Find White Papers
Home
About Us
List Your Papers
    
> Technology > Data Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Data Management

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.
Results 1251 - 1275 of 4558Sort Results By: Published Date | Title | Company Name
White Paper Published By: Oracle     Published Date: Feb 24, 2015
In order to appeal today’s empowered audiences, you have to deliver highly personalised marketing experiences that respond to their needs and behaviour. Read this report for actionable insight into customer-centric marketing.
Tags : 
oracle, trends, marketing message, structure, cloud
    
Oracle
Free Offer Published By: CA Technologies     Published Date: Feb 24, 2015
Learn how to use DCIM to shift development and production workloads between infrastructure resources to maintain a consistent user experience
Tags : 
ca technologies, dcim, data center, dcim deployment, infrastructure
    
CA Technologies
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
security information, security connected framework, big security data, big data, log management
    
Intel Security
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.
Tags : 
gartner, magic quadrant, security connected framework, big security data, big data
    
Intel Security
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.
Tags : 
security information, security connected framework, big security data, big data, log management
    
Intel Security
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
Intel Security
White Paper Published By: Extreme Networks     Published Date: Feb 20, 2015
Use these questions to help decide which vendor’s SDN platform is best equipped to support your organization as you face a rapidly changing world of technology.
Tags : 
sdn platform, sdn solutions, software-defined networking, it solutions, it management
    
Extreme Networks
White Paper Published By: Tealium     Published Date: Feb 20, 2015
Unify Your Marketing Technology and Data–It’s Easy Download our free guidebook, “Build Your Own Marketing Cloud™,” to learn how to maximize your technology investments and drive superior cross-channel experiences.
Tags : 
tealium, marketing, technology, cloud, tag management
    
Tealium
White Paper Published By: Tealium     Published Date: Feb 20, 2015
Marketing Complexity Got You Down? Download our new guidebook: “How to Tame the Digital Marketing Beast™.”
Tags : 
tealium, marketing, technology, cloud, tag management
    
Tealium
White Paper Published By: IBM     Published Date: Feb 19, 2015
Read how Big Data and Analytics can help businesses deliver on customer needs, acquire customers, increase profitability and help retain the most valuable customers.
Tags : 
big data, business analytics, customer retention, customer aquisition, it management
    
IBM
White Paper Published By: IBM     Published Date: Feb 19, 2015
Data mining uncovers hidden patterns and relationships in data, driving more informed decisions in organizations of all sizes, and in virtually every industry.
Tags : 
roi, data mining, big data, business analytics, enterprise applications
    
IBM
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn how to improve your business agility in this Whitepaper on building a business case for network virtualization. Find out how your network can deliver new levels of performance and resiliency.
Tags : 
business agility, network architecture, virtualization, network, cloud computing
    
Juniper Networks
White Paper Published By: F5 Networks Inc     Published Date: Feb 18, 2015
Organizations in every industry rely on applications to drive customer engagement, employee productivity and revenue. Deployed between users and the applications are a wide variety of “application services” designed to enhance security, improve performance and ensure reliability. F5 set out to evaluate the state of these services by asking IT professionals about their current and planned use of application services. Read the report to learn which strategic initiatives are driving application deployments including the most important trend for the next 2-5 years.
Tags : 
application services, customer engagement, employee productivity, application deployment, it management
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Feb 18, 2015
SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. Read this whitepaper to learn how your organization can properly embrace a higher security posture to protect SSL.
Tags : 
ssl, cryptographic protocols, data security, higher security posture, security
    
F5 Networks Inc
White Paper Published By: IBM     Published Date: Feb 18, 2015
DevOps processes and tools help retailers compete in fast-paced mobile, digital and physical markets. See what retailers can do to deliver innovation faster. Test virtualization and deployment automation can improve front-end mobile and back-end mainframe development processes.
Tags : 
ibm, devops, retail industry, devops processes, test virtualization
    
IBM
White Paper Published By: IBM     Published Date: Feb 18, 2015
Why should we bother automating deployments in the first place? What should the scope of the automation effort be? How do we get started? This white paper provides a solid introduction to these topics.
Tags : 
ibm, automation investments, deployment automation, deployment solutions, it management
    
IBM
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Looking to bring apps to market more quickly and reliably? Read our eBook on Network Automation to learn how you can make the most of the cloud with SDN and open, intelligent network architectures.
Tags : 
network, automation, data center, cloud, it management
    
Juniper Networks
White Paper Published By: IBM     Published Date: Feb 18, 2015
UrbanCode Deploy provides extensive capabilities for configuring WebSphere Application Server (WAS) through plug-ins: Application Deployment for WebSphere - which enables the auto-discovery of WAS cells; and Middleware Configuration for WebSphere - which allows for management of WAS configurations. When combined, UrbanCode Deploy and these plug-ins enable a rapid, controlled method for continuous delivery to WebSphere Application Servers.
Tags : 
application delivery, websphere, ibm, urbancode, application server
    
IBM
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Get expert advice on how to keep your private cloud secure with our Top 10 Considerations Slideshow. If you are looking to build a secure foundation for your private cloud infrastructure, this slideshow offers important considerations for securing your private cloud environment.
Tags : 
cloud, private cloud, security, password, virtualization
    
Juniper Networks
White Paper Published By: F5 Networks Inc     Published Date: Feb 18, 2015
In this article, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve when it comes to securing apps in a mobility-focused world.
Tags : 
application security, mobility-focused world, application solutions, it management, knowledge management
    
F5 Networks Inc
White Paper Published By: IBM     Published Date: Feb 18, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : 
mobile app testing, ibm, desktop applications, mobile test environments, mobile device cloud
    
IBM
Webinar Published By: Juniper Networks     Published Date: Feb 18, 2015
Find out how network virtualization can help you move seamlessly to a private cloud in this Webinar. You will hear about the challenges the Tribune Broadcasting had to solve in order to achieve a smooth transition to high-performance, scalable private cloud.
Tags : 
private cloud, juniper, cloud computing, virtualization, infrastructure
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Find out how new applications and virtualized environments are driving the need for increased bandwidth and network scale in this new Report. Read how scalability is fuelling the need for 10GbE networks.
Tags : 
juniper, data center, bandwidth management, database development, virtualization
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.
Tags : 
firewall planning, network firewall, security policy, http, terminal server
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
juniper, juniper networks, security, network security, firewalls
    
Juniper Networks
Start   Previous    44 45 46 47 48 49 50 51 52 53 54 55 56 57 58    Next    End


Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management

Search