Data Categorization Reports

Information-Centric Security and Data Erasure
sponsored by EMC Corporation
WHITE PAPER: Most data security spending today goes to protecting devices and infrastructure, while little goes to protecting the stored data itself. In this white paper ESG analysts discuss the particulars of information security and data erasure.
Posted: 26 Sep 2006 | Published: 01 Jul 2006

EMC Corporation

The Human Face of Big Data: Pulse of the Planet
sponsored by TechTarget ComputerWeekly.com
BOOK: Big Data is about to radically transform our understanding of the planet, writes entrepreneur and commentator, Esther Dyson.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

TechTarget ComputerWeekly.com

Best Practices for Microsoft SQL Server 2005 on HP Integrity Superdome Servers for Very Large Database (VLDB) BI Solutions
sponsored by Hewlett Packard Enterprise
PRODUCT LITERATURE: Deploying an enterprise data warehouse on the proper server allows admins and architects to focus on business problems instead of worrying about performance. Read this white paper to learn the best practices for data warehousing and business intelligence.
Posted: 18 Sep 2007 | Published: 01 Dec 2006

Hewlett Packard Enterprise

A Smarter Approach to Archiving
sponsored by IBM
WHITE PAPER: Read this paper to learn how IBM is applying its expertise, global scope, and creativity to build the information backbone of twenty-first-century industries and public institutions. Continue reading to learn the benefits that a smart archive strategy can provide for your organization.
Posted: 30 Nov 2010 | Published: 30 Nov 2010

IBM

Crafting a Data Lifecycle Management Strategy to Control Capacity
sponsored by Iron Mountain
EGUIDE: Jon Toigo, Chairman of the Data Management Institute, explains how information lifecycle management (ILM) strategies can help classify data and control capacity by allocating it to the appropriate storage. Discover how recent improvements in ILM can enable your enterprise to truly benefit from implementing this strategy.
Posted: 08 Aug 2016 | Published: 03 Aug 2016

Iron Mountain

Advanced Case Management for Government
sponsored by IBM
WHITE PAPER: How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

IBM

Maximizing your enterprise data storage capacity: Improve efficiency and utilization
sponsored by Dell Compellent
EGUIDE: This tutorial from SearchStorage.com explores different backup tools that can improve the efficiency and utilization of your IT infrastructure by getting the most out of your storage capacity. Backup methods discussed in this tutorial include SRM tools, tiered storage models, classification and migration tools, thin provisioning and more.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Dell Compellent

Big Data: 8 Considerations for Choosing an Infrastructure to Hold It All
sponsored by FileTek, Inc.
EGUIDE: This expert E-Guide explores what's driving the big data movement, and cutting through vendor hype and overreaction. Read now to learn more.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

FileTek, Inc.

Anatomy of an Archiving Project
sponsored by Princeton Softech
WHITE PAPER: Effective enterprise data management strategies that include archiving provide a full-lifecycle approach for managing enterprise application data. Learn how archiving data enables you to improve performance, control costs and minimize risk.
Posted: 08 Jan 2007 | Published: 01 Dec 2006

Princeton Softech

Data Protection 101: Essential Steps for Holistic Information Security
sponsored by TechTarget Security
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

TechTarget Security