ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Quality Research

  • 10 Practices for Using Veeam Backup & Replication

    Sponsored by: Veeam Software

    Watch this webinar to get insight and advice on the different roles, components and process flows for Veeam Backup & Replication™ and learn how to get much more out of your investment by correcting mistakes or by avoiding them all together.

  • Big Data Engineering for Machine Learning

    Sponsored by: Qubole

    While machine learning and AI have made big data much more accessible and actionable, the large volume of data that these tools utilize has created a totally new problem. Read this white paper to learn how Quoble’s cloud data platform allows you to build your data pipelines how you want to, using a variety of different engines.

  • Top 10 Best Practices for vSphere Backups

    Sponsored by: Veeam Software

    This white paper discusses best practices with Veeam Backup & Replication™ and VMware vSphere, such as planning your data restore in advance, keeping track of your data backup software updates, keeping your backup tools up-to-date, and much more!

  • Taking Control of Your Office 365 Data

    Sponsored by: Veeam Software

    This short, easy-to-read analyst report by 451 Research provides their view on the importance of backing up your Office 365 data.

  • Vendor Landscape for Data Science and Machine Learning Platforms

    Sponsored by: Dataiku

    The number of data science platforms available has explosively gown along with the market. While that means that there is a remarkable number of data science platforms available, not all of these were created equal. Read this Gartner Magic Quadrant to learn which vendors are most likely to provide you with quality solutions.

  • Unification and Pipelining Patterns in the Digital Economy

    Sponsored by: TIBCO

    Data has become more widespread than ever, frustrating organizations as they try to manage all of it. Adding to these problems, the switch from on-prem infrastructure to the cloud has added another level to this data nightmare. Read this analyst report to learn what data challenges organizations face today, and how they’re dealing with them.

  • Field Report: TIBCO EBX for Reference Data Management

    Sponsored by: TIBCO

    The data that you use to unlock and govern access to your database might be stored on a RDBMS, spreadsheet, or some other medium; increasingly, these storage methods are becoming outdated and posing compliance, governance, and quality risks. Read this white paper to learn what reference data management options you should be considering.

  • Market Overview for Master Data Management Solutions

    Sponsored by: TIBCO

    Master data management (MDM) solutions are necessary to almost any enterprise of any size; yet even in light of this reality, they are often expensive and complex. Now, however, MDM solutions are becoming less complex, less expensive, and more agile. Read this Garnet Magic Quadrant to learn which market options are best for your business.

  • Data on the Move

    Sponsored by: Rubrik

    Data management has only become more challenging as data becomes more voluminous, more mobile, and more accessible in a company. Read this white paper to learn about the current state of data governance and how your company can use Rubrik to help with an app that’s designed to discover, classify, and report sensitive data across the enterprise.

  • The Role of Cloud Backup and Recovery in Protecting Against Ransomware Attacks

    Sponsored by: Rubrik

    Neither traditional nor native no relational database tools deliver the necessary backup and recovery capabilities required to protect against ransomware. Dive into this ebook to research a solution meant to work with non-relational databases and applications while filling in 5 key gaps left by traditional backup and scripted solutions.

  • Hackers are Always a Step Ahead

    Sponsored by: Asigra

    Download the following paper to learn how Asigra can work with your MSP to thwart cyber-attacks and to view 5 ways they can “convince” hackers not to target your organization.

  • A Computer Weekly buyer's guide to data protection

    Sponsored by: ComputerWeekly.com

    Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.

  • How to unlock the true value of data

    Sponsored by: ComputerWeekly.com

    With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.

  • Comprehensive Ransomware Protection: Detection, Response, and Recovery

    Sponsored by: Datto, Inc.

    28% of MSPs reported ransomware attacks in SaaS applications, such as Office 365, G-Suite, and Dropbox.So how are you going to stop it?Access this white paper to see the 3 elements of a comprehensive ransomware solution that can quickly help your business and your customers get back up and running should a ransomware attack occur.

  • Top 5 Data Science Industry Predictions for 2020

    Sponsored by: Dremio

    The new decade promises to be a big one for new technology developments; what, exactly, does 2020 hold for the data science industry? Watch this webinar to learn 5 predictions for data science in 2020, including changes to the IoT, big data architecture, cloud data lakes and warehouses, and more.

  • Actualize Your Microsoft SQL Data Value with PowerProtect DD

    Sponsored by: Dell EMC

    Download this solution brief for an exclusive look at Dell EMC’s PowerProtect DD, with which you can maximize the value of your Microsoft SQL data and take advantage of grow in-place scalability, extended VMware support, and more.

  • Vectorized Query Processing Using Apache Arrow

    Sponsored by: Dremio

    Apache Arrow is popular for many reasons: it can interact with a variety of languages, is an open source project, and facilities speed within your database. It is a versatile tool that can be used to maximize hardware functionality and utilize vectorized query processing.Watch this webinar to learn more about vectorized query processing.

  • Take Manufacturing to the Next Level with Industrial Analytics

    Sponsored by: Hitachi Vantara

    Manufacturing companies have used data and the IIoT to automate processes and improve their overall productivity—but you need an effective industrial-level data management system. Read this white paper to learn the key capabilities necessary for quality manufacturing data management, and the benefits analytics could provide your business.

  • The Changing Role of Backup and Secondary Storage

    Sponsored by: Veeam Software

    Designing an enterprise backup system is a complex process where customers need to gather requirements, evaluate multiple solutions, and do their homework to acquire the expertise to deploy it themselves. Read this white paper to learn how HCI can alleviate the strains of traditional, multi-vendor backup environments.

  • Veeam + HPE Nimble Storage: Five-Year ROI of 278%

    Sponsored by: Veeam Software

    IDC interviewed organizations supporting their data backup and recovery environments with Veeam Cloud Data Management software combined with HPE Nimble Storage to see how it performed. Read this IDC white paper to learn the 8 benefits of this combined solution and see the results that customers experienced.

  • Deep dive into Veeam Backup for Microsoft Office 365 & RESTful API

    Sponsored by: Veeam Software

    Without a backup solution in place, your Office 365 data is vulnerable to limited control of data, security vulnerabilities, and regulatory exposure. Access this webcast to learn the breakdown of the Office 365 Shared Responsibility Model and hear about a flexible, easy to use solution that also protects One Drive and SharePoint data.

  • Creating a Secondary Perimeter to Detect Malware in Your Enterprise

    Sponsored by: Asigra

    Download the following DCIG report to learn how to recover with confidence from malware, with key discussions on 3 methodologies to detect malware in backups, malware’s primary sources of revenue, key attributes to ongoing malware detection/prevention, and more.

  • Fundamental Considerations of Moving to the Cloud Data Lake

    Sponsored by: Dremio

    Moving data to the cloud could result in downtime and other issues. However, moving to the cloud offers several advantages including scalable storage, centralizing data, and more.Read this article to learn the essential considerations you must make when deciding if you should switch your business to the cloud, and the ways in which Dremio can help.

  • One of the potential uses for Dremio

    Sponsored by: Dremio

    Most modern databases aren’t made up of one single source. Instead, many organizations find themselves storing data across disparate sources. This structure can make it difficult to integrate your data without losing quality and efficiency. Open this guide to read about how Dremio allows you easily work with two sources at once.

  • Simplifying Data Pipeline

    Sponsored by: Dremio

    When it comes to your data pipeline, you want to optimize your data queries and let your analysts to focus on what they do best—analyze data, not retrieve it. Watch this webcast in which Dremio explains their Data Lake Engine and how it can organize your data, customize its curation, and track its linage while removing barriers to query speed.

Browse by Report Type: Data Quality White Papers | Data Quality Multimedia | Data Quality IT Downloads

See more topics related to: Data Quality

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.