Data center capacity planning

Unstructured data News

View All News

Unstructured data Get Started

Bring yourself up to speed with our introductory content

  • unstructured data

    Unstructured data is information, in many different forms, that doesn't hew to conventional data models and thus typically isn't a good fit for a mainstream relational database. Continue Reading

  • dark data

    Dark data is digital information that is not being used. Consulting and market research company Gartner Inc. describes dark data as "information assets that an organization collects, processes and stores in the course of its regular business activity, but generally fails to use for other purposes." Continue Reading

  • Understanding artificial intelligence for retail customers

    Do you specialize in the retail vertical? Then AI should be in your domain of expertise as your customers seek to enhance their shoppers' experiences. Continue Reading

View All Get Started

Evaluate Unstructured data Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Unstructured data

Learn to apply best practices and optimize your operations.

  • Reasons to consider an object storage architecture

    Object storage allows organizations to deal with the massive amounts of data generated by IoT and AI applications, but it's not the best fit for frequently accessed data. Continue Reading

  • Features disaster recovery-as-a-service providers must offer

    A cost-effective disaster recovery as a service lets organizations of all sizes implement a dependable disaster recovery plan. Disaster recovery-as-a-service providers replicate or back up customer data to cloud data centers and then -- should disaster strike -- host and run applications remotely. There's a lot of room for disaster recovery-as-a-service providers to develop features specific to their DRaaS products, which can make sorting through those offerings daunting. Learn about the four key capabilities to look for when comparing DRaaS vendors to ensure the one you choose can handle the full range of potential disasters.

    Data that goes into cold storage is often kept for compliance and, increasingly, for big data analysis. Such data is infrequently or never accessed. Typically cheaper and lower performing than primary or secondary storage, cold storage systems are designed for storing such data. Enterprises may need to make this data warm or hot at a moment's notice, though, complicating cold storage design and increasing costs. Initially based on automated tape libraries and optical jukeboxes, cold storage systems have evolved to encompass Linear Tape File System and object storage as the amount of unstructured data has grown in recent years. Software for managing unstructured data has changed the cold data landscape as well.

    Employees often access and synchronize corporate data from a variety of consumer-grade sync-and-share services, putting the organization at risk. Enterprise-grade file sync-and-share -- available via the cloud, on premises or in hybrid modes -- includes enhancements to ensure security and compliance. Such features vary among vendors, but there are certain ones you should always look for to maintain data integrity and security.

     Continue Reading

  • Explosion in unstructured data storage drives modernization

    Increasing amounts of unstructured data are a key part of modern secondary storage environments with their distributed file systems and a scale-out object storage design. Continue Reading

View All Manage

Problem Solve Unstructured data Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Six essentials to becoming a data-driven company

    If you want to harness the power of analytics and automation to ensure your organization's relevance, you'll have to create a culture of data. Here's how. Continue Reading

  • Many say yes to NoSQL software for easing big data management woes

    In the ever-burgeoning world of big data compounded by the cloud and internet of things, NoSQL database technology is gaining popularity as perhaps a solution to scalability and performance issues that relational databases and the SQL programming language can't address. Even though the adoption rate of relational databases continues to be very high, more than one-fourth of respondents to an ongoing TechTarget survey say they've installed NoSQL systems. NoSQL software is especially useful in processing and analyzing massive amounts of unstructured and semi-structured data as well as data stored on multiple virtual servers in the cloud. Yet, in many cases, NoSQL is grossly misunderstood, partly because of its very name. NoSQL, or not only SQL, lives under the misconception that it prohibits SQL -- as in "no SQL allowed" or SQL with a slash through it. Not so. Even though some NoSQL systems are entirely nonrelational or simply avoid relational functionality, NoSQL and SQL can coexist.

    For those evaluating and considering deployment of NoSQL databases, this handbook raises enterprise and functionality issues that need to be addressed. In the first feature, consultant David Loshin explores one form of NoSQL software called graph databases, which provide an easily understandable and flexible framework for capturing, manipulating and analyzing data to help hasten development of analytics apps. In a Q&A second feature, enterprise information architect Mike Bowers says "NoSQL is completely reinventing the database from the inside out," yet many NoSQL databases lack the necessary ACID compliance. And in the third feature, consultant David A. Teich believes that in the relational versus nonrelational database tug-of-war, relations between NoSQL and SQL can indeed be symbiotic.

     Continue Reading

  • How IAM can address unstructured content security risks

    The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security. Continue Reading

View All Problem Solve