You've requested...

SQL Server Insider E-zine - Volume 4: Master Data Services: A Work in Progress

If a new window did not open, click here to view this asset.

Download this next:

A Computer Weekly buyer's guide to NoSQL

There’s a lot of data out there, much of which doesn’t

need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer’s guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used. 

Discover more on: 

- NoSQL offerings from Microsoft and Oracle

- The suppliers behind the emergence of databases that organise web-scale datasets and the like – and the most recent set of upstarts dubbed NewSQL

- Enterprise use cases  for NoSQL database technology

These are also closely related to: "SQL Server Insider E-zine - Volume 4: Master Data Services: A Work in Progress"

  • Virtual Data Center E-Zine Volume 37: Maximizing Virtual Data Center Consolidation

    Virtualization may be well underway, but it doesn't mean new challenges won't arise as you continue to navigate your initiative. This expert e-zine offers detailed guidance for achieving the right balance in your virtual data center and presents key findings concerning your peers' consolidation objectives for 2012.

    Read on to discover:

    • Why not all data centers are created equal
    • What not to do when you're consolidating: Five common VM mistakes
    • How much server consolidation is enough
    • How to find the right virtual balance with optimal resource consolidation
    • And more

  • Jargon buster guide to database management

    Database management roles have long been a rich career seam for IT professionals. However, there has been, in recent years, a “Cambrian explosion” in the previously steady but sleepy world of databases.

    The relational database model, breaking the traditional dependency between data storage and applications, held sway in enterprise IT for decades, from the time of its serious commercialisation by Oracle in the mid-7os. Also hegemonic has been the language implementation of the relational model, SQL – Structured Query Language; which is of the same mid-70s vintage.

    But, in recent years, with the rise of the big data technologies of the Hadoop stack and the NoSQL databases, the data store and database scene has become more complex.

    And when it comes to the Oracle database, its creator announced it to be “autonomous” at Oracle Open World in San Francisco October 2017. What does this mean for database administrators (DBAs)? Does it mean the opening up of new roles of higher intellectual interest and value? Or does it mean redundancy and early retirement?

    As always with IT, the technology is only one-third of the story – the others being process and, crucially, people. What are the operational and organisational design problems to be solved in this more heterogenous database management landscape?

    This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.

Find more content like what you just read:

  • Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange

    This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.

    Download

  • With InterSystems Financial Services Suite, data silos are a past relic

    Consider the challenges and barriers (such as silos and time-intensive data validation processes) to effective financial services data management in this InContext Paper by Bloor. You’ll also understand how InterSystems Financial Services Solution Suite resolves these issues with a 360-degree view of enterprise and customer data.

    Download

  • Preparing a database strategy for Big Data

    This e-guide outlines the key database challenges and opportunities introduced by big data, and offers expert advice to help you successfully prepare a big data database strategy.

    Download

  • Web-Facing Applications: Mitigating Likely Web Application Threats

    In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.

    Download

  • Why NoSQL for AI-powered apps: A guide for developers

    Modern NoSQL databases incorporate multiple data access methods and encompass a variety of models including key-value, document, column, time series, graph, text search, and AI vector search. This developer’s guide explains the many advantages that are making multipurpose NoSQL databases the developer’s choice for AI-powered adaptive applications.

    Download

  • A Computer Weekly buyer's guide to application modernisation

    In this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.

    Download

  • Web-facing applications: Security assessment tools and strategies

    Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.

    Download

  • E-Guide: Achieve the benefits of virtualized mission-critical applications

    In this expert e-guide, find out about the many benefits of virtualizing your mission critical applications such as improved hardware utilization and efficiency. Also, discover where to virtualize your applications to maximize these benefits.

    Download

  • A Computer Weekly Buyer's Guide to Enterprise Open Source

    In this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.

    Download

  • A helpful way to map MITRE ATT&CK tactics to Azure actions

    Chasing down Microsoft Defender alerts and combing through Azure Monitor activity logs can be tough if you don’t know what to look for. To give you a jump start on investigations, this handy cheat sheet mapped the Azure services in which these tactics often originate, along with the actions attackers make to execute on these techniques.

    Download

  • Enterprise-wide collaboration: Make your case

    Access this expert e-book for tips on effectively implementing SharePoint with your organization's collaboration technology.

    Download

  • Why NoSQL for AI-powered applications: An architectural guide

    NoSQL databases are built to be flexible, scalable, and capable of rapidly responding to the data management demands of modern businesses, which means they can serve as the basis for AI applications that need ultimate adaptability now and into the future. Read this architectural guide now to learn more.

    Download

  • E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits

    Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.

    Download

  • Inside the successful projects that rely on NoSQL database applications

    Check out this white paper for a look inside the modern challenges that NoSQL databases address, as well as when to choose NoSQL over relational and why.

    Download

  • E-Guide: Preventing and detecting security vulnerabilities in Web applications

    The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.

    Download

  • Top 10 Azure mistakes and how to fix them

    Deploying, managing, and scaling Microsoft Azure Virtual Desktop can be a complex process for technicians at any level of experience. In this white paper, browse the top 10 most common mistakes IT professionals make in Microsoft Azure.

    Download

  • Improve SQL Server performance with transformative database services

    Discover in this product overview why, as enterprises generate and store more and more operational data, they have come to rely on Microsoft SQL Server infrastructure more than ever before.

    Download

  • A comparison of Azure, AWS, and Google cloud services

    AWS, Azure, and Google are all huge names in the cloud space, offering everything from big data in the cloud to serverless computing options and more. Read on for a vendor-neutral comparison of these three providers to determine which combination – if any – best fits your organization's infrastructure requirements.

    Download

  • Developer’s guide to secure coding

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

    Download

  • IT Project: Business intelligence in the world of big data

    Old-school business intelligence (BI), although still important, is no longer at the cutting edge of modern IT projects. However, as the TechTarget 2016 spending survey shows, business intelligence is very much a priority for corporate IT.

    Download

  • Empowering your application teams with database as a service (DBaaS)

    The shift to Database as a Service (DBaaS) marks a significant stride in cloud transformation, offering unmatched scalability, performance, and security for database workloads. Read on to learn how DBaaS can alleviate your in-house teams from the intricacies of database management, empowering them to focus on innovation and strategic initiatives.

    Download

  • E-Guide: Database Tools for Auditing and Forensics

    This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.

    Download

  • Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?

    With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.

    Download

  • Expert E-zine: Who has access to your email?

    In this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers.

    Download

  • New wave BI and analytics: turning modern data stores to account

    This e-guide looks at how companies and other organisations are doing BI and analytics on the newer data stores.

    Download

  • Migrate and modernize enterprise workloads

    Read the eBook “Enterprise Priorities for Workload Migration and Modernization” to learn how AWS can help you:Lower the cost of infrastructureIncrease staff productivityReduce time to market for new featuresImprove operational efficiency

    Download

  • Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation

    This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more.

    Download

  • How a next-generation firewall prevents application-layer attacks

    The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.

    Download

  • Data modeling guide

    This document describes core elements you will use to model and handle data in Couchbase CapellaTM (or Couchbase Server). It describes the ways you can structure individual JSON documents for your application, how to store the documents with a Couchbase SDK, and different approaches you may take when you structure data in documents.

    Download

  • Data integration to support modern BI and advanced analytics programmes

    In this e-guide we discuss why data integration and preparation are the unsung heroes of modern BI and advanced analytics. More so than ever, it would seem, due to the ever-increasing volume and variety of data.

    Download

  • CW APAC: Trend Watch: Database technology

    In this handbook, focused on database technology in the Asia-Pacific region, Computer Weekly looks at the impact of graph databases and the different types of database management systems currently on the market.

    Download

  • Reducing carbon footprint and Azure costs with Nerdio

    In this case study, discover how a global leader in recycled metal products made the switch to Nerdio to improve user management and deployment efficiency, while shaving more than $3,000 each month off its Azure bill.

    Download

  • Virtual Data Center E-Zine: Volume 39: Managing Virtualization Patches

    Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming.

    Download

  • The various ways to fight new and emerging cybercrime

    Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.

    Download

  • Containers in the enterprise: Use cases and latest developments

    In this e-guide we delve into the world of containers. We discover why many enterprises appear to be intent on using the technology to support the remodelling of their legacy applications in microservices. Also, we take a look at why interest in containers has risen thanks to enterprises moving from hybrid and multi-cloud environments.

    Download

  • Storage for containers and virtual environments

    In this e-guide we give you a complete run-through of the main choices in data storage for containers, look at the essentials of virtual servers storage, plus all you need to know about storage performance in virtual server and desktop environments.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • Computer Weekly datacentre case studies

    Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.

    Download

  • A Computer Weekly buyer's guide to continuous integration and continuous deployment

    Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.

    Download

  • PKI as a service vs. legacy PKI: Understand the differences

    Along with exploring the hidden costs of legacy PKI, this infographic introduces an alternative approach to PKI management: PKI as a service. Continue on to discover six benefits of PKI as a service.

    Download

  • FAQ: Hadoop for BI and Analytics

    Because it's a relatively new technology, Hadoop is surrounded by many myths and most IT professionals have little to no experience with the big data platform. This expert E-Guide aims to dispel common Hadoop misconceptions and offers advice for how to utilize it to drive big data analytics success.

    Download

  • Private Cloud Computing E-Zine Volume 1: Private cloud computing as a business strategy

    While many enterprises have moved to the private cloud model, have they adopted it entirely, and what are the roadblocks to getting there? In this inaugural edition of our Cloud Computing e-zine, we explore company strategies for private cloud adoption, some of the benefits of this model, and the challenges of a true private cloud infrastructure.

    Download

  • Hadoop Data Management and Use Cases

    In this expert e-guide, hear from pros in the analytics space, including Wayne Eckerson, explore how organizations are beginning to integrate Hadoop deeper into operational workflows, expanding the possible use cases.

    Download

  • Web security: Important but often overlooked

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

    Download

  • E-Guide: Selecting a SIM for midmarket business

    This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.

    Download

  • Guinness World Records Goes "all in" on AWS to Manage Transformation Into Digital Media Company

    Watch this video clip to learn how Guinness World Records is leveraging their new cloud host to aid in their organization-wide digital transformation.

    Download