databases

Results 151 - 175 of 301Sort Results By: Published Date | Title | Company Name
Published By: StreamSets     Published Date: Sep 24, 2018
Treat data movement as a continuous, ever-changing operation and actively manage its performance. Before big data and fast data, the challenge of data movement was simple: move fields from fairly static databases to an appropriate home in a data warehouse, or move data between databases and apps in a standardized fashion. The process resembled a factory assembly line.
Tags : 
practices, modern, data, performance
    
StreamSets
Published By: IBM APAC     Published Date: Mar 19, 2018
To support ongoing expansion and transformation, the Froedtert & MCW health network needed to boost system performance and upgrade its electronic health record software. The organization migrated to IBM FlashSystem and IBM Power E870, which helped them increase their storage density by 22x and reduced cut in read-time for EHR databases by 50%.
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: Mar 19, 2018
MongoDB, one of the most popular NoSQL Open databases, helps you take advantage of exploding unstructured data with faster access to data and analytics while reducing your database cost. With the right infrastructure, you can benefit more. By running MongoDB on IBM Power systems, you can achieve: ?Bring new apps to market faster and reduce the risk for mission-critical deployments ?2.6x better performance for MongoDB at a much lesser cost than x86 Find out more about IBM Power Systems and MongoDB for todays applications.
Tags : 
    
IBM APAC
Published By: Pentaho     Published Date: Mar 08, 2016
If youre evaluating big data integration platforms, you know that with the increasing number of tools and technologies out there, it can be difficult to separate meaningful information from the hype, and identify the right technology to solve your unique big data problem. This analyst research provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals. Read the Buyers Guide to Big Data Integration by CITO Research to learn: What tools are most useful for working with Big Data, Hadoop, and existing transactional databases How to create an effective data supply chain How to succeed with complex data on-boarding using automation for more reliable data ingestion The best ways to connect, transport, and transform data for data exploration, analytics and compliance
Tags : 
data, buyer guide, integration, technology, platform, research, enterprise applications
    
Pentaho
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications, java, application integration, configuration management, virtualization
    
Oracle
Published By: Tripp Lite     Published Date: May 15, 2018
As organizations pursue improvements in reliability and energy efficiency, power design in data centers gets substantial attentionparticularly from facilities and engineering personnel. At the same time, however, many IT professionals tend to spend little time or energy on the specific products they use to deliver and distribute electrical power. In?rack power is often considered less strategically important than which servers or databases to deploy, and it is often one of the last decisions to be made in the overall design of the data center. But choosing the right in-rack power solutions can save organizations from potentially crippling downtime and deliver significant up-front and ongoing savings through improved IT efficiency and data center infrastructure management.
Tags : 
    
Tripp Lite
Published By: Equinix     Published Date: Oct 20, 2015
Enterprises must prepare for the emerging digital user. Future interactions among people, whether enterprise employees, partners or customers, will be primarily digital and heavily influenced by mobile devices, social media, analytics and the cloud. User interactions with systems of record, such as databases and files, will largely give way to interactions with systems of engagement, such as social media.
Tags : 
enterprise, digital user, user interaction, systems of engagement, analytics and the cloud, mobile devices, social media, enterprise applications
    
Equinix
Published By: CA Technologies EMEA     Published Date: May 23, 2018
To move your business from its current state to the connected enterprise, you have to define a common API to your database and other systems, while providing the infrastructure to support the new model. The new systems must incorporate the security safeguards while ensuring the infrastructure can support the new growing, but variable, load. With the rapid adoption of mobile and web-based services across the industry, the REST architecture has emerged as the de facto standard for API integration across systems. This white paper addresses the concepts of REST, creating REST APIs for your databases and integrating with other systems: What is REST? Why use REST for database access? Building REST infrastructure for database access The REST enabled database Integrating REST with other services Criteria for selecting REST services platform
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 02, 2015
The book covers the following topics and more: - Understand the changing relationship between IT and business quicker delivery is required - Examine todays complex applications mobile, web, social meet middleware, packaged apps, databases, and mainframes. - Discover how to begin with service virtualization build your business case. - Realize the benefits of service virtualization enable earlier testing to eliminate surprises and reduce risk.
Tags : 
service virtualization, software quality, efficiency, testing processes, testing, mobile applications, web applications, middleware
    
IBM
Published By: Dell Software     Published Date: Feb 19, 2014
When application performance issues occur, it seems DBAs get blamed even if databases arent the cause. In this new white paper, see how to maintain peak database performance at all times and how to prove, beyond a doubt, your databases arent causing the headaches! Read this paper today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, database development
    
Dell Software
Published By: Dell Software     Published Date: Feb 19, 2014
In "Proactive Performance Management for Enterprise Databases," read about the inherent challenges of proactive database management, and what to look for when choosing the right management tool for your company. Get this white paper today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, database development, data protection
    
Dell Software
Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
    
Burton Group
Published By: Citrix Systems     Published Date: Nov 10, 2014
ADCs are advanced load balancers with functions and features that enhance the performance of applications. Today, companies of all sizes with geographical dispersal of people and different data constructs require ADCs to optimize their complex application environments from web applications, to Exchange, SharePoint and databases. It is interesting that before the term ADC was used more recently (in the last decade), companies relied on load balancers for website availability and scalability. In this paper we will describe the fundamentals of a load balancing system and its evolution to an ADC.
Tags : 
database, sharepoint, application, load balancer, performance, availability, website, scalability
    
Citrix Systems
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
Unlike large enterprises, smaller and mid-size businesses (SMBs) often rely on small teams - sometimes even a single person - to configure and manage their IT systems, including their databases.
Tags : 
smb, database application, easy deploy, easy maintenance, scalability, high-availability, mid-sized organizations, departmental deployments
    
Oracle Global Marketing
Published By: McAfee     Published Date: Feb 06, 2013
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.
Tags : 
vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases, anti spam, anti spyware
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organizations most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring, access control, anti spyware, anti virus, application security, business continuity
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : 
best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases, anti spam
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases, anti spam, anti spyware
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules the McAfee MySQL Audit Plug-In.
Tags : 
securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies most valuable information assets, but in most cases theyre poorly protected. Its important to secure databases as well as or better than other systems in the enterprise. But its not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, anti spam
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
With McAfee Database Security, achieving protection and compliance is easier than you might think.
Tags : 
database security, database audit, database compliance, cert, database security policy, database vulnerability management, database virtual patching, database activity monitoring
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : 
database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection, access control
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.