Your Search returned 2 results from our Editorial content

Sort By


Can Property Data Transform the African Real Estate Market?...

With the population increase in Africa, governments and the private real estate sector need to look at ways to collect and disseminate property market information...


The Sushi Effect: Random vs. Sequential I/O

When you're in a sushi restaurant, do you wait til the food comes round at random on a conveyor belt? Or do you order it from the chef and receive your food sequentially?...


Your Search returned 158 results from our White Paper Library

Sort By

Patch Management

Closing the Window of Exposure with Database Virtual Patching...

IT organizations are searching for a more efficient approach that enables quicker deployment of security patches while ensuring the safety and productivity...


Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.


Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


Database Management

"Database Activity Monitoring" chapter from "HOWTO Secure...

Read the "Database Activity Monitoring” chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press), authored by database security expert & Guardium...


Business Intelligence Software

Overcome the Top 5 BI and ETL Pain Points

This paper examines the top five process management pain points that can arise when using business intelligence and ETL. Learn how to overcome them with...

EMC Corporation

Cloud Computing

Raconteur on Security in the Cloud

This report aims to help business leaders develop a more comprehensive approach to information governance, risk and compliance to help you protect and...


Database Management

Triton Consulting: Comparing DBA Productivity An Oracle...

This study dives into six common DBA administration task areas, showing quantitatively that DB2 offers simpler administration and helps achieve time savings...


Database Management

Best practices for DB2 for Linux, UNIX, and Windows

This best practices series is practical guidance for optimizing IBM DB2 software to satisfy key business data processing needs.


Database Management

Break Free with DB2 9.7: A Tour of Cost-slashing New Features...

This e-book covers, new compression features, extensive automation features, the DB2 Workload Manager, DB2 security, XML support and PL/SQL compatibility...

Previous 1 3 4 5 15 16

Recommended for You


US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?