ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Software White Papers

  • Dremio Security Architecture Guide

    Sponsored by: Dremio

    Because data sets and analytics systems are valuable targets for cybercriminals, it is important that your data access and analysis systems provide a variety of security options so that you can protect your organization’s data from potential threats. Read the attached guide to see some security choices that the data lake engine Dremio offers.

  • SolarWinds Isolates Database Problems Even When Everything Is Virtual

    Sponsored by: SolarWinds, Inc.

    These days, database issues, ones that often affect applications, are not so straightforward to identify. Is the issue in the database, or your cloud service, or your virtual machine, or something else? Examine Solarwinds’s portfolio of solutions to see how they help you understand the full breadth of your database infrastructure.

  • AI & Automation: Turning data into insights

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the trends that are shaping the demand for AI and how organizations including healthcare service providers and F1 racing teams are leveraging technology on their own terms.

  • Creating a Multi-layered Secured Postgres Database

    Sponsored by: EDB

    Creating a database with multiple layers of security isn’t easy; and in today’s world of malware, strict data regulations, and cybercrime, data security is more important than ever. Watch this webinar to learn how you can create a multi-layered security architecture for your Postgres database, with authentication, authorization, auditing, and more.

  • Security Best Practices for PostgreSQL

    Sponsored by: EnterpriseDB

    Securing your PostgreSQL database is a multifaceted undertaking that involves evaluating everything from physical security to authentication protocols. Read this EnterpriseDB white paper to learn PostgreSQL security best practices as well as how to implement them in your own database.

  • Your Guide to a Successful Proof of Concept

    Sponsored by: Matillion

    Once you’ve invested in a cloud data warehouse, you’re still only halfway to solving your database management problems like data silos. Read this guide to learn how you can use a proof of concept strategy to test the cloud data warehouse tools you’re considering. Make sure you’re investing in the right solutions for your next step in the cloud.

  • How to Become a Google Certified Professional Data Engineer

    Sponsored by: Global Knowledge

    To help ensure the industry can keep up with the current Google Cloud Platform, Google has created the Google Certified Professional - Data Engineer certification. Read this certification prep guide to learn the benefits of becoming certified, view the exam guide, and access recommend courses.

  • Building Secure Software in a Complex Environment

    Sponsored by: MongoDB, Inc.

    While the primary goal of databases like MongoDB is to make data accessible and easy to work with, it would be pointless to have a database that is perfect to keep data on and vulnerable to cyberattacks at the same time. Read on to learn how MongoDB was able to build security into their scalable, accessible database.

  • From out of Nowhere: The Unstoppable Rise of the Data Catalogue

    Sponsored by: Alation

    What is a data catalog and how can it help your organization? View this research report to find out. Explore popular data catalog adoption trends, and decide if a data catalog is right for your organization.

  • How to Design for Database High Availability

    Sponsored by: EDB

    For many businesses, employees and customers need 24/7 access to mission critical data. This reality means that high availability databases aren’t just a perk—they’re an absolute must. Explore this webinar to learn how you can implement a high-availability Postgres database in your business, complete with monitoring, failover management, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.