Twitter RSS Newsletter

 Get RSS Updates!

Information Technology > Data Tools

Browse through our extensive list of free Data Tools magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

Big Data Basics An Introduction to Big Data and How It Is Changing Business..
5 Ways Your VMware and Hyper-V Backups May Fail You HA technology is fantastic and is great for protecting VMs in certain situations but it..
Advanced Persistent Threat Protection for Dummies (SPECIAL EDITION) This must-read eBook explains how Advanced Persistent Threat (APT)..
SAP HANA on Cisco UCS. The Q&A An overview of how two industry leaders have come together to realize the power of in-memory computing...
Simply SQL - Free 111 Page Preview! Simply SQL is a practical step-by-step guide to writing SQL...
Professional Hadoop Solutions--Free Sample Chapter The go-to guidebook for deploying Big Data solutions with Hadoop..
SQL Antipatterns: Avoiding the Pitfalls of Database Programming Bill Karwin has helped thousands of people write better SQL and build..
Analytical Collaboration: The Whole is Greater than the Sum of Its Parts At every level of an organization, and in almost every job role,..
Five Secrets to SQL Server Availability Implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity...
Fierce Leadership: A Bold Alternative to the Worst 'Best' Practices of Business Today In Fierce Leadership, Susan Scott teaches us how to..
Seven Virtualization DR Myths As IT departments across the world move more virtualization and virtual technologies into their datacenters,..
The API Obsession An Application Programming Interface (API ) specifies how software components should interact with one another...
Disk-based Backup & Recovery: Making Sense of Your Options Learn about several methods for incorporating disk into your backup and recovery..
Increase Flexibility by Embracing Future Business and Technology Trends Forrester Report: The Future Of Business Applications Requires Both..
Professional NoSQL--Free Sample Chapter A hands-on guide to leveraging NoSQL databases..
Boost Agent Performance and Elevate the Customer Experience With Speech Analytics Help your organization uncover hidden business..
An Architecture for Data Quality Download this white paper now to learn how to address your data quality issues...
State of Marketing 2012 The findings of the 2012 ?State of Marketing? report indicate that the role of the CMO now encompasses more critical..
Innovation X: Why a Company's Toughest Problems Are Its Greatest Advantage The word innovation is one of the most widely used ? and..
Understanding DNS Terminology DNS can be hard to understand and if you're unfamiliar with the terminology, learning more about DNS can seem..
Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID Protect your network with Snort:..
4 Steps to Leveraging Supply Chain Data Integration for Actionable Business Intelligence Your supply chain is only as good as the data that..
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) You probably know about the risk of distributed denial of..
Get Smart: Strategies to Leverage Mid-Market Supply Chain Analytics New business intelligence solutions targeted to mid-market companies..
eBook: Get Smart: Strategies to Leverage Mid-Market Supply Chain Analytics New business intelligence solutions targeted to mid-market..
Retail Big Data: Past, Present & Future Building retail big data strategies on a foundation of in-store insights...
Google Analytics Essential Training In Google Analytics Essential Training, Corey Koberg shows how to use the Google web analytics platform..
Hadoop Illuminated--Free 72 Page eBook Gentle Introduction of Hadoop and Big Data..
SQL For Dummies, 8th Edition--Free Sample Chapter Uncover the secrets of SQL and start building better relational databases today!..
Top Four Worst Practices In Business Intelligence: Why BI Applications Succeed Where BI Tools Fail This paper provides insight into the top..
IT Audit Checklist: Information Security Use this step-by-step guide to conduct a productive audit of your existing enterprise security...
Extending Role Security in Analysis Services for SQL Server Secure your SQL Server Analysis Services cube more easily with standard user..
How to Leverage SRM For Supply Chain Resiliency Strong supplier relationships can provide a competitive advantage but are often not..
Making Smarter Manufacturing Decisions With Business Intelligence Get the right information to the right people at the right time...
Discovering the Unknown: Reducing the Risk of Unauthorized Access to Enterprise Applications and Resources Learn how to maintain an..
Breakthrough Data Recovery for IBM AIX Environments How new technologies are making data protection, recovery and high availability easier..
Revinetix backup and recovery solutions make protecting city data simple and affordable for Overland Park, Kansas Learn how Overland Park,..
Data Governance Strategies Helping your Organization Comply, Transform, and Integrate Learn how to successfully navigate the unknown waters..
Symantec DLP for Tablets: An Intelligent Security Decision DLP solutions designed specifically for tablets and other tablets may provide the..
Large Bank Eliminates ETL Errors with Infogix Controls Find out how Infogix Controls helped eliminate ETL errors that were causing many..
Ensuring PCI Compliance with Identity and Access Management Learn from an industry expert how to comply with the Payment Card Industry Data..
Full Data Encryption2 Full Disk without the Risk...
Analytics and Big Data for the Mid-Market The topic of “big data” has grabbed headlines over the past few years, but most of..
Mastering New Challenges in Text Analytics Learn how text analytics can help your organization gain significant, measurable benefits from..
The Shortcut Guide to Understanding Data Protection from Four Critical Perspectives What Corporate Business Leaders Need to Know about Data..
Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile data encryption should not stand-alone. Learn four essentials to..
The 'ABCs' of DaaS Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting...
PHP & MySQL: Novice to Ninja, 5th Edition--Free 57 Page Preview The Easy Way to Build Your Own Database Driven Website...
Making Open Source BI Viable for the Enterprise In this free white paper, learn how to choose the right open source BI solution for your..
Data Governance, Why It Matters to the Business Companies and government organizations of all sizes are striving to manage data as an..
Improving Business Performance through Effective IT and Business Collaboration Outlines best practices for IT and business managers to work..
10 Really Good Reasons To Use Predictive Analytics Here are 10 really good reasons predictive analytics can help your business...
How to Write a Privacy Policy for Your Website Privacy policies are considered to be one of the most important pieces of information on a..
SQLite 3 with PHP Essential Training – Free Video Training Tutorials In SQLite 3 with PHP Essential Training, Bill Weinman addresses all..
Wisdom of Crowds™ Business Intelligence Market Study®, 2012 This analyst report provides a wealth of information and analysis - offering..
7 Major Leading Applications of Business Intelligence Software Discover the depth and breadth of business intelligence applications across..
Case Study: Turn Big Data into Big Money How one company earned $3.7 million from Big Data in 60 days...
Choosing an Accounting System Must-read guide offers valuable information on selecting the right solution to meet your company's specific..
Secure and Control Data across All Mobile Endpoints Learn how CREDANT's Mobile Guardian Enterprise solution delivers advanced mobile data..
Comprehensive Business Intelligence Market Study - Summary Results from The OLAP Survey 5 Gain real-world insight into actual BI..
Memcached Technology Brief - Accelerating Web 2.0 Application Performance Learn how to dramatically improve response times for SQL, mySQL..
Generating New Revenue and Driving Growth: Eight Defining Technology Choices for Business Leaders Today's media outlets and professional..
For Data Security Professionals - Adventures in Secure Mobile Email Native iOS and Android email clients don't support much in the way of..
Enterprise Full Disk Encryption Buyer's Guide Lock down all data on a computer using full disk encryption, rendering it unreadable on lost..
Secure Corporate Data with Policy-Based Intelligent Encryption Hear about CREDANT's next-generation encryption solution, offering better..
Getting Started with Oracle Hyperion Planning 11--Free 41 Page Excerpt Oracle Hyperion Planning is one of the many products in the Oracle..
50 Minutes and 500 Dollars: Real World Solutions for PCI DSS Don't be an easy cyber target - get started with security and compliance in..
Implementing or Upgrading SAP? Don't Forget the Data: Addressing the Challenges and Risks of Data Migration The successful implementation of..
A Comparison of Business Intelligence Capabilities Sage MAS 90 ERP and QuickBooks Enterprise Solutions Learn which business management..
Best Practices and Case Studies for Standardizing on Business Intelligence Software Explore the real-world selection criteria for business..
The Impact of Business Intelligence on Financial Planning, Budgeting, and Forecasting: Aiding Insight and Confidence In Aberdeen's Financial..
A Detailed Look at Data Replication Options for DR Planning Explore the different approaches for integrating data replication into your DR..
What's inside the Box?: Multi-layer Security and Customs/ Border Protection (CBP) Learn what's inside the box — and who is sending it..
The Next Generation in Data Deduplication - Deduplication Across Encrypted Data Learn how massive storage economies can be achieved without..
Advances in Endpoint Data Security: New Technology to Meet Security, Operations and Compliance Needs Advances in Endpoint Data Security...
The Truth About Mobile Business Intelligence: Five Common Myths Debunked This white paper will examine the five common myths associated with..
The Executive Guide to Data Loss Prevention Reported data breaches increased by nearly 50 percent in 2008 and industry and regulatory..
5 Ways to Reduce Advertising Network Latency (and not keep your customers waiting) In the world of ads, latency (the length of a delay that..
Comprehensive Review of Security and Vulnerability Protections for Google Apps Find out how Google protects and secures your company's..
Connecting Foot Traffic to Cash Flow Read how retail execs have applied people counting data and analytics to improve business...
Addressing PCI Data Security Standard Requirements in Heterogeneous Environments Learn the benefits of combining Microsoft Active Directory..
Debatching Bulk Data – Free 33 Page Chapter A free sample chapter from Packt Enterprise's book: Applied Architecture Patterns on the..
Can Your Business Intelligence Environment Handle Data Growth? As companies experience rapid growth in the volume of data they maintain,..
Lost Customer Information: What Does a Data Breach Cost Companies? Organizations lose confidential customer information more frequently than..
Business Intelligence: The Strategic Imperative for CIOs The job of the CIO has changed dramatically in recent years. By providing..
The World's Best Business Intelligence Applications: Customer-Facing, Revenue-Generating BI Envision how the wide distribution of your data..
Managing Your Oracle Analytics Oracle Users: Simplify the way analytics are developed, used, managed and deployed, while leveraging your..
Trustwave 2012 Global Security Report This report for IT management in enterprise companies provides expert analysis and examples of the..
Understanding Business Intelligence and Your Bottom Line Cuts through BI mythology and hype and provides guidelines for a high-performance,..
SGI® Adaptive Data Warehouse: Building a High-End Oracle Data Warehouse Using Industry-Standard Technologies Data sets are growing ever..
PCI DSS Compliance for Restaurants Learn about a PCI security and compliance solution that can help your restaurant become hack-proof...
Report Authoring with IBM® Cognos® Business Intelligence The business value of reporting is simple: it not only communicates a..
Paraccel Analytic Database: Fraud Analytics for Financial Services Creative, interative analysis detects and halts fraud in minutes, rather..
A Strategic Foundation to Maximizing the Value of Enterprise Data Examines how an enterprise data integration platform enriches a service..
Achieving Fast ROI for BI Projects On average, organizations using Business Intelligence (BI) that responded to Aberdeen's May 2013 agile..
Access 2007: Forms and Reports in Depth In this course, author Adam Wilbert shows how to manage data entry and reporting tasks using Access..
Unleash Your Analytical Horsepower: Why User-Focused Companies Outperform Much in the same way human instinct drives our desire to adapt and..
Achieving ROI from Your PCI Investment Organizations invest considerable financial and technical resources obtaining PCI DSS Compliance. Why..
BlogNotions Business Intelligence Newsletter: Monthly eNewsletter Featuring Blogs from Industry Experts Receive the BlogNotions monthly..
Leveraging In-house eDiscovery Technology for Protecting Data Privacy, Enabling IP Protection, and Controlling Sensitive Data This paper..
Enterprise Backup and Recovery Methodologies for Oracle Overcome the unique back up and recovering challenges Oracle environments can..
2006 Annual Study: Cost of a Data Breach Lost or stolen company information can be costly, but exactly how costly? This new Ponemon..
Advanced Site Optimization: Second-Generation Digital Analytical Tools Learn how a new breed of technologies is emerging --..
ESG Report: Discovering Improved Data Protection Strategies for the Virtual World This report examines the impact that virtualization has on..
The Next Generation in ERP Software S2K Enterprise Software to Address Key Industry Requirements & Deliver Bottom-Line Results...
Getting Started with SQL Server 2008 R2 - Free Chapter Microsoft SQL Server 2008 R2 Administration Cookbook Getting Started with SQL Server..
Enabling Translational Medicine with Business Intelligence Learn about technology solutions for translational research and the requirements..
SQL Server 2008 Essential Training – Free Video Training Tutorials In SQL Server 2008 Essential Training, Simon Allardice explores all the..
6 Job Scheduling Tactics for Windows Server Sprawl Companies run many of their mission-critical processes on a growing array of Windows..
Open Source Business Intelligence: Ready to Play in the Big Leagues Real-world deployments and best practices for a less costly, flexible..
The Truth About Big Data Big Data is all the rage today. There's a lot of buzz about how it will transform your business with diagnostics..
IT Management in the Cloud: Ways to Transform IT The perception of the IT organization is shifting from a utility player to a change agent...
Mobile Analytics: Native App or Browser, That is The Question Not all mobile analytics / Business Intelligence (BI) solutions are created..
How an Integrated System Boosted a Distributor's Revenue, Productivity, and Data Access Find out how one company increased revenue by 200..
Guide: IP Telephony Network Evaluation and Risk Assessment Learn how to perform an evaluation of your network capabilities and potential..
2007 Annual Study: U.S. Enterprise Encryption Trends Identify trends in encryption use, planning strategies, and deployment methodologies in..
10 Really Good Reasons To Use Predictive Analytics Here are 10 really good reasons predictive analytics can help your business...
The New Encryption Generation: Closing the Gap Get the Complete Story on Encryption...
Wiley Big Data & Analytics -- Free 182 Page Sampler Tips and Tricks to Grow Your Business...
Cost Effective Scalability with Informatica PowerCenter8 on HP Grid on Linux This white paper details benchmark tests measuring the..
Understanding Business Intelligence and Your Bottom Line Learn how small and midsized businesses (SMBs) can benefit from BI tools...
Five Things You Need to Know About Your Users Before You Deploy BI This paper lists 5 things you need to know before you begin planning your..
Endpoint Security Strategies: Part II Aberdeen Group's endpoint data protection benchmark report identifies successful strategies,..
Exploiting Behavioral Analytics Throughout Internet Sites Learn how your web analytics data can be converted into real business value...
Authentication, Encryption & Tracking Technologies: The benefits of Utilizing Hybrid Technologies for Asset Protection Mitigate the risk..
Software Developers Guide to Loading and Analyzing Web Data If you are responsible for developing your company's online analytics, this..
Five Things You Need to Know About Your Users Before You Deploy Business Intelligence This paper lists 5 things you need to know before you..
Your Guide to Google Analytics This 41 Page Guide will take you through the entire Google Analytics product...
Securing Your Network from the Inside Outlines common causes of security threats and how adding a portable layer of protection can help to..
Leveraging Advanced BI to Increase SaaS Success This white paper will discuss the types of reporting and analysis functionality that users..
Enterprise Backup and Recovery Methodologies for Oracle Evaluate the pros and cons of Oracle's own backup and recovery applications and..
When Mobile Device Management Isn't Enough Explore common methods of data loss that cannot be prevented through MDM alone...
How the Fastest Growing Companies Use BI Fast growing companies use BI to communicate corporate strategy enterprise-wide, react to business..
Mobile Security Essentials for a Dynamic Workforce Outlines four key requirements for implementing effective and flexible enterprise-class..
Address PCI DSS Requirements in Heterogeneous Environments Avoid stiff penalties defined by PCI DSS and maintain consumer trust of payment..
Taking the Mystery Out of High Productivity Hybrid Cloud for Web and Mobile App Development Learn from industry experts about the amazing..
How to Launch a Data Governance Program Key information and practical guidelines including a checklist to evaluate your technology..
Ensuring the Quality of 'Data in Motion': The Missing Link in Data Governance Discover why Infogix's solutions for data governance have..
Improving Corporate Performance with Business Intelligence Software Learn how business intelligence (BI) can improve corporate performance..
MVC Frameworks for Building PHP Web Applications In this course, author Drew Falkman tours four open-source PHP frameworks: Zend, Symfony,..
Worst Practices in Business Intelligence: Why BI Applications Succeed Where BI Tools Fail Learn to identify and combat the four worst..
IBM Cognos® TM1® IBM Cognos® TM1® provides complete planning, budgeting and analysis with advanced personalization and..
Lower R&D IT Support Costs with Improved Scientific Data Integration and Management A must-read for IT departments in today's science-driven..
PostgreSQL 9 with PHP Essential Training In this course, author Bill Weinman shows how to architect PostgreSQL databases and integrate them..
How R&D Lab Data Integration Drives Better, Faster Decisions Improve the productivity of your analytical lab to make better R&D decisions,..
Enterprise Full Disk Encryption Buyer's Guide This security technology locks down all laptop and desktop data if a system is lost or stolen...
Storage Source Magazine This newly premiered publication is a one-stop source for storage strategies and management, offered exclusively by..
Best Practices for Implementing In-Store Analytics in Bricks and Mortar Retail In this white paper, they'll explore in-store analytics..
Mobile Security: More than Just Encryption Outlines four key requirements for implementing an effective and flexible enterprise-class mobile..
IBM® Cognos® Insight Independently explore, visualize, model and share insights without IT assistance...
Raising the Hyper-V Backup Standard Find out how enterprises using Microsoft Hyper-V can now leverage the power of Veeam Backup &..
Do's and Don'ts: Embedding Open Source BI in Mission Critical Applications Insider tips to evaluate Open Source Business Intelligence and..
Improving Collections Recovery Rates with Employment Data Integration Learn how employment data can be leveraged to improve collections..
Private Clouds for Oracle Databases Learn how private clouds for databases can provide the benefits driving cloud adoption while removing..
Testing and Monitoring Data Warehouse: The Critical Role of Information Controls Find out how Infogix Information Solutions address..
Cost-Effective Business Intelligence as a Service Read this white paper to learn about the keys for successfully building and deploying..
Supercharge Your Web and Mobile Application Development with High-Productivity Hybrid Cloud This webinar features industry experts..
Putting Metadata to Work to Achieve the Goals of Data Governance Examines the business advantages of effectively managing metadata to..
SPSS Statistics Essential Training- Free Video Tutorial In SPSS Statistics Essential Training, author Barton Poulson takes a practical,..
Understanding and Investing in Information Intelligence In this paper ESG's Senior Analysts, Brian Babineau and Katey Wood, describe why..
A Detailed Look at Data Replication Options for Disaster Recovery Planning Provides a technical overview and high level considerations for..
How to Build Interactive Scorecards, Dashboards and Business Reports with MicroStrategy Learn about this revolutionary business intelligence..
Microsoft Data Protection Manager 2010 Administration - Free Chapter from Microsoft Data Protection Manager 2010 DPM Overview provides an..
Who Leads in WLAN Security? Comparative evaluation of vendor offerings and positioning in the WLAN security market, including security issue..
Payment Card Trends and Risks for Small Merchants Learn about the top data risks faced by smaller businesses, and why PCI compliance is..
Solution Brief - Consolidated Backups Learn how a centralized backup to disk solution can alleviate the risks associated with distributed..
A Prescription for Healthcare: Optimize Performance and Quality Now Learn how to make strategic management goals a reality through real-time..
Long Term Data Retention: 5 Key Considerations Managing backup and recovery in today's environment is a multi-dimensional challenge with..
PCI Compliance & Security in a Franchise Model This white paper explores the dangers posed by non-compliance with Payment Card Industry Data..
Empowering Retail Intelligence Through Business Analytics A new context for measuring retail performance...
Access 2010: Forms and Reports in Depth In this course, author Adam Wilbert shows how to manage data entry and reporting tasks using Access..
Meeting Data Residency and Compliance Challenges in Global Enterprises This paper examines information privacy and data residency solutions..
Ten Pillars of Oracle Pillar Data Systems will give you ten good reasons to pair your Oracle Environment with the Pillar Axiom®...
FierceBigData Subscribe to FierceBigData to stay up-to-date on data management and analytics, data architecture, information management,..
Fixing the Top 5 Compliance and Security Challenges in Hospitality Best practices for hotels, restaurants and retail businesses...
Lockdown: Secure Your Data With True Crypt Encryption is the process of protecting data by using an algorithm to scramble it...
KVM over IP and Financial Data Security Gain valuable insight into how to achieve information security in the advent of Sarbanes-Oxley Act...
50 Uses For Live CDs What's a live CD? It's an entire operating system, on a CD...
Prescription for Essential Data Protection and Security Learn how a secure wireless networking solution reliably maintains critical data..
Interactive Data Visualization: Strategies and Key Technologies The human desire for exploration has found a welcome conduit in interactive..


Privacy Policy | FAQ | Legal Notices
Copyright © 2014 NetLine Corporation. All rights reserved.