
List Your Papers
    
> Technology > Data Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Data Management

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.
Results 1251 - 1275 of 4553Sort Results By: Published Date | Title | Company Name
Webinar Published By: CareCloud     Published Date: Jan 21, 2015
Watch this on-demand webinar to learn how one scenario can help get the most from its PM and EHR.
Tags : 
carecloud, pm and ehr, boost revenue, ehr too expensive, practice ehr
    
CareCloud
Free Offer Published By: Dell     Published Date: Jan 21, 2015
Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.
Tags : 
dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure
    
Dell
Webinar Published By: Teradata     Published Date: Jan 20, 2015
This Neil Raden and Teradata webinar explores: The business values gained from an integrated view of SAP® and non-SAP® data; Existing solutions and challenges; Requirements for the optimal BI and analytics platform, and; A new solution that simplifies and enhances BI analytics for SAP® ERP data.
Tags : 
data warehouse, teradata, business value, analytics platform, erp data
    
Teradata
White Paper Published By: Avaya     Published Date: Jan 20, 2015
The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.
Tags : 
software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc
    
Avaya
White Paper Published By: SugarCRM     Published Date: Jan 20, 2015
After an initial rollout to more than 45,000 sales users, IBM wanted even greater insights. Thanks to the high usability of Sugar, IBM was able to increase sales data quality - which has gone on to power predictive sales analytics. Learn how IBM and SugarCRM are driving more effective sales teams.
Tags : 
sales analytics, data quality, sales, high usability, enterprise applications
    
SugarCRM
White Paper Published By: IBM     Published Date: Jan 20, 2015
With advancements in technology, installed versus cloud options are no longer black and white. Learn how firms can benefit from hybrid deployment models.
Tags : 
hybrid models, cloud solutions, deployment models, raw data, risk insight
    
IBM
White Paper Published By: Teradata     Published Date: Jan 16, 2015
This Neil Raden paper describes the current need for data warehousing, why SAP® BW is an incomplete choice and how Teradata Analytics for SAP® Solutions is a superior option. Download now!
Tags : 
teradata, sap solutions, data warehouse, extracted data, data management
    
Teradata
Case Study Published By: Teradata     Published Date: Jan 16, 2015
Teradata Analytics for SAP success story with customer BCC, an electronic retail company based in the Netherlands.
Tags : 
teradata, sap, electronic retail, sap success, data management
    
Teradata
Case Study Published By: Teradata     Published Date: Jan 16, 2015
Companies that use SAP® need to have a method to access all valuable information that is recorded in order to make the best business decisions and establish a sustainable competitive advantage. With Teradata Analytics for SAP®, Lamb Weston, a global frozen potato product producer, has been able to generate their business intelligence reports quickly and effortlessly. BI that lets you focus on running the business…Download now!
Tags : 
teradata, sap, product producer, sap success, data management
    
Teradata
White Paper Published By: Teradata     Published Date: Jan 16, 2015
Teradata® Analytics for SAP® Solutions performs high-value business analytics on integrated data.
Tags : 
data analytics, high-value, integrated data, intelligence, data management
    
Teradata
White Paper Published By: Teradata     Published Date: Jan 16, 2015
This data sheet introduces Teradata Analytics for SAP® product, modules and business value.
Tags : 
analytics, sap solutions, modules, business value, data
    
Teradata
White Paper Published By: Pentaho     Published Date: Jan 16, 2015
Download if you need to make decisions about the architecture of the systems you work on. Sponsored by Pentaho.
Tags : 
embedded, big data, nosql, hadoop, customer analytics
    
Pentaho
White Paper Published By: Pentaho     Published Date: Jan 16, 2015
This ebook is recommended for IT managers, developers, data analysts, system architects, and similar technical workers, who are faced with having to replace current systems and skills with the new set required by NoSQL and Hadoop, or those who want to deepen their understanding of complementary technologies and databases. Sponsored by Pentaho.
Tags : 
big data, hadoop, data delivery, data management, business intelligence
    
Pentaho
Webinar Published By: Entrust     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application
    
Entrust
White Paper Published By: Entrust     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication
    
Entrust
White Paper Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security
    
Cisco
Webinar Published By: Cisco     Published Date: Jan 15, 2015
In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.
Tags : 
operating costs, capital, threat detection, visibility, networks
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : 
attacks, viruses, protection, networks, threats
    
Cisco
White Paper Published By: Comcast Business     Published Date: Jan 15, 2015
For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.
Tags : 
comcast, technology, business, blueprint, plan
    
Comcast Business
White Paper Published By: Comcast Business     Published Date: Jan 15, 2015
Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.
Tags : 
comcast, technology, business, blueprint, plan
    
Comcast Business
White Paper Published By: Comcast Business     Published Date: Jan 15, 2015
It’s the challenge businesses of every size wrestle with: How to improve employee productivity while driving down costs. Technology can help achieve that goal – when the right tools are used.
Tags : 
comcast, technology, business, blueprint, plan
    
Comcast Business
White Paper Published By: IBM     Published Date: Jan 14, 2015
Cloud-delivered big data analytics presents an enormous opportunity for organizations that want to become more agile, more efficient and more competitive. To capitalize on the full potential of this opportunity, businesses need cloud-enabled big data analysis solutions that are flexible, simple, secure and open.
Tags : 
big data, data management, the cloud, cloud solutions, data
    
IBM
White Paper Published By: IBM     Published Date: Jan 14, 2015
Decision makers need data and they need it now. As the pace of business continues to accelerate, organizations are leaning heavily on data warehouses to deliver analytical grist for the mill of daily decisions. This Research Report from Aberdeen Group examines the benefits of data warehouse solutions that offer rapid information delivery while minimizing complexity for users and IT.
Tags : 
aberdeen group, data warehouse, data center, data management, analytic tools
    
IBM
Start   Previous    44 45 46 47 48 49 50 51 52 53 54 55 56 57 58    Next    End


Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management

Search