IT Management  >   Systems Operations  >   Data Management  >  

Data Collection

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data-collection, Datacollection
DEFINITION: The process of capturing or collecting data.
Data CollectionReports
1 - 25 of 144 Matches Previous Page  | Next Page
The Big Data Self-Service Desk
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to learn how you can connect business intelligence by leveraging deeply embedded big data. You can provide a self-service portal fueled by captured social conversations to empower users to help themselves and others, reducing the number of tickets IT sees.
Posted: 25 Nov 2014 | Published: 18 Jun 2014

Hewlett-Packard Company

Survey: UK Falling behind France and Germany in Big Data
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The survey from Teradata shows the UK is lagging behind France and Germany in its response to the challenges of handling and analysing big data.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Real-Time Business Intelligence: Instant Opportunities
sponsored by Hitachi Data Systems
WHITE PAPER: View this white paper now to discover a solution that brings data collection and data analysis seamlessly together, virtually eliminating any operational latency.
Posted: 18 Sep 2014 | Published: 31 Dec 2012

Hitachi Data Systems

Big Security for Big Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more!
Posted: 19 Aug 2014 | Published: 31 Dec 2012

Hewlett-Packard Company

Meet Compliance Guidelines Effectively with Log Management Solutions
sponsored by LogRhythm, Inc.
WHITE PAPER: In this in-depth guide, learn how to more efficiently meet compliance recommendations with new log management and analysis solutions.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

LogRhythm, Inc.

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Big Data and Content Analytics: measuring the ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

The trust advantage: How to win at big data
sponsored by ComputerWeekly.com
ANALYST REPORT: Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Set Your IT Business Up For Success: Achieving Client Satisfaction in the First 30 Days
sponsored by LabTech Software
EBOOK: Learn the steps you can follow to make the onboarding process as smooth as possible, so you build client confidence fast and evolve from simply being the hired help to being viewed as a trusted advisor and valuable asset to your clients' business.
Posted: 26 Oct 2013 | Published: 25 Oct 2013

LabTech Software

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

The Growing Role of Big Data and Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explores the impact the looming intersection of Big Data and security analytics will have on your organization and explores why you should be looking forward to it.
Posted: 03 Sep 2013 | Premiered: Feb 28, 2013

LogRhythm, Inc.

CW buyer's guide: data management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A data management platform is a centralised computing system for collecting, integrating and managing large sets of structured and unstructured data from disparate sources. Effective use of such information management systems will provide access to consistent, accurate and current data.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Big Data in Big Companies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The International Institute for Analytics (IIA) and SAS, assess how 20 large firms have deployed analytics to generate value from their big data assets.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

ComputerWeekly.com

Privacy and Big Data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

ComputerWeekly.com

Social Login 101
sponsored by Gigya
WHITE PAPER: View this white paper to learn why social login -- with permission-based access to first-party identity data -- is the better option for getting the kind of information that creates relevant cross-channel experiences. Read now to explore the basics of social login, best practices, and benefits for consumers and businesses.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Gigya

MDM and Data Quality for the Data Warehouse
sponsored by Informatica
WHITE PAPER: This executive brief explains how the combination of master data management (MDM) and data quality (DQ) can significantly enhance the accuracy and reliability of data, enabling timely, confident decisions and accurate reporting.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

Informatica

Building Your Business Case for Managed File Transfer
sponsored by OpenText
WHITE PAPER: This whitepaper details the benefits of managed file transfers and how to build an effective business case for implementation.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

OpenText

Hitachi High-Throughput with Lustre storage solution
sponsored by Hitachi Data Systems
WHITE PAPER: This white paper documents how high-throughput data systems can help increase workflow.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hitachi Data Systems

Hitachi High-Throughput with Lustre storage solution Datasheet
sponsored by Hitachi Data Systems
DATA SHEET: This white paper details how a high-throughput data system can handle big data.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hitachi Data Systems

Packet Capture in High-Speed and Data Center Networks
sponsored by WildPackets, Inc.
WEBCAST: This in-depth webcast explores the impact high-speed networking, changing traffic patterns, and new capture points have on network monitoring today and reveals key places you must capture data to truly achieve the visibility you need to ensure optimal network performance.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

WildPackets, Inc.

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

SAP predictive analysis: What you need to know
sponsored by HP
WHITE PAPER: Read on to find details about SAPs BusinessObjects Predictive Analysis, including how the NBA used HANA to help cater to stat-hungry fans.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

HP
1 - 25 of 144 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement