IT Management  >   Systems Operations  >  

Data Resource Management

RSS Feed    Add to Google    Add to My Yahoo!
Data Resource Management Multimedia (View All Report Types)
 
A New Approach to Endpoint Data Protection for Mobile Enterprise
sponsored by Druva Software
WEBCAST: Tune into this webinar to learn about a new approach to endpoint backup that takes cloud infrastructure and mobile enterprise into account.
Posted: 12 Feb 2015 | Premiered: Feb 12, 2015

Druva Software

What If You Could Innovate and Grow Without Taking A Big Risk?
sponsored by Red Hat
VIDEO: This video explains why leading organizations are turning to Linux to help modernize, standardize, and virtualize their infrastructure for huge gains in performance and management.
Posted: 17 Oct 2014 | Premiered: 23 May 2014

Red Hat

Business Analytics: How To Exceed Expectations
sponsored by Pentaho Corporation
VIDEO: Decision-makers and data management enthusiasts alike will find the following video very informative, with coverage of how analytics can exceed your expectations. Watch and discover the qualities of powerful analytics.
Posted: 30 Mar 2015 | Premiered: 12 Oct 2011

Pentaho Corporation

Bringing Information Governance Strategies Into the 21st Century
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this web seminar, learn from real-world case studies about how to shed outdated data governance policies and develop new approaches to best harness records and information across the enterprise.
Posted: 20 Jun 2014 | Premiered: 24 Jun 2014

SearchCompliance.com

Get a Better Handle on your Sales Compensation Programs
sponsored by IBM
VIDEO: Learn about a compensation management solution that will give you the simplicity, control and easy access to data needed for compensation calculations.
Posted: 01 Aug 2014 | Premiered: 01 Aug 2014

IBM

Using IBM Big Data & Analytics to Acquire, Grow and Retain Customers
sponsored by IBM
VIDEO: Find out how the Cincinnati Zoo utilized big data and analytics to personalize the customer experience for each person from the moment they enter the zoo.
Posted: 11 Jul 2014 | Premiered: 25 Feb 2014

IBM

Compliance Does Not Equal Security: Risk-Based Plan for ePHI Protection
sponsored by HP Security Voltage
WEBCAST: View this in depth webcast to learn how to establish a security-based strategy for data protection and how you can meet and go beyond healthcare regulation requirements. Watch now to learn more.
Posted: 03 Apr 2015 | Premiered: Aug 20, 2014

HP Security Voltage

Podcast: Leveraging the Cloud to Capitalize on Big Data
sponsored by CommVault
PODCAST: In this audio presentation, cloud computing experts (including Jeff Kaplan from THINKstrategies.org) examine how organizations can leverage cloud computing in order to effectively manage, store, analyze and share big data in a way that truly adds value to all aspects of your organization.
Posted: 01 Apr 2015 | Premiered: Mar 10, 2015

CommVault

Storage in the Age of Cloud Computing
sponsored by Toshiba
WEBCAST: In this fascinating video, learn about a high capacity, high speed, energy efficient storage solution that's capable of reducing the cost of storage capacity and can also be used to improve enterprise computing.
Posted: 18 Jun 2014 | Premiered: Jun 18, 2014

Toshiba

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement