Skip to main content
 

database development

Results 1 - 25 of 29Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Aug 01, 2018
The Zero Data Loss Recovery Appliance’s benefits are compelling for any enterprise with a need to protect critical Oracle databases. The differences between this database recovery appliance and other approaches to data protection are stark. The Recovery Appliance leverages a combination of existing proven technologies and new developments that eliminate data loss and improve recovery. The elimination of periods between backups when database changes are not captured is also a major benefit, and the movement to a process of frequent or constant incremental backups provided by this appliance changes the game.
Tags : 
    
Oracle
Published By: NetApp     Published Date: Aug 30, 2016
Would you like to accelerate your database application development by up to 50%? It’s easy with NetApp® all-flash technology. Watch this two-minute video to learn how flash storage can help you respond faster to change and keep pace with the dynamic demands of your business.
Tags : 
    
NetApp
Published By: IBM     Published Date: Sep 22, 2011
Learn how your organization can take advantage of recent breakthroughs to lower the cost of data management.
Tags : 
ibm, db2, data management, database, technology, storage, development
    
IBM
Published By: Delphix     Published Date: Feb 28, 2013
Agile Data Management eliminates the common barriers to successful agile development, reducing both the cost and the risk of short, parallel development projects. This paper discusses common challenges and the technical solutions for addressing them.
Tags : 
database virtualization, roi, data management, data management software, agile development, application development
    
Delphix
Published By: Delphix     Published Date: May 28, 2015
"Security-conscious organizations face a gap between current requirements and capabilities as they relate to data masking. Data volumes are growing exponentially and the risk of data leaks continues to make news, yet many organizations rely on inefficient, legacy approaches to protecting sensitive data. In contrast, top performing companies are turning to virtual databases and service-based masking solutions to ensure that data management functions can keep up with software development.
Tags : 
    
Delphix
Published By: Riverbed     Published Date: Jun 01, 2015
With more powerful software and hardware, SteelFusion 4.0 consolidates all IT at the branch into the data center for instant branch provisioning and recovery, full security and visibility, and apps that simply work.
Tags : 
application, data, mobile, infrastructure, virtualization, database development, data integration
    
Riverbed
Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application
    
Quest Software
Published By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.
Tags : 
security, patch, data, regulatory compliance, application security, compliance, intrusion prevention, database development
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application, analytical applications, database development, database security
    
Lumension
Published By: IBM     Published Date: Jun 21, 2017
There are many types of databases and data analysis tools to choose from when building your application. Should you use a relational database? How about a key-value store? Maybe a document database? Is a graph database the right ft? What about polyglot persistence and the need for advanced analytics? If you feel a bit overwhelmed, don’t worry. This guide lays out the various database options and analytic solutions available to meet your app’s unique needs. You’ll see how data can move across databases and development languages, so you can work in your favorite environment without the friction and productivity loss of the past.
Tags : 
data analysis, key value, document database, analytics
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Basho     Published Date: Apr 07, 2015
bet365 is one of the world’s leading online gambling groups with over 14 million customers in two hundred countries. Recently, bet365 chose Riak, the NoSQL distributed database to ensure scalability and reliability for their site. Get a better understanding of how to choose the right database solution directly from Dan Macklin, Head of Research and Development at bet365. Join us for this On Demand webinar to learn about: • bet365's evaluation process • The business and technical challenges addressed • Triumphs achieved by migrating to Riak • Lessons learned and Dan Macklin's advice for anyyone evaluating their database requirements Download to watch this On-Demand webinar to learn why Riak chose bet365.
Tags : 
basho, riak, database infrastructure, bet365, unstructured data
    
Basho
Published By: Cisco     Published Date: Jan 05, 2016
In the time it took you to download and open this eBook, you could have spun up and configured hundreds of virtual machines in a public or private cloud, deployed your application, database, middleware, messaging, load balancers, storage, and other components to those configured servers, linked them all together, and had your app live in production - all with a single click. This isn’t the future we’re describing, it’s right now, and thousands of development teams around the world are doing it. At a high level, we’re describing automation that cloud and APIs enable, and at a low level, we’re describing the outcome of adopting a DevOps mentality and the associated tools. This eBook will look at the basics of DevOps automation, and configuration management to get you started down the right path.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
In the time it took to download and open this eBook, you could have spun up and configured hundreds of virtual machines in a public or private cloud, deployed your application, database, middleware, messaging, load balancers, storage, and other components to those configured servers, linked them all together, and had your app live in production - all with a single click. This isn't the future we're describing, it's right now, and thousands of development teams around the world are doing it. At a high level, we;re describing automation that cloud and API's enable, and at a low level, we're describing the outcome of adopting a DevOps mentality and the associated tooks. This eBook will look at the basics of DevOps, automation and configuration management to get you started down the right path.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing, business optimization
    
Cisco
Published By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: NetApp     Published Date: Jun 27, 2016
Would you like to accelerate your database application development by up to 50%? It’s easy with NetApp® all-flash technology. Watch this two-minute video to learn how flash storage can help you respond faster to change and keep pace with the dynamic demands of your business.
Tags : 
    
NetApp
Published By: HP     Published Date: Aug 21, 2009
Read this guide to learn how HP works closely with organizations throughout the entire consolidation process which results in reduced costs, improved database administration, enhanced service levels to end users, and improved communication/collaboration.
Tags : 
data management, database development, dba, database administration, collaboration, service levels, database consolidation
    
HP
Published By: Objectivity     Published Date: Aug 21, 2009
This paper is an overview of the issues that arise from implementing object persistence with a relational database. The basis for this paper is our recent experience with Object-Oriented projects that used relational database technology.
Tags : 
c++, database development, web services, object oriented, database administrator, database administration, dba, objectivity
    
Objectivity
Published By: Objectivity     Published Date: Aug 21, 2009
There is often a great deal of confusion in determining whether an object database management system (ODBMS) is right for you. Most of this confusion can be resolved by focusing on your application's requirements. In those situations where the application requires the very clear advantages of an ODBMS, choosing which ODBMS becomes a continuation of the exercise of analyzing those application requirements.
Tags : 
database performance, object-oriented, database development, objectivity
    
Objectivity
Published By: Objectivity     Published Date: Aug 21, 2009
As business users expand to newer types of applications, and grow older ones, their attempts to use RDBMS encounter the "Relational Wall," where RDBMS technology no longer provides the performance and functionality needed. This paper measures the wall, explains what model and architectural differences cause it, how to foresee it, and how to avoid it.
Tags : 
database, rdbmss, object, object-oriented, object oriented, database performance, database development, database architecture
    
Objectivity
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
This no-nonsense primer covers the benefits and basic principles of good testing, offers practical advice for getting the most out of your testing efforts, and pinpoints several areas where automation will help you achieve the most cost-effective results.
Tags : 
software testing, quality assurance, application testing, test and measurement, database development, quality assurance, scripting, software testing
    
SoftLanding Systems
Published By: SoftLanding Systems     Published Date: Dec 04, 2006
This white paper describes five practical steps that you can take to make your development process more predictable and reliable. By following his five steps, Paul maintains that you can build better software more quickly with less cost and less risk.
Tags : 
software development, lower cost, application development, database development, streamline, streamlining, build software, cost control
    
SoftLanding Systems
Published By: 2dev     Published Date: Jan 29, 2007
The goal of this series of articles is to help DBA's having a basic understanding of Oracle's Application Server.
Tags : 
software development, oracle, database, database security, oracle application server, database administrator, dba, database development
    
2dev
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.