SQL Server Insider E-zine - Volume 4: Master Data Services: A Work in Progress
By: Dell and Microsoft SQL View more from Dell and Microsoft SQL >>
Download this next:
A Computer Weekly buyer's guide to NoSQL
By: TechTarget ComputerWeekly.com
Type: eBook
There’s a lot of data out there, much of which doesn’t
need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer’s guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.
Discover more on:
- NoSQL offerings from Microsoft and Oracle
- The suppliers behind the emergence of databases that organise web-scale datasets and the like – and the most recent set of upstarts dubbed NewSQL
- Enterprise use cases for NoSQL database technology
These are also closely related to: "SQL Server Insider E-zine - Volume 4: Master Data Services: A Work in Progress"
-
Virtual Data Center E-Zine Volume 37: Maximizing Virtual Data Center Consolidation
By: TechTarget Data Center
Type: Ezine
Virtualization may be well underway, but it doesn't mean new challenges won't arise as you continue to navigate your initiative. This expert e-zine offers detailed guidance for achieving the right balance in your virtual data center and presents key findings concerning your peers' consolidation objectives for 2012.
Read on to discover:
- Why not all data centers are created equal
- What not to do when you're consolidating: Five common VM mistakes
- How much server consolidation is enough
- How to find the right virtual balance with optimal resource consolidation
- And more
-
Jargon buster guide to database management
By: TechTarget ComputerWeekly.com
Type: eGuide
Database management roles have long been a rich career seam for IT professionals. However, there has been, in recent years, a “Cambrian explosion” in the previously steady but sleepy world of databases.
The relational database model, breaking the traditional dependency between data storage and applications, held sway in enterprise IT for decades, from the time of its serious commercialisation by Oracle in the mid-7os. Also hegemonic has been the language implementation of the relational model, SQL – Structured Query Language; which is of the same mid-70s vintage.
But, in recent years, with the rise of the big data technologies of the Hadoop stack and the NoSQL databases, the data store and database scene has become more complex.
And when it comes to the Oracle database, its creator announced it to be “autonomous” at Oracle Open World in San Francisco October 2017. What does this mean for database administrators (DBAs)? Does it mean the opening up of new roles of higher intellectual interest and value? Or does it mean redundancy and early retirement?
As always with IT, the technology is only one-third of the story – the others being process and, crucially, people. What are the operational and organisational design problems to be solved in this more heterogenous database management landscape?
This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.
Find more content like what you just read:
-
Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange
By: TechTarget Security
Type: Ezine
This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.
-
With InterSystems Financial Services Suite, data silos are a past relic
By: InterSystems
Type: Analyst Report
Consider the challenges and barriers (such as silos and time-intensive data validation processes) to effective financial services data management in this InContext Paper by Bloor. You’ll also understand how InterSystems Financial Services Solution Suite resolves these issues with a 360-degree view of enterprise and customer data.
-
Preparing a database strategy for Big Data
By: TechTarget Data Management
Type: eGuide
This e-guide outlines the key database challenges and opportunities introduced by big data, and offers expert advice to help you successfully prepare a big data database strategy.
-
Web-Facing Applications: Mitigating Likely Web Application Threats
By: TechTarget Security
Type: eGuide
In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
-
Why NoSQL for AI-powered apps: A guide for developers
By: Couchbase
Type: White Paper
Modern NoSQL databases incorporate multiple data access methods and encompass a variety of models including key-value, document, column, time series, graph, text search, and AI vector search. This developer’s guide explains the many advantages that are making multipurpose NoSQL databases the developer’s choice for AI-powered adaptive applications.
-
A Computer Weekly buyer's guide to application modernisation
By: TechTarget ComputerWeekly.com
Type: eGuide
In this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.
-
Web-facing applications: Security assessment tools and strategies
By: TechTarget Security
Type: White Paper
Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
-
E-Guide: Achieve the benefits of virtualized mission-critical applications
By: TechTarget Data Center
Type: eGuide
In this expert e-guide, find out about the many benefits of virtualizing your mission critical applications such as improved hardware utilization and efficiency. Also, discover where to virtualize your applications to maximize these benefits.
-
A Computer Weekly Buyer's Guide to Enterprise Open Source
By: TechTarget ComputerWeekly.com
Type: eBook
In this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.
-
A helpful way to map MITRE ATT&CK tactics to Azure actions
By: Expel
Type: White Paper
Chasing down Microsoft Defender alerts and combing through Azure Monitor activity logs can be tough if you don’t know what to look for. To give you a jump start on investigations, this handy cheat sheet mapped the Azure services in which these tactics often originate, along with the actions attackers make to execute on these techniques.
-
Enterprise-wide collaboration: Make your case
By: TechTarget Content Management
Type: eBook
Access this expert e-book for tips on effectively implementing SharePoint with your organization's collaboration technology.
-
Why NoSQL for AI-powered applications: An architectural guide
By: Couchbase
Type: White Paper
NoSQL databases are built to be flexible, scalable, and capable of rapidly responding to the data management demands of modern businesses, which means they can serve as the basis for AI applications that need ultimate adaptability now and into the future. Read this architectural guide now to learn more.
-
E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
By: TechTarget Security
Type: eGuide
Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
-
Inside the successful projects that rely on NoSQL database applications
By: Couchbase
Type: White Paper
Check out this white paper for a look inside the modern challenges that NoSQL databases address, as well as when to choose NoSQL over relational and why.
-
E-Guide: Preventing and detecting security vulnerabilities in Web applications
By: TechTarget Security
Type: eGuide
The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.
-
Top 10 Azure mistakes and how to fix them
By: Nerdio
Type: White Paper
Deploying, managing, and scaling Microsoft Azure Virtual Desktop can be a complex process for technicians at any level of experience. In this white paper, browse the top 10 most common mistakes IT professionals make in Microsoft Azure.
-
Improve SQL Server performance with transformative database services
By: Nutanix
Type: Product Overview
Discover in this product overview why, as enterprises generate and store more and more operational data, they have come to rely on Microsoft SQL Server infrastructure more than ever before.
-
A comparison of Azure, AWS, and Google cloud services
By: TechTarget ComputerWeekly.com
Type: eGuide
AWS, Azure, and Google are all huge names in the cloud space, offering everything from big data in the cloud to serverless computing options and more. Read on for a vendor-neutral comparison of these three providers to determine which combination – if any – best fits your organization's infrastructure requirements.
-
Developer’s guide to secure coding
By: Veracode
Type: eBook
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
-
IT Project: Business intelligence in the world of big data
By: TechTarget ComputerWeekly.com
Type: eGuide
Old-school business intelligence (BI), although still important, is no longer at the cutting edge of modern IT projects. However, as the TechTarget 2016 spending survey shows, business intelligence is very much a priority for corporate IT.
-
Empowering your application teams with database as a service (DBaaS)
By: Silk Technologies Inc
Type: eBook
The shift to Database as a Service (DBaaS) marks a significant stride in cloud transformation, offering unmatched scalability, performance, and security for database workloads. Read on to learn how DBaaS can alleviate your in-house teams from the intricacies of database management, empowering them to focus on innovation and strategic initiatives.
-
E-Guide: Database Tools for Auditing and Forensics
By: TechTarget Security
Type: eGuide
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting database performance.
-
Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
By: TechTarget Security
Type: Ezine
With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
-
Expert E-zine: Who has access to your email?
By: TechTarget Security
Type: Ezine
In this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers.
-
New wave BI and analytics: turning modern data stores to account
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide looks at how companies and other organisations are doing BI and analytics on the newer data stores.
-
Migrate and modernize enterprise workloads
By: AWS
Type: eBook
Read the eBook “Enterprise Priorities for Workload Migration and Modernization” to learn how AWS can help you:Lower the cost of infrastructureIncrease staff productivityReduce time to market for new featuresImprove operational efficiency
-
Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation
By: TechTarget Data Center
Type: eBook
This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more.
-
How a next-generation firewall prevents application-layer attacks
By: TechTarget Security
Type: eGuide
The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
-
Data modeling guide
By: Couchbase
Type: White Paper
This document describes core elements you will use to model and handle data in Couchbase CapellaTM (or Couchbase Server). It describes the ways you can structure individual JSON documents for your application, how to store the documents with a Couchbase SDK, and different approaches you may take when you structure data in documents.
-
Data integration to support modern BI and advanced analytics programmes
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we discuss why data integration and preparation are the unsung heroes of modern BI and advanced analytics. More so than ever, it would seem, due to the ever-increasing volume and variety of data.
-
CW APAC: Trend Watch: Database technology
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on database technology in the Asia-Pacific region, Computer Weekly looks at the impact of graph databases and the different types of database management systems currently on the market.
-
Reducing carbon footprint and Azure costs with Nerdio
By: Nerdio
Type: Case Study
In this case study, discover how a global leader in recycled metal products made the switch to Nerdio to improve user management and deployment efficiency, while shaving more than $3,000 each month off its Azure bill.
-
Virtual Data Center E-Zine: Volume 39: Managing Virtualization Patches
By: TechTarget Data Center
Type: Ezine
Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming.
-
The various ways to fight new and emerging cybercrime
By: TechTarget Security
Type: eGuide
Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
-
Containers in the enterprise: Use cases and latest developments
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we delve into the world of containers. We discover why many enterprises appear to be intent on using the technology to support the remodelling of their legacy applications in microservices. Also, we take a look at why interest in containers has risen thanks to enterprises moving from hybrid and multi-cloud environments.
-
Storage for containers and virtual environments
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we give you a complete run-through of the main choices in data storage for containers, look at the essentials of virtual servers storage, plus all you need to know about storage performance in virtual server and desktop environments.
-
SAN block access storage in the age of cloud and hyper-converged
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
-
SAN block access storage in the age of cloud and hyper-converged
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
-
Computer Weekly datacentre case studies
By: TechTarget ComputerWeekly.com
Type: Case Study
Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.
-
A Computer Weekly buyer's guide to continuous integration and continuous deployment
By: TechTarget ComputerWeekly.com
Type: eGuide
Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.
-
PKI as a service vs. legacy PKI: Understand the differences
By: Venafi
Type: Infographic
Along with exploring the hidden costs of legacy PKI, this infographic introduces an alternative approach to PKI management: PKI as a service. Continue on to discover six benefits of PKI as a service.
-
FAQ: Hadoop for BI and Analytics
By: TechTarget Business Analytics
Type: eGuide
Because it's a relatively new technology, Hadoop is surrounded by many myths and most IT professionals have little to no experience with the big data platform. This expert E-Guide aims to dispel common Hadoop misconceptions and offers advice for how to utilize it to drive big data analytics success.
-
Private Cloud Computing E-Zine Volume 1: Private cloud computing as a business strategy
By: TechTarget Data Center
Type: Ezine
While many enterprises have moved to the private cloud model, have they adopted it entirely, and what are the roadblocks to getting there? In this inaugural edition of our Cloud Computing e-zine, we explore company strategies for private cloud adoption, some of the benefits of this model, and the challenges of a true private cloud infrastructure.
-
Hadoop Data Management and Use Cases
By: TechTarget Business Analytics
Type: eGuide
In this expert e-guide, hear from pros in the analytics space, including Wayne Eckerson, explore how organizations are beginning to integrate Hadoop deeper into operational workflows, expanding the possible use cases.
-
Web security: Important but often overlooked
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
-
E-Guide: Selecting a SIM for midmarket business
By: TechTarget Security
Type: eGuide
This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
-
Guinness World Records Goes "all in" on AWS to Manage Transformation Into Digital Media Company
By: Ensono Limited
Type: Video
Watch this video clip to learn how Guinness World Records is leveraging their new cloud host to aid in their organization-wide digital transformation.