Data Base Management Reports

Computer Weekly – 9 April 2019: Using data science at Sainsbury's
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 Apr 2019

TechTarget ComputerWeekly.com

Big Data and Analytics Applied to Oil and Gas
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Companies that leverage data to optimise business processes will not only survive, but thrive during market downturns, and dominate the industry on the next upswing, this report from Quorum argues.
Posted: 08 Feb 2021 | Published: 19 Sep 2017

TechTarget ComputerWeekly.com

Don't Rush into Cloud Databases without a Well-Grounded Plan
sponsored by Data Intensity
EGUIDE: In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.
Posted: 17 Apr 2017 | Published: 07 Apr 2017

Data Intensity

Keys to a Successful SAP HANA Implementation
sponsored by Pure Storage
EGUIDE: This two-part e-guide provides a high-level description of SAP HANA, including listing key features, major components, and available editions and trials. In part two, learn the steps to successfully install SAP HANA.
Posted: 03 Jun 2016 | Published: 02 Jun 2016

Pure Storage

The Challenges of NoSQL Architecture, According to IT Pros
sponsored by Rackspace Technology
EGUIDE: In this expert e-guide, explore insights from a series of IT leaders and data management consultants about the current readiness of NoSQL technology for enterprise-level tasks, such as business intelligence and big data applications.
Posted: 25 Feb 2016 | Published: 22 Feb 2016

Rackspace Technology

Key Considerations for Choosing a NoSQL DBMS
sponsored by Rackspace Technology
EGUIDE: In this expert e-guide, learn about the four main types of NoSQL DBMSes, their uses, the pros and cons of NoSQL, and DBMS use cases. Additionally, learn 6 other factors to consider when choosing a NoSQL DBMS option.
Posted: 25 Feb 2016 | Published: 19 Feb 2016

Rackspace Technology

Ten Ways to Stop a Ransomware Threat Targeting Healthcare Data
sponsored by Cisco Umbrella
EGUIDE: Ransomware attacks are up across the board, but not many organizations are as vulnerable to targeted ransomware attacks as healthcare organizations. Uncover 10 ways that you can stop a ransomware threat from targeting your healthcare data, as shared by health IT expert Reda Chouffani.
Posted: 24 May 2017 | Published: 24 May 2017

Cisco Umbrella

Expert Advice on Today's Database Market
sponsored by TechTarget Data Management
EZINE: Read this special edition of Business Information for advice from data management consultant and author Craig S. Mullins on today's database market. Learn about new data types which call for new approaches, like storing data in memory instead on of disk, or turning to NoSQL technologies.
Posted: 06 May 2015 | Published: 06 May 2015

TechTarget Data Management

Can Containers Save Your Legacy Applications?
sponsored by Oracle Corporation
EGUIDE: As container technology continues to mature, enterprises see the value in using them to modernize legacy apps. Others are realizing that the use cases are still somewhat limited. In this e-guide, learn how your organization can leverage containers and whether your needs align with the technology's capabilities.
Posted: 27 Oct 2017 | Published: 20 Oct 2017

Oracle Corporation

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM