IT Management  >   Systems Operations  >   Security  >  

Data Base Security

RSS Feed    Add to Google    Add to My Yahoo!
Data Base Security Reports
 
IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

How To Combat The Mounting Complexity of Big Data With SQL Server
sponsored by Microsoft
WHITE PAPER: Recent big data complexity is taxing IT resources beyond what they were originally designed to handle. Learn how different versions of SQL Server provide advanced security, availability, scalability, and performance capabilities that meet the data needs of modern organizations, and the potential cost impacts of this functionality.
Posted: 28 Apr 2016 | Published: 31 May 2015

Microsoft

Financial Services Data Privacy and Data Migration
sponsored by ComputerWeekly.com
PRESENTATION: Keith Bucknall, head of Strategy, Architecture & Infrastructure for Lloyds motor insurer, ERS, looks at the data protection challenges faced by the organisation, in this presentation.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

ComputerWeekly.com

Taking the fear out of bringing Government Systems online
sponsored by IBM
WHITE PAPER: People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems.
Posted: 27 Dec 2012 | Published: 24 Jul 2012

IBM

Server Optimization, Hardware and Virtualization
sponsored by Dell, Inc. and Microsoft
EGUIDE: In this expert e-guide, find out how to optimize SQL Server with the right choices for hardware, storage devices, and virtualization. Inside, find articles on: what not to do when purchasing hardware; if solid-state storage devices are worth the cost; hardware and risk considerations for an inevitable virtualization initiative.
Posted: 10 Jan 2012 | Published: 09 Jan 2012

Dell, Inc. and Microsoft

Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report
sponsored by IBM
WHITE PAPER: In this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication.
Posted: 02 May 2014 | Published: 31 Jan 2014

IBM

Data Security and Privacy: A Holistic Approach
sponsored by IBM
WHITE PAPER: This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk.
Posted: 09 Nov 2011 | Published: 01 Sep 2011

IBM

Presentation Transcript: New Releases from Intel and IBM offer Breakthrough Database Performance
sponsored by Intel and IBM
PRESENTATION TRANSCRIPT: Read this presentation transcript now and learn about these advances that are possible by combining the Intel Xeon processor E5-2600 product family with IBM DB2 10 for Linux, Unix and Windows.
Posted: 30 Apr 2012 | Published: 17 Apr 2012

Intel and IBM

Webroot Secure Anywhere Business - Mobile Protection
sponsored by Webroot
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

Computer Weekly – 9 December 2014: The most influential people in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement