> Technology > Data Management
 

Data Management

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.
Results 1 - 25 of 1650Sort Results By: Published Date | Title | Company Name
By: Marketo     Published Date: Jun 26, 2015
Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on completeness of vision and the ability to execute.
Tags : data management
     Marketo
By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails
     Mimecast
By: Lucidworks     Published Date: Jun 24, 2015
Using content, context, and the crowd to build better search applications.
Tags : search platform, search query, search technologies, big data, high-volume data
     Lucidworks
By: F5 Networks Inc     Published Date: Jun 24, 2015
To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jun 24, 2015
To meet the challenges of IT organizations, Cisco and F5 have developed a shared architectural vision and joint solution to simplify networking and solve pain points in next-generation data centers. The solution extends the F5 Synthesis architecture and programmable Software-Defined Application Services (SDAS) within the Cisco Application Centric Infrastructure (ACI), helping customers efficiently deliver applications that are fast, secure and available. Read the whitepaper to learn more.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity
     Mimecast
By: IBM     Published Date: Jun 22, 2015
According to Forrester Research, we have entered the era of Continuous Delivery. Clients are shifting from agile transformation to DevOps, while modern application delivery leaders are embracing DevOps to accelerate delivery of innovation.
Tags : financial services, best practices, continuous delivery, ibm, it management
     IBM
By: IBM     Published Date: Jun 22, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : ibm, compliance requirements, quality management tools, quality management, best practices
     IBM
By: OnBase by Hyland     Published Date: Jun 10, 2015
When selecting enterprise content management (ECM) solutions, many IT departments face internal pressure to keep costs down and decrease the time it takes to see results, while giving end-users exactly what they want. Discover how involving IT in the buying process allows you to select an ECM solution that remains successful throughout its lifetime.
Tags : enterprise content management, ecm, costs, ecm solution, it management
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 10, 2015
Discover how the real savings associated with document capture start when automatically capturing and validating data from your organization’s scanned documents to eliminate costly process steps and free up staff time.
Tags : document capture, data validation, scanning, enterprise content management, ecm
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 10, 2015
The role of enterprise content management (ECM) as a centralized document repository is well established. However, the value of ECM increases exponentially when it is leveraged as an information hub between line-of-business (LOB) systems to facilitate key processes, keep data in sync and maximize investments in existing applications.
Tags : enterprise content management, ecm, enterprise information hub, line of business systems, it management
     OnBase by Hyland
By: IBM     Published Date: Jun 09, 2015
This report provides an in-depth review of Blueworks Live’s features and benefits for engaging business users in process improvement.
Tags : ibm, process improvement, engagement, blueworks live, share
     IBM
By: OnBase by Hyland     Published Date: Jun 09, 2015
This white paper shows you how ECM evolves your document management strategy so that you can: • Make your content work for your organization • Streamline processes with seamless integrations • Remove manual processes surrounding your organization’s content
Tags : document management, enterprise content management, ecm, business applications, content integration
     OnBase by Hyland
By: OnBase by Hyland     Published Date: Jun 09, 2015
You’ve determined how ECM can help your organization automate manual tasks, improve workflows and eliminate paper-based processes. Next is developing an ECM solution based on your business needs.
Tags : enterprise content management, ecm, automation, workflow, paperless
     OnBase by Hyland
By: Verisign     Published Date: Jun 03, 2015
Defending an enterprise today is a more complex and challenging task than ever before. Download this white paper to learn what you need to know to protect your network and data.
Tags : point-of-scale systems, cyber crime, banking trojans, downloaders, hacktivist activity
     Verisign
By: Verisign     Published Date: Jun 03, 2015
This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services in the 1st Quarter of 2015. It represents a unique view into the attack trends unfolding online for the quarter, including attack statistics and behavioral trends.
Tags : ddos, attack mitigation, attack trends, attack statistics, behavioral trends
     Verisign
By: Arcserve     Published Date: May 29, 2015
The traditional taxonomy of data protection appliances – also known as Purpose Built Backup Appliances (PBBAs) – covers two primary categories: • Backup Appliances • Deduplication Appliances Let’s explore this taxonomy and market dynamics.
Tags : data protection appliances, purpose built backup appliances, deduplication, market dynamics, it management
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : data protection appliances, appliance adoption, arcserve, security, it management
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : backup infrastructure, legacy systems, overload infrastructure, cloud, it management
     Arcserve
By: IBM     Published Date: May 28, 2015
In this book, you look at how the Smarter Process approach helps you create a more customer-centric organization. You discover how four major technologies — mobile, cloud computing, Big Data, and social collaboration — are disrupting the way you do business and how you can work through the challenges.
Tags : smarter process, data management, business models, blueworks live, big data
     IBM
By: IBM     Published Date: May 27, 2015
This white paper from a leading analyst, VDC Research, outlines some of the key opportunities and challenges facing companies that make the "things" that comprise the Internet of Things.
Tags : internet of things, product development, time to market, data analysis, it management
     IBM
By: IBM     Published Date: May 27, 2015
Tech-Clarity offers the following ten tips to help companies transform their business to take advantage of this opportunity and prepare for growth and profitability.
Tags : internet of things, product development, time to market, data analysis, it management
     IBM
By: IBM     Published Date: May 27, 2015
With continuous validation and verification practices and solutions, engineering organizations can develop today's smarter products and create the opportunities that can put them on the path to competitive advantage.
Tags : continuous verification, product development, product engineering, mobile, prototyping
     IBM
By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : phishing, next-generation malware, security, email, it management
     ThreatTrack Security
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search