IT Management  >   Systems Operations  >  

Data Management

RSS Feed   
ALSO CALLED: Data Resource Management, Managing Data, Data-management, Enterprise Data Management
DEFINITION: Digital Negative (DNG) is an imaging specification that provides for long-term storage of digital photographs generated in multiple proprietary formats. The specification was released in September 2004 on a royalty-free basis by Adobe Systems. At the same time, a program was released by Adobe that converts image files from most digital cameras into DNG format.The images that a digital camera originally  … 

Data Management definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Management Reports
1 - 25 of 2706 Matches Previous Page  |  Next Page
UCAS Secures Millions of University Applications With Splunk Enterprise Security Analytics
sponsored by Splunk Services UK Ltd
CASE STUDY: The Universities and Colleges Admissions Service (UCAS) is the U.K.'s shared admissions service for higher education. They host a complex flow of sensitive, personal data. Therefore, it is important that they deliver faultless security assurance. In this case study, learn how UCAS was able to meet these security needs by adopting Splunk.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

TOPICS: 
Splunk Services UK Ltd

Neustar SiteProtect Customer Success Stories
sponsored by Neustar
CASE STUDY: DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability. In this case study, learn why organizations are turning to Neustar SiteProtect to keep their infrastructures secure.
Posted: 15 Feb 2019 | Published: 08 Feb 2018

TOPICS: 
Neustar

Consumption-based Data Management Providing Peace of Mind
sponsored by Veeam Software
WEBCAST: This webcast introduces you to consumption-based data management, a model that eliminates the need for overprovisioning while assuring supply as business needs grow. Tune in to learn how it differs from the cloud and 3 advantages of this strategy.
Posted: 15 Feb 2019 | Premiered: Jan 22, 2019

TOPICS: 
Veeam Software

Data Secrets Revealed - A Collection of Customer Stories
sponsored by Splunk Services UK Ltd
CASE STUDY: Download this e-book to explore how companies like Zillow, Domino's and Yelp are driving new, powerful and unique business insights.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
Splunk Services UK Ltd

The Rise of the Intelligent AI-Powered Business
sponsored by Box
WHITE PAPER: Gartner has predicted an 800% growth in data volume in the next 5 years, 80% of which will be unstructured. Download this white paper to learn how companies can leverage machine learning and AI to get to grips with their content and do more with their data.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
Box

Governance for Competitive Advantage
sponsored by SoftServe
WHITE PAPER: Download this white paper to learn how data governance can help to streamline data collection and organization and make it easily accessible to the people and processes authorized to use it. Uncover 3 critical components to nearly every data governance strategy inside.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
SoftServe

Totemic Enhances its Business-Critical Oracle Systems
sponsored by Cintra
CASE STUDY: Download this case study to learn how partnering with Cintra led Totemic to immediate stability improvements, rapid-response 24x7 support and Oracle commercial advisory services.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Cintra

Ensuring Data Usability and Compliance
sponsored by SoftServe
WHITE PAPER: Download this white paper to learn how you can take control of your data with a well-designed data governance policy to ensure data is organized, discoverable, and accessible for all applications.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
SoftServe

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

Aflac Adopts Splunk Platform for Analytics-Driven Security
sponsored by Splunk Services UK Ltd
CASE STUDY: Aflac is the leading provider of voluntary insurance in the U.S. Facing an increase in the volume and velocity of security threats, Aflac needed a new analytics-driven security approach. In this case study, learn about the benefits Aflac has seen since deploying Splunk Enterprise Security and Splunk User Behavior Analytics.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Splunk Services UK Ltd

What it Takes to be GDPR Compliant
sponsored by ServiceNow
WHITE PAPER: On May 25, 2018, GDPR compliance became mandatory. So, what impact does this regulation have on your business? How does it change the way you collect and store – and even define – personal data? In this e-book, ServiceNow offers insights they've gathered from working with their customers on GDPR compliance.
Posted: 13 Feb 2019 | Published: 30 Sep 2018

TOPICS: 
ServiceNow

Seamless Security Integration During a Merger or Acquisition Process
sponsored by Dell SecureWorks
WHITE PAPER: In addition to the challenges of brokering and completing a merger or acquisition, the logistics of integrating two or more businesses and closing potential risk gaps can be staggering. In this white paper, learn how a cybersecurity firm can deliver crucial expertise to facilitate a seamless integration of each company's cybersecurity program.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Dell SecureWorks

Do You Know Where your SaaS Data is Backed Up?
sponsored by AWS-NetApp
WHITE PAPER: Don't let unknown data loss threaten your business. Use this white paper to learn how to identify the gaps between your SaaS software and your backup and recovery needs.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
AWS-NetApp

Data Capital Powers Digital Transformation
sponsored by Dell EMC and Intel®
RESOURCE: 73% of those surveyed in a study conducted by Vanson Bourne agree that formulating a centralized data management and protection strategy needs to be a priority for their business. Click here to learn about a storage portfolio that will help you do so, too.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Dell EMC and Intel®

Evolving Your Security Architecture to Meet Current and Future Needs
sponsored by Dell SecureWorks
WHITE PAPER: The security of an organization is dependent on the quality of its enterprise information security architecture. A security architecture should be designed for the specific organization it's going to protect. In this white paper, learn how to define your security needs and reassess your security architecture as new threats develop.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Dell SecureWorks

Complying with the General Data Protection Regulation (GDPR)
sponsored by ServiceNow
WHITE PAPER: One of GDPR's major goals is the protection of an individual's personal data and the definition of the rules for the free movement of personal data in the EU. In order to protect personal data, businesses must understand how they use data. In this white paper, learn about how to strengthen your data protection services to comply with GDPR.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
ServiceNow

Accelerating the Analytic Timeline With Real-Time Operational Analytics
sponsored by Actian
RESOURCE: Delivering analytic insights at the speed of business depends on accelerating the analytics cycle. This approach often relies on the blending of operational and analytical data processing to enable real-time operational analytics. In this resource, learn more about the different approaches to operational analytics.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Actian

Understanding Security Ratings
sponsored by Security Scorecard
WHITE PAPER: Security ratings grade your organization on how well it protects information. In a digital world, the importance of data and your company's protection of that data parallels your income and protection of financial assets. In this white paper, learn all things security ratings including what they are and why they are useful.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Security Scorecard

The Future of Financial Services: Part 2
sponsored by ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
ComputerWeekly.com

How to Best Manage your Operational Data
sponsored by TechTarget
RESOURCE: Operational data stores and data warehouses are often both used by organizations – but they still boast distinct differences that you should understand. This is why we've created a complimentary guide where these differences are explained, and more.
Posted: 09 Feb 2019 | Published: 09 Feb 2019

TOPICS: 
TechTarget

Scalable Data Curation and Data Mastering
sponsored by Tamr
WHITE PAPER: Download this white paper to learn how data curation technology can be used to solve data mastering challenges at scale, find out where data mastering falls into the data curation process and uncover examples that illustrate the 7 key steps.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Tamr

Actian Vector up to 14x faster than Amazon Redshift
sponsored by Actian
RESEARCH CONTENT: Download this cloud database benchmark report to examine 2 relational analytical databases based on massively parallel processing and columnar based database architectures that scale and provide high-speed analytics.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Actian

Transaction Data Unification for Risk Analytics and Trade Reconciliation
sponsored by Tamr
WHITE PAPER: Download this white paper to learn about a machine learning-based platform that enables firms to solve transaction data challenges without overhauling their existing infrastructure.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Tamr

2018 Incident Response Insights Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell SecureWorks

The Complete Guide to Building Your Vendor Risk Management Program
sponsored by Security Scorecard
WHITE PAPER: Tackling the problem of vendor risk isn't made any easier by the fact that with technology solutions being added by the day, current vendor risk management (VRM) processes are not equipped to handle the growing demand of security risk assessments for new and existing third-parties. In this guide, learn how to improve your VRM program.
Posted: 08 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Security Scorecard
1 - 25 of 2706 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement