EGUIDE:
Building a data catalog is an important initiative for many IT and data management teams. But organizations shouldn't undertake a data catalog project without getting input from business users. In this e-guide, learn why data catalogs have become a core component of the data management environment, and the 10 steps to build a data catalog.
WHITE PAPER:
The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
WHITE PAPER:
VMware has drastically increased storage capacity requirements, but deduplication functionality can help reverse this effect. Read this white paper to learn how real IT shops have managed to achieve space capacity savings in the virtualized data center.
EGUIDE:
This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise business intelligence capabilities and illustrates the 12 key differentiators between MicroStrategy and Information Builders.
WHITE PAPER:
This technical white paper explores in detail the technology behind a new virtualized deployment paradigm for Java EE applications, describing not only the technology behind these advances, but also the benefits and usage.
SOFTWARE LISTING:
ASG-Rochade is a metadata management solution for large and medium-sized organizations; it is a strategic, facilitating technology that manages information about data and systems across your enterprise.
WHITE PAPER:
The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.
WHITE PAPER:
This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise BI capabilities and illustrates the 12 key differentiators between MicroStrategy and Hyperion.
WHITE PAPER:
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.