Find White Papers
Home
About Us
List Your Papers
    
> Technology > Data Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Data Management

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.
Results 4526 - 4550 of 4554Sort Results By: Published Date | Title | Company Name
White Paper Published By: Lombardi Software     Published Date: Dec 07, 2006
In this paper, we will discuss the benefits of BPM and SOA in more detail and show how leading companies have recognized that implementing BPM and SOA together gives them unique capabilities.
Tags : 
bpm, soa, business process management, service oriented architecture, service-oriented architecture
    
Lombardi Software
Case Study Published By: SpringCM     Published Date: Dec 07, 2006
Learn how web services integration enabled Priority Solutions’ clients and vendors to access documents in the SpringCM repository via the company’s self-service Web portal.
Tags : 
content management, document management, content management system, collaboration, web portal
    
SpringCM
White Paper Published By: Clarabridge     Published Date: Dec 06, 2006
This white paper describes how the Clarabridge Content Mining Platform avoids the pitfalls of previous approaches to unstructured analysis, and capitalizes on lessons learned from solving similar problems in the structured domain.
Tags : 
business intelligence, data warehousing, data mining, content integration, content management system
    
Clarabridge
White Paper Published By: SpringCM     Published Date: Dec 06, 2006
You’ve made the decision: the overall ease and economics of implementing Software-as-a-Service (SaaS) appeal to you, and you have selected an application that delivers what you need for your business.  The last hurdle is the service component itself — making sure that critical factors like security, speed, and reliability that will affect your users’ experience meet your standards.
Tags : 
saas, on-demand, on demand, real time, real-time
    
SpringCM
White Paper Published By: Neterion     Published Date: Dec 05, 2006
As the demand for bandwidth grows, so does the reach of networks. Users need to access data globally, from multiple locations around the world, quickly and transparently without breaking budgets. Data centers locked into servicing only local users unnecessarily constrain growth and expansion.
Tags : 
storage area network, gigabit, iscsi, datacenter, datacenters
    
Neterion
White Paper Published By: Winshuttle     Published Date: Dec 04, 2006
This paper describes some of the best practices that many companies have adopted and are able to make mass changes to SAP data in record time with minimal resources.
Tags : 
sap, data management, best practices, sap data, data change
    
Winshuttle
White Paper Published By: Winshuttle     Published Date: Dec 04, 2006
This white paper describes how many companies are realizing significant productivity gains by empowering the business users with tools to transfer their own data between spreadsheets and SAP.
Tags : 
sap, spreadsheet, spreadsheets, excel, productivity
    
Winshuttle
White Paper Published By: Winshuttle     Published Date: Dec 04, 2006
This paper describes 7 best practices that many companies have adopted in automating the upload of Excel data into SAP. Adopting these best practices will alleviate many of the pains that business users and IT analysts face in uploading Excel data to SAP.
Tags : 
excel, sap, spreadsheet, spreadsheets, best practice
    
Winshuttle
White Paper Published By: Winshuttle     Published Date: Dec 04, 2006
This paper describes how to easily integrate Excel data with SAP solutions and the resulting benefits from such integration – reduction in financial closing time, reduction in data entry resources, and availability of timely data for reporting.
Tags : 
excel, sap, integration, spreadsheet, reporting
    
Winshuttle
White Paper Published By: Quocirca     Published Date: Dec 04, 2006
Service Oriented Architectures (SOAs) will provide greater flexibility for those utilizing them, but will also bring greater issues for data and functional connectivity.  This paper contrasts and compares the capabilities of a point-to-point and an enterprise service bus approach.
Tags : 
soa, connectivity, service-oriented architecture, service oriented architecture, data management
    
Quocirca
White Paper Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : 
identity theft, application security, password management, security management, compliance
    
Cenzic
White Paper Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management
    
Third Brigade
White Paper Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises need to utilize software testing that can automatically review applications for security problems. This document examines the market drivers and technology associated with software security code review products and discusses how Cenzic is addressing this urgent need.
Tags : 
web applications, application security, web application security, security code, cenzic
    
Cenzic
White Paper Published By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security
    
Secure Computing
White Paper Published By: Business Intelligence Inc.     Published Date: Nov 18, 2006
Surprisingly low-cost technology MSSO/SD4E transforms Excel into an incredibly powerful and completely secure Business Intelligence tool capable of quickly and easily manipulating and analyzing live data directly from multiple, disparate data sources, generating even the most complex and sophisticated analytical reports with a simple keystroke.
Tags : 
business intelligence, business analytics, excel, business intelligence inc., analytical applications
    
Business Intelligence Inc.
Webinar Published By: Symantec     Published Date: Nov 17, 2006
The latest release of Backup Exec allows you to eliminate backup windows and recover individual Exchange messages, folders, and mailboxes - without mailbox backups. Learn more about how Symantec Backup Exec™ 11d for Windows® Servers provides continuous, cost-effective, and high-performance disk-to-disk-to-tape backup and recovery for Windows server data.
Tags : 
disaster recovery, backup and recovery, storage management, network management, network performance
    
Symantec
White Paper Published By: SBE     Published Date: Nov 17, 2006
This white paper covers the use of new growth-oriented file systems with snapshot capabilities, iSCSI for network layer independence, and a collection of other technologies provided by various vendors and open source projects to create a multi-tiered storage solution with self-service data restoration, long term growth, and disaster recovery.
Tags : 
iscsi, storage management, storage scalability, scalable storage, scalability
    
SBE
White Paper Published By: TriTuns Innovation     Published Date: Nov 14, 2006
This paper examines the nature, cause and impact of data quality problems in typical IT system implementations.  It argues that the extent and impact of poor data quality is largely misunderstood and often ignored.
Tags : 
data quality, data protection, data improvement, improve data, trituns
    
TriTuns Innovation
White Paper Published By: Customer Chemistry     Published Date: Nov 14, 2006
Predictive analytics can be utilized to uncover root causes so that problems can be eradicated.  Read this white paper to learn how companies can use predictive analytics treatment and prevention approaches to save time and resources, eliminate root causes of problems, and obtain the actionable insight required to improve marketing effectiveness.
Tags : 
analytics, predictive analytics, marketing strategy, customer research, market trends
    
Customer Chemistry
White Paper Published By: Customer Chemistry     Published Date: Nov 14, 2006
Building a top-tier analytics practice is an evolution.  The best approach is to start small, then scale with each success.  Learn how to incrementally build your analytics practice with five customizable building blocks that create a strong foundation for analytical success.
Tags : 
analytics, predictive analytics, business analytics, business process, business strategy
    
Customer Chemistry
White Paper Published By: Customer Chemistry     Published Date: Nov 14, 2006
Read this white paper to learn about the six keys to a structured approach to planning and implementation of a predictive analytics infrastructure.  Find out how you can turn customer intelligence data into actionable information for improving the accuracy, efficiency and success of your targeting efforts.
Tags : 
customer intelligence, business intelligence, marketing intelligence, customer research, predictive analytics
    
Customer Chemistry
White Paper Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection
    
KACE
White Paper Published By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : 
backup, backup and recovery, disaster recovery, compliance, data protection
    
Symantec
White Paper Published By: IBM     Published Date: Nov 06, 2006
This IBM white paper posits that most enterprises have yet to realize the full value of convergence and explains why the real promise of IP networks lies in converged applications. It goes on to explain how IP convergence can build real business value for today's busy contact centers.
Tags : 
convergence, communications convergence, ip telephony, ip faxing, networking
    
IBM
White Paper Published By: IBM     Published Date: Nov 06, 2006
Download this paper to learn why IBM believes that the real business value of IPC voice systems is reflected in improved employee productivity, enhanced business processes, and the ability to deliver more responsive services and offerings.
Tags : 
voip, converge, productivity, convergence, communications convergence
    
IBM
Start   Previous    169 170 171 172 173 174 175 176 177 178 179 180 181 182 183    Next    End


Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management

Search