data management system

Results 226 - 250 of 264Sort Results By: Published Date | Title | Company Name
Published By: Clarabridge     Published Date: Dec 06, 2006
This white paper describes how the Clarabridge Content Mining Platform avoids the pitfalls of previous approaches to unstructured analysis, and capitalizes on lessons learned from solving similar problems in the structured domain.
Tags : 
business intelligence, data warehousing, data mining, content integration, content management system, cms, business analytics, content mining, holistic, clarabridge, data management, analytical applications, data integration, information management
    
Clarabridge
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere, information management
    
Avalere
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Barcodes, magnetic stripes, and proximity readers all rely on the user to either make contact or place the badge very close to the reader. In addition, bar codes can only be read one at a time and the respective embedded information cannot be updated. Find out how an RFID access control system can provide an easy and efficient solution.
Tags : 
rfid, rfid tags, mobile data systems, access control, identity management, gao, gao group, gao rfid, access control system, barcodes, smart cards
    
GAO RFID Inc.
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Indicative Software     Published Date: Aug 24, 2007
Learn about agent-based versus agentless monitoring approaches to enterprise management, and how a combination of data collection technologies can realize the benefits of both.
Tags : 
enterprise management, enterprise monitoring, data collection, data collection engines, agent-based monitoring, agentless monitoring, performance monitoring, application performance, synthetic monitoring, passive monitoring, active monitoring, service level management, service management, systems management, indicative
    
Indicative Software
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Eaton     Published Date: Jan 04, 2012
You can download this white paper on common causes, implications and resolutions for problematic harmonic distortion in your electrical system.
Tags : 
data management, systems management, harmonics, power and cooling, power, size, linear, loads, repair, electrical system, virtualization, cloud computing, infrastructure, design and facilities, green computing
    
Eaton
Published By: ServiceNow     Published Date: Apr 19, 2013
A robust configuration management database (CMDB) is the heart of a successful service knowledge management system. It is the faithful source of configuration details and relationships people rely on to manage services throughout their lifecycle. Like personal relationships, building and maintaining an effective CMDB is a commitment that requires care and attention to get the best value.
Tags : 
configuration management, database, database management, business intelligence, database security, infrastructure
    
ServiceNow
Published By: Optis     Published Date: Feb 26, 2013
Don’t let a lack of people data insight keep you from making the right business decisions. Learn how to become people data strategic and make your disparate data easy to understand, control and see.
Tags : 
people data management, disparate people data, analyze leave data, employment data, employee benfits data, workforce data management, integrated people data, people data strategy, leave management system, absence management system, employee leave costs, absence management costs, leave management software, absence management program, leave administration, leave tracking system, absence management, online leave management, cloud leave tracking, leave compliance tracking
    
Optis
Published By: Optis     Published Date: Mar 07, 2013
Companies can realize significant savings with an automated absence management system. Download the Optis study to see how one company saved over $8 million by reducing lost time and getting a handle on leave.
Tags : 
people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy, leave management system, absence management system, employee leave costs, absence management costs, leave management software, absence management program, leave administration, leave tracking system, absence management, online leave management, cloud leave tracking, leave compliance tracking
    
Optis
Published By: Optis     Published Date: Mar 07, 2013
When employee absences can make up 36 percent of an employer’s payroll, companies need to manage leave without adding costs. Find out how an integrated system will improve the bottom line and bring people data together.
Tags : 
people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy, leave management system, absence management system, employee leave costs, absence management costs, leave management software, absence management program, leave administration, leave tracking system, absence management, leave management, online leave management, cloud leave tracking
    
Optis
    
Optis
Published By: HP and Intel ®     Published Date: May 02, 2013
It is very clear that datacenter managers need, in addition to server virtualization, the virtualization, pooling, and management of all the other resources that interoperate with their VMs. They require virtualized network interconnects and storage. They also need the tools to manage and automate these converged IT assets as an integrated datacenter system. This more agile system is the key to enabling the shift to a cloud-based infrastructure IT delivery model. Solution providers like HP are now addressing the need for more optimized and agile IT solutions. They are delivering virtualized storage, virtual application network (VAN) infrastructure, and the orchestration software to manage and automate all these ingredients as a single system. Read this whitepaper to learn more.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure, cloud computing, infrastructure management
    
HP and Intel ®
Published By: IBM     Published Date: Sep 27, 2013
In this paper, Ptak/Noel describes the new IBM PureFlex system and the unique management capabilities of the IBM Flex System Manager.
Tags : 
ibm, data center, data center management, ibm pureflex, ibm pureflex system, expert integrated system, computing systems, ibm flex system manager, networking, business technology
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking, security, data management, servers, operating system, infrastructure, ibm puresystems, storage, business technology
    
IBM
Published By: Oracle     Published Date: Nov 05, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : 
business intelligence, integrated marketing, social media strategy, content marketing, insight, social data, customer hub, social analytics, business technology
    
Oracle
Published By: IBM     Published Date: May 02, 2014
Learn more about Forrester’s results, and how these organizations are realizing both economic and operational benefits with InfoSphere Optim solutions.
Tags : 
ibm, big data, big sql, querying data, database management technology, apache hadoop, data administrators, infosphere, biginsights, industry-standard sql, management systems, database metadata, application programming interfaces, api, data persistence, virtualize data, lifecycle management, big data strategy, it management, data management
    
IBM
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Published By: Delphix     Published Date: Mar 24, 2015
Software development across industries is undergoing a constant revolution, driving toward more efficient processes, while data management is trapped with slow legacy systems. This deep dive outlines how Data as a Service transforms data from drag to driver.
Tags : 
    
Delphix
Published By: MarkLogic     Published Date: Dec 03, 2014
So many people are realising that yesterday’s technology can’t support today’s fast-changing data and are turning to a new generation of database: NoSQL. NoSQL makes it easy to consolidate your heterogeneous data and consolidate disparate data silos because you don’t need to make data conform to the row-and-column restrictions of relational technology. Get a head start and download Enterprise NoSQL for Dummies and discover: • The NoSQL lingo • What it does and how it works • How it can be used • Tips for what to look for in an Enterprise NoSQL database Go beyond relational and learn how NoSQL allows you to build applications with greater ease and speed! http://info.marklogic.com/nosql-for-dummies.html
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable, enterprise applications, data management
    
MarkLogic
Published By: Dell EMC     Published Date: Dec 06, 2017
Empower your databases with strong, efficient, scalable performance Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel Inside®. New Possibilities Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept