A Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
A Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

A 15 Minute Guide to Enterprise Content Management by  EMC Corporation

March 01, 2008 - Learn how to manage all the unstructured content in your organization. This 15 Minute Guide to Enterprise Content Management shows how to turn content into an asset for making faster decisions, winning and keeping customers and improving workflow.


A 15-Minute Guide to Collaborative Case Management by  EMC Corporation

April 01, 2008 - In about 15 minutes, learn how collaborative case management can be applied across a variety of case management types, become familiar with the components of a successful collaborative case management solution and gain insight on deployment.


A 15-minute Guide to Interactive Content Management by  EMC Corporation

March 01, 2007 - Interactive content management (ICM) is a set of technologies for managing the production process and content types that deliver compelling communications.


A 15-minute Guide to Service-Oriented Architecture and ECM by  EMC Corporation

March 01, 2008 - SOA defines a type of architecture for building business applications as a set of loosely coupled components or "services" that are linked together via business processes.


A 360° Approach for Analyzing the Voice of the Customer Across Multiple Communications Channels by  Verint Systems

November 03, 2011 - The way you strategize your customer service and interactions is changing thanks to abundance of ways for your customers to reach your business. Read this white paper to learn how to adapt to these changes.


A Bathwick Group white paper: A foundation for database simplification, consolidation and cost reduction by  IBM

November 09, 2011 - This white paper challenges several assumptions about scale-out architectures and explains how consolidation and virtualisation can help you regain control over your infrastructure.


A Beautiful, Cloudy Forecast: Research shows business potential in cloud-based predictive analytic solutions by  Teradata

June 21, 2012 - <p>Predictive analytics and cloud solutions are changing the way organizations do business. But what about predictive analytics in the cloud? Check out this article by industry expert James Taylor on the concerns and benefits regarding cloud-based predictive analytics and learn about companies that have experienced the impressive results. </p>


A Best Practice Guide to Family Office Technology by  Advent Software, Inc

November 08, 2010 - Packed with practical tips and actionable guidance, this 16-page report covers all of the key technology systems that family offices need to evaluate—along with the pros and cons of each and tradeoffs to consider. It’s a must-read for any family office looking to build competitive advantage in today’s environment.


A Better Approach to Managing File System Data by  EMC Corporation

August 03, 2005 - File system data is growing at a staggering rate, putting pressure on data access, storage and legal requirements. This white paper explores these challenges and presents a solution for managing growing file system data.


A Better RAID Strategy for High Capacity Drives in Mainframe Storage by  Oracle Corporation

December 21, 2010 - This paper demonstrates that RAID 6 is less capable to prevent data loss with today's large capacity SATA and SAS HDDs. It will also share Oracle's designs to mitigate this risk. The integrity of customers' data is in jeopardy if these large capacity SATA/SAS HDDs are simply packaged into a RAID 6 group without additional mitigation.


A better way to deliver health and social care by  IBM

September 30, 2013 - Access this white paper to learn how the right toolset can help healthcare organizations leverage existing data sources to address changing needs and implement new services faster. Learn how integrating advanced analytics into your care management capabilities can drastically improve insight and efficiency.


A Better Way to Manage Data in Virtualized Environments by  CommVault Systems, Inc.

January 15, 2009 - CommVault Simpana Software directly addresses all the challenges of data management in a virtualized environment, with the same granularity, flexibility, consistency, and reliability available to physical environments.


A Better Way to Manage Data in Virtualized Environments With CommVault® Simpana® Universal Virtual Server Agent by  CommVault Systems, Inc.

January 20, 2010 - CommVault offers leading solutions that work from remote office to data center and unique integration with leading storage technology vendors to help leverage the tools you already deploy in your enterprise. Server virtualization demands flexibility that only CommVault can deliver.


A BI Agenda for Midsize Organizations: Six Strategies for Success by  IBM

January 15, 2009 - Make informed decisions at a lower cost with the right BI strategy.


A Blueprint for Reducing Energy Costs in Your Data Center by  HP India

June 25, 2009 - Improving energy efficiency is possible in nearly any data center, often beginning with simple low-cost or no-cost measures. This white paper gives you a blueprint for reducing those data center energy costs.


A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing by  Trend Micro, Inc.

June 29, 2011 - This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.


A Brazilian company adopts IBM System z to handle rapid business growth by  IBM

May 29, 2013 - This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.


A Breakthrough Approach for Efficient IT Service Delivery by  IBM

June 01, 2008 - Organizations in every industry are exploiting advanced technologies to gain a competitive advantage. In this whitepaper learn about IBM's vision for the new enterprise data center which offers an evolutionary new model for efficient IT delivery.


A Breakthrough in Service Delivery for Data Center Workloads by  IBM

June 25, 2009 - Watch this Webcast as IBM reveals new offering that can sustain ongoing cost reduction while improving service levels over the long term.


A Brief Look at Application Performance Management by  CA Technologies.

January 10, 2014 - Businesses rely on delivering applications on a wide array of platforms. This brief video explains the importance of application performance management and how it can help your business.


A Business Guide to MPLS IP VPN Migration: Five Critical Factors by  XO Communications

April 30, 2012 - Uncover five critical factors for a successful migration to an MPLS IP VPN service in this whitepaper. Learn the evolving needs of today’s enterprise networks and uncover how an MPLS-based IP VPN can help you fulfill these wants and needs.


A Business Intelligence (BI) Agenda for Midsize Organizations: Six Strategies for Success White Paper by  IBM Cognos

March 02, 2009 - Success in business intelligence is all about facilitating sound, data-driven decisions at every level of the business. Read this white paper to learn six strategies for BI success, drawn from the experiences of actual IBM Cognos customers.


A Business-Driven Approach to Mobile Enterprise Security by  Juniper Networks, Inc.

May 11, 2012 - Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.


A Buyer's Guide to Choosing a Cloud Service Provider by  Skytap, Inc.

September 07, 2010 - Most enterprises are now evaluating external clouds to offloadtheir dynamic IT workloads, including application development,testing, training, IT prototyping and ERP migration environments.This white paper explores the top ten requirements buyersmust evaluate to select the right cloud provider.


A Buyer's Guide to Data Loss Protection Solutions by  Websense, Inc.

July 14, 2011 - Selecting an DLP solution can be a challange and it is important to find one that provides the right amount of coverage for your business. View this guide for list of recommended features and capabilities to consider when searching for the right DLP solution.


A Buyer's Guide to Endpoint Protection Platforms by  McAfee, Inc.

April 17, 2012 - This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.


A Buyer's Guide for Software Companies Considering On-demand Financial Applications to Meet Their Business Requirements by  Intacct Corporation

July 01, 2008 - The movement to a Software as a Service (SaaS) model is placing pressure on software vendors. This paper examines the trends which are transforming the software industry and independent Software Vendors to leverage on-demand financial applications.


A Candid Examination of Data Deduplication by  Symantec Corporation

August 26, 2009 - This DCIG analyst report will provide a detailed look at the benefits, primary role and implementation methods of data deduplication.


A Candid Examination of Data Deduplication by  Symantec Corporation

August 11, 2009 - Read this white paper for an in-depth discussion of what data deduplication is, how it works, what problems it solves, and what options are available.


A Catalyst for Mission-Critical Transformation by  Intel

May 05, 2010 - IT organizations looking to improve service levels and drive down total costs for their most demanding workloads should take a closer look at the latest Intel® Xeon® processor 7500 series. Read this paper to learn more.


A CIO's Five-Point Plan for Managing Endpoint Security by  Dell KACE

June 20, 2013 - Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.


A CIO's Guide to Converged Infrastructure by  HP & Intel®

June 07, 2013 - This expert resource takes an in-depth look at converged infrastructures, detailing its core structures and concepts so that CIOs can define how their infrastructure should look, what the primary components should be and how they will need them to interact.


A CIO's Guide to Records Management Compliance by  Iron Mountain

August 20, 2012 - This e-guide explains how to formulate a solid records management policy, with help from data warehousing strategies.


A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM by  SearchSecurity.com

June 25, 2013 - In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.


A clearer horizon. Do CIOs have more clarity about cloud computing? by  ComputerWeekly.com

December 01, 2011 - This research from management consultants, Xantus, shows that while there is still a lack of clarity and a reluctance to fully commit to the cloud, there is a general acceptance from CIOs of the benefits and a growing commitment to develop those benefits.


A Clinically-Driven Approach to ICD-10 by  Nuance

February 28, 2013 - This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.


A Clinically-Driven Approach to ICD-10 by  Nuance

December 31, 2013 - This resource explores a web-based platform solution that can help healthcare facilities transition to meet the ICD-10 rollout in October, 2015.


A closer look at video conferencing solutions, technology and vendors by  SearchSecurity.com

April 27, 2011 - In order to successfully implement your video conferencing solutions, you must understand the physical components of your system.  This e-guide can help you by uncovering the ins and outs of video conferencing architectures while also providing an in-depth look at solutions, technology and vendors.


A Closer Look at Windows Vista by  National Instruments

February 19, 2008 - One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...


A Cloud Computing E-Book: Re-make or Re-model? by  Salesforce.com

August 05, 2011 - The upsurge in cloud computing presents development teams with challenges that may require them to rethink established ways of building applications. Read this SearchSOA.com E-Book to get an overview of issues and strategies surrounding application development in the cloud.


A Cloud-Based Storage Management Platform for Companies of any Size by  IBM

November 12, 2012 - This organization wanted to bring the storage manager platform to smaller/medium sized companies. They came up with a cloud-based solution to make this complex enterprise system small business friendly.


A Cohesive Approach to Addressing Advanced Targeted Attacks by  Fortinet, Inc.

May 09, 2014 - This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.


A Community Approach to your Enterprise Security by  Hexis Cyber Solutions Inc

May 28, 2014 - This informative resource explores one company's solution and its unique community based approach to your enterprise security.


A Community Approach to your Enterprise Security by  Hexis Cyber Solutions Inc

May 28, 2014 - This informative resource explores one company's solution and its unique community based approach to your enterprise security.


A Comparison of PowerVM and x86-Based Virtualization Performance by  IBM

April 14, 2010 - Turning to virtualization can increase an organization’s IT performance. But finding the ideal consolidation solution can be tricky. Read the white paper, “A Comparison of PowerVM and VMware Virtualization Performance”. See how IBM Power7 and PowerVM outdo other x86-based platforms to achieve broader scalability and increased flexibility.


A Complete Analysis of Gigamon's Added Network Support by  Gigamon

December 31, 2013 - Read this informative whitepaper to learn more about the nuances of increased vendor support and how virtualization support can help you harmonize your disparate network environment into a more cohesive picture.


A Complete Primer To Mobile BI by  Oracle Corporation UK Ltd

May 12, 2011 - Business intelligence (BI) is a natural fit for mobile devices. In this eBook, appropriate for business intelligence professionals, get a complete, accessible overview of mobile BI from industry expert Wayne Eckerson.


A Complete View Of The Enterprise: Linking Operational And Financial Planning In Global Organizations by  SAP America, Inc.

May 01, 2008 - In February 2008, CFO Research Services, a unit of CFO Publishing and part of The Economist Group, began a research project with Business Objects, an SAP company, asking senior finance executives to give views on their priorities and challenges around integrating operational and financial planning processes.


A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation by  IBM

June 01, 2008 - This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.


A Comprehensive Introduction to RSA SecurID User Authentication by  RSA, The Security Division of EMC

November 01, 2006 - This white paper examines a two-factor authentication solution that helps efficiently manage the authentication of your company's users who access your network and web-based applications.


A Computer Weekly buyer's guide to testing and code quality by  ComputerWeekly.com

May 19, 2014 - Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.


A Computer Weekly buyer’s guide to hybrid cloud by  ComputerWeekly.com

April 04, 2014 - Computer Weekly looks at how to find the best hybrid cloud provider for your organisation, the impact of hybrid cloud on the infrastructure manager and how Microsoft is catching up with the cloud market with Azure.


A contact center manager's guide to integrating self-service by  KANA

August 01, 2012 - Leveraging self-service technologies in your contact center can significantly reduce costs, but successful implementation is tricky. Gain expert advice on how to ensure your self-service contact center initiative is a success. Read on to learn self-service contact center best practices, how to obtain executive support, and more.


A contact center manager's guide to integrating self-service by  inContact

May 04, 2011 - Do you feel pressured to provide great service while keeping costs down in your contact center? Self-service technology enables customers to resolve their own service questions without depleting agent resources. But deploying self-service technology raises many questions. Learn best practices and tap into expert advice with this eBook.


A converged infrastructure to drive more value from virtualization by  HP and Intel

January 31, 2014 - Take a look at this game-changing resource to discover the key features of a converged system for virtualization, and find out how you can hop on the fast track to a fully virtualized environment.


A converged platform solution that lives up to the hype by  Hitachi Data Systems

October 31, 2012 - Learn more about a converged platform that offloads systems integration responsibilities from your IT department.


A Cost-Effective Approach to Enterprise Storage by  Dell, Inc.

April 30, 2014 - This white paper explains the benefits of a new solution that delivers enterprise storage capabilities without the prohibitive costs. The benefits include improved performance, scalability, availability and data management.


A Cost-Effective Solution for Building and Managing a Complete Cloud Infrastructure by  Dell and VMware

January 02, 2013 - This helpful resource reveals effective strategies and tools for building and managing an effective, efficient and flexible cloud infrastructure that can ease the burden on your IT and allow room for growth.


A Crossroads for Windows XP Users: Windows 7 or Windows 8? by  Global Knowledge

April 16, 2014 - This whitepaper explores the pros and cons of each option – including your options for staying with XP.


A CW buyer's guide to software asset management by  ComputerWeekly.com

September 09, 2013 - Computer Weekly looks at best practice for software asset management in this 10-page buyer's guide.


A CW buyer’s guide to Human Capital Management by  ComputerWeekly.com

November 01, 2013 - Computer Weekly looks at what steps the industry has taken to improve talent management; bridging the gap between the cost savings promised by cloud technologies and the value they deliver; and how to recruit expertise in emerging technologies.


A CW Buyer’s Guide to Software Asset Management by  Flexera Software

September 05, 2013 - In this exclusive buyer's guide, Computer Weekly looks at best practices for software asset management, the attention and funding required to fully exploit it an how business can make sense of often complex terms and conditions.


A Data Governance Manifesto: Designing & Deploying Sustainable Data Governance by  Siperian, Inc.

June 01, 2007 - Effective data governance can ensure that data is managed to align with corporate objectives and support business needs. Read this paper to learn approaches and best practices for establishing a data governance framework for your organization.


A Day in a Low Carbon Life: What Might It Be like to Lead a Business in 2012? by  IBM

May 01, 2008 - This entertaining paper describes a day in the life of a fictional Chief Executive Officer, preparing to face market analysts in 2012.


A Decision Maker’s Guide to GRC Solutions by  McAfee, Inc.

November 10, 2011 - It’s been almost a decade since the Sarbanes-Oxley Act changed the governance, risk and compliance (GRC) landscape, but companies continue to grapple with putting together clean solutions that address their needs. Access this resource for a comprehensive checklist of features to look for when selecting a GRC vendor.


A Deep Dive on DevOps and Application Deployments, Featuring a Guest Speaker from Forrester Research, Inc. by  Electric Cloud

September 06, 2012 - Watch this webcast to hear Forrester Research, Inc. analyst Glenn O'Donnell discuss current challenges in application deployment and best practices for creating strong communication and understanding between your development and operations teams.


A Definitive Guide to Data Governance eBook by  Harte-Hanks Trillium Software

August 17, 2011 - This E-book explores what is involved in initiating a formal business-driven data governance process.


A Detailed Look at Data Replication Options for Disaster Recovery Planning by  LEGACY - DO NOT USE - Datalink.

June 01, 2008 - This white paper is intended to provide a technical overview as well as high level considerations for IT professionals who are considering augmenting their infrastructure with a replication strategy.


A Different Approach to Traffic Visibility by  Gigamon

December 31, 2013 - This guide explores the effects of new technologies on existing network infrastructure and how you can overcome potential issues with improvements in network visibility.


A Different Take on Software Defined Networks by  Enterasys

August 02, 2013 - Get a different take on software defined networks, who they help, the benefits you can achieve from deploying one, and key tips for utilizing one within your organization.


A Disruptive Force in the Analytics Industry - LMG Service Sets a New Benchmark for Retail Analytics thanks to Kognitio by  Kognitio

July 25, 2008 - In this case study Loyalty Management Group (LMG), tried to find a way to offer retailers and suppliers the ability to analyze full Electronic Point of Sale (EPOS) data volumes to help them gain insight, intelligence and statistical confidence.


A Document Management System Is Only as Good as Its Index by  Viking Software Solutions

April 01, 2008 - In a document management system, an index functions as the means to retrieve documents. Without retrieval capabilities, the content would merely take up space. This paper explains that, given this vital role, companies should give indexi..


A FIRST LOOK AT ORACLE BPM SUITE 11G by  Oracle Corporation

June 25, 2012 - <p>Read this white paper to explore the advanced features and capabilities offered in Oracle's BPM Suite 11g and discover the advantages it can offer your organization.</p>


A Fluid Data Architecture Pays Off for CMA by  Dell Compellent

June 29, 2010 - Financial institutions worldwide depend upon the credibility and security of Credit Market Analysis (CMA’s) products and services daily. CMA’s approach to market analysis creates large volumes of highly sensitive data that require secure management and storage. CMA has been running a Dell Compellent enterprise storage solution for over two years.


A Focused Look: How Payroll in a Comprehensive System Saves Time & Money by  IQMS

November 01, 2012 - Read this case study to discover the benefits Wisconsin Plastics, Inc. (WIS) achieved by implementing a software module for these processes that integrates seamlessly with its existing enterprise resource planning (ERP) software.


A foundation for database simplification, consolidation and cost reduction by  IBM

February 14, 2012 - This white paper challenges the x86 processor trend, demonstrating that modern mainframe technology represents a scale-up option to the current racks filled with blades. It looks at the way organizations can benefit in terms of improved agility, increased reliability and cost savings by consolidating Oracle databases onto IBM’s zEnterprise.


A Foundation for Next-Generation Data Center Security by  Citrix

September 28, 2012 - This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.


A Framework for 2.0 Adoption in the Enterprise by  NewsGator

May 05, 2010 - This report draws from the knowledge of full‐time practitioners who orchestrate enterprise‐wide rollouts in their organizations. We outline patterns of adoption and highlight practical insight that will help your company and your clients plan for the process and help set realistic expectations for a successful 2.0 rollout.


A Framework for Deploying UC: Using a Repeatable Process for Optimizing Your Technology by  Avaya Inc.

November 01, 2008 - This white paper describes a four step framework for moving unified communications from an ad hoc, deployment scenario, which has resulted in many of the companies interviewed having a siloed implementation.


A free Demonstration of Panda Cloud Systems Management by  Panda Security

July 17, 2013 - Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.


A Full Report on the Cisco Catalyst 2960-X by  Cisco Systems, Inc.

June 30, 2013 - In this Lippis Report Research Note, Lippis Research reviews the latest edition of the "most popular access switch on the planet" – the Cisco Catalyst 2960-X. Get a break down of the capabilities, features, and benefits of the new Catalyst 2960-X.


A Full-Service Network With Secure, Encrypted Communications by  Cisco Systems, Inc.

December 30, 2013 - In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.


A Functional Model for Data Management by  Baseline Consulting

May 04, 2009 - This paper examines how organizations are using a holistic data management perspective to optimize data usage regardless of where the information resides. It shows how when information is shared across the enterprise, business decisions are more robust, and decision makers have access to the widest array of input, with the greatest quality.


A Future in Content(ion): Can Telecom Providers Win a Share of the Digital Content Market? by  IBM Line of Business

January 01, 2007 - A future in content(ion): Can telecom providers win a share of the digital content market? High growth in digital content offers significant opportunities for telecommunications providers. Find out more by downloading this IBM white paper.


A Geek’s Guide to Presenting to Business People by  Citrix Online

June 20, 2012 - Giving presentations to business stakeholders is often a struggle for IT executives because they don’t know how to speak business executives “language”. Attend this live webcast on June 20th to learn what business-minded individuals need in a presentation and practical tips for how to make your presentations more compelling.


A Governance Guide for Hybrid SharePoint Migrations by  Dell Software

February 16, 2012 - In this Quest white paper, discover the benefits – and risks – of hybrid SharePoint deployments. Then learn about the essential governance considerations to ensure a successful migration.


A government agency faces double trouble with relocation using a USP by  Hewlett-Packard Company

January 31, 2014 - Read through this concise case study to find out how HP fixed one organization's hardware faults in their system.


A Guide for CIOs: Make Your Mark with Business Transformation by  Hewlett-Packard Limited

July 01, 2012 - Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.


A Guide for Enterprise VMware ThinApp Deployments by  VMware, Inc.

February 23, 2011 - This guide provides the insight you need to ensure a successful enterprise implementation of ThinApp, with guidance on deployment of virtualized applications in the enterprise, addressing multiple use cases for physical and virtual desktops, with design considerations of multiple components for each use case.


A Guide to a Scaled Agile Framework by  Rally Software

May 23, 2013 - You're probably familiar with agile methods for software development, but did you know that agile development isn't only useful at the team level? This resource explores a strategy for implementing a Scaled Agile Framework™ (SAFe) in your organization and how to extend agile and lean principles to an enterprise scale.


A Guide to Accelerating Business Value for Microsoft Environments by  EMC Corporation

March 01, 2008 - In this guide we'll learn how EMC can accelerate the business value of Microsoft environments of any size and scope.


A Guide to Big Data Security Analytics and SIEM Strategies by  LogRhythm, Inc.

December 31, 2012 - Explore the current SIEM tools and capabilities today and uncover how new improvements in SIEM can help boost your defenses in today's threat-filled world.


A Guide to Branching and Merging Patterns by  AccuRev

January 05, 2012 - In this paper, gain a better understanding of how branching and merging patterns work and how applying them to your projects can have a profound effect on how your development team handles change management and delivers software.


A Guide to Creating C++ Web Services by  Rogue Wave Software

July 01, 2008 - This white paper details the steps necessary for developing and hosting high performance C++ Web services.


A Guide to Cyber Crime Security in 2010 by  eEye Digital Security

November 25, 2009 - Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.


A Guide to Data Privacy for Business and IT Executives by  IntraLinks, Inc

December 31, 2013 - This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.


A Guide to Effectively Managing Enterprise Wi-Fi Networks by  Motorola, Inc.

September 01, 2007 - In order to avoid making WLAN administration a full-time headache, IT administrators who are deploying or extending enterprise WLANs must make sure that RF management is not an afterthought, but a priority. This paper will show you how to d...


A Guide to Email Regulatory Compliance by  USA.NET, Inc.

July 23, 2009 - This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET.


A Guide to Ensuring Business Continuity Through the Power of Virtualization by  Citrix

December 21, 2010 - Citrix provides a robust set of virtualization technologies to help improve the resilience and usefulness of an organization's information infrastructure, ensuring that not just critical resources remain available but that they are always accessible to all users in any location with any device. Continue reading to learn more.


A Guide to Evaluating Email Security Solutions by  SonicWALL

April 01, 2008 - E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.


A Guide to Lower Database TCO by  Sun Microsystems, Inc.

May 07, 2008 - In this white paper, you'll learn how organizations such as Sabre Holdings, Cox Communications, and NASA have improved database reliability, performance and TCO using MySQL. You'll also see how these techniques can apply in your organization.


A Guide to MAM and Planning for BYOD Security in the Enterprise by  SearchSecurity.com

November 26, 2012 - In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.


A Guide to Messaging Archiving by  Sunbelt Software

January 29, 2010 - This white paper discusses the several reasons to implement a messaging archiving system and provides an overview of ten vendors whose offerings are focused squarely on the archiving space.


A Guide to Next-Generation Backup, Recovery, and Archive by  EMC Corporation

March 01, 2008 - EMC provides a range of professional services for assessing, implementing, and managing a backup, recovery, and archive environment.


A Guide to Password Use in WebSphere Application Server by  Global Knowledge

April 30, 2014 - Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.


A Guide to PST Files - How Managing PSTS will Benefit Your Business by  C2C Systems (UK)

May 08, 2013 - This whitepaper provides a complete guide to personal storage files.


A Guide to SOA Governance by  Torry Harris Business Solutions

April 01, 2008 - This white paper provides a guide to a successful SOA governance. Explore the integral role governance plays in realizing optimal ROI from an SOA implementation.


A Guide to Storage Efficiency by  FileTek, Inc.

April 16, 2012 - Check out this expert E-Guide to discover how you can better-analyze your storage infrastructure and drive costs down without compromising performance.


A Guide to the Value of Reliable Data in Retail Banking by  DataFlux Corporation

November 02, 2009 - This paper examines the impact of unreliable data on retail banks. Defining the requirements needed to guarantee data reliability in retail banking, it offers a practical approach to creating and governing that data, and shows how you can get started in making trusted data available to improve marketing, customer service, risk management and more.


A Guide to Understanding Hosted and Managed Messaging - An Osterman Research White Paper by  ZANTAZ

January 01, 2008 - Email messaging is a mission-critical function for virtually all organizations and it is becoming more so. Learn how you can manage email to meet regulation requirements, increase messaging security and reliability, and streamline storage...


A Guide to Understanding Messaging Archiving by  Sunbelt Software

August 06, 2008 - This analyst paper by Osterman Research discusses the several reasons to implement a messaging archiving system and provide an overview of ten vendors whose offerings are focused squarely on the archiving space.


A Guide to Utilizing Virtualization in a Disaster Recovery Strategy by  Dell and Microsoft

April 20, 2009 - In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.


A Guide to Virtualizing Your Information Infrastructure by  EMC Corporation

April 01, 2008 - Virtualization is top priority for CIOs and data center managers. Download this guide on virtualization and discover an approach that distributes intelligence across all levels, while centralizing the control and management of your entire environment.


A Hack Attack: Six Steps to Recovery by  Cisco Systems, Inc.

January 21, 2011 - It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.


A Healthy Change for Humana by  Intel Corporation

September 08, 2009 - Intel helps design and deploy a data center that packs 25 percent more servers into 56 percent of the space.


A Heuristic Approach to Mobile Security by  Zenprise

October 20, 2011 - This paper addresses the aspects of a new approach to mobile security management that is imperative if we are to keep up with the fast pace of change in mobile user demands and devices.


A Hidden Security Danger: Network Timing by  Symmetricom

December 27, 2010 - Most anyone who uses a PC no doubt sees the little clock at the bottom of the screen,dutifully ticking off the minutes of the passing day. But chances are they don’t often think about the role that clock plays in the network to which the PC is attached.


A holistic approach to your BYOD challenge by  Insight

May 10, 2013 - Ensuring security of business applications on personal devices and maintaining unified wired and wireless visibility and management is key for BYOD. This white paper discusses the most critical requirements for effective BYOD management and offers advice on how IT can successfully manage this trend.


A Holistic View of SIP Trunking Solutions by  Siemens Enterprise Communications

December 06, 2010 - Get a holistic view of the potential costs and savings associated with SIP trunk consolidation.  Uncover actual costs and savings models, a review of key technical considerations, primary design considerations, and a discussion of a holistic architecture that can take you from SIP trunking to UC easily and economically.


A Holistic View of Virtualization in the Data Center by  Agilysys-Sun Technology Solutions

September 29, 2008 - Each type of virtualization - server, storage, desktop, application, and network - offers its own ROI. Learn about features and benefits of the five main types of virtualization to cater your virtualization strategy to your organization.


A Holistic View of Virtualization in the Data Center by  Agilysys-Sun Technology Solutions

March 09, 2009 - When most IT Pros and CIOs think virtualization, the first thing that comes to mind is server consolidation using server virtualization. However, there is a lot more to virtualization than just "consolidating your servers with VMware." In this analysis, we'll help you to understand the different types of virtualization and which works best for you.


A Hybrid Storage Pitch in an All-Flash Landscape by  Nimble Storage

October 31, 2012 - With Cache Accelerated Sequential Layout (CASL) architecture as a key differentiator for this vendor's storage systems, read on to discover what else sets them apart from incumbent vendors that offer midrange and entry-level storage systems.


A Large U.S. Health Insurer Speeds Backup and Recovery by  IBM

August 03, 2010 - Read this case study to learn how a major health insurer implemented an IBM virtual tape library solution that reduced the time and effort spent on storage management and enabled significant cost savings.


A Layered Approach to Securing Remote Maintenance Consoles by  Raritan Inc.

January 01, 2008 - Existing techniques for accessing maintenance consoles are inefficient and leave security holes in the network. Learn how, by deploying a secure console server, maintenance consoles can be secured and the availability of the network improved.


A Library Based Approach to Threading for Performance by  Intel Software Network

May 22, 2008 - Libraries play an important role in threading software to run faster on Intel multi-core platforms. Read this white paper to learn more.</p>


A Lifecycle Approach to Systems Quality: Because You Can’t Test in Quality at the End by  IBM

December 17, 2009 - This white paper looks at approaches for effectively integrating quality management into lifecycle activities and the potential benefits this can deliver for project and business outcomes.


A Management Tool that Will Empower you with a Proactive Approach by  VMware, Inc.

September 26, 2012 - This resource presents the results from a recent study interviewing 200 of your peers on the impact that VMware's vCenter Operations Management Suite had on their business.


A Manager's Guide To Unified Threat Management And Next-Generation Firewalls by  Sophos, Inc.

December 12, 2013 - As the threat landscape becomes more dangerous, businesses are deploying unified threat management (UTM) systems. This guide explores the important question of - Which UTM option is right for your organization?


A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network by  Motorola, Inc.

May 01, 2007 - This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.


A Manager’s Guide to Perfecting Performance Management: How to Transform Your Employee Review Process by  Ultimate Software

April 30, 2013 - Experts agree that traditional, once-a-year employee reviews are holding back business performance. This resource counts down six simple steps that will help you perfect employee performance management at your organization.


A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls by  Sophos, Inc.

November 30, 2013 - Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.


A manufacturer’s guide to navigating the procurement and sourcing technology landscape by  IQMS

March 16, 2011 - In this eBook, learn what the newest procurement tools can do and gain a better understanding of how to move beyond indirect spend management to the direct goods that impact the entire product lifecycle.


A Manufacturing Imperative: Enterprise Service-Oriented Architecture by  SAP America, Inc.

January 01, 2006 - This white paper describes enterprise SOA and the business opportunities it creates for manufacturers.


A Marketing Pilot for FTTH Network Rollout by  ECI Telecom

November 01, 2010 - Operators who invest in marketing pilots before making a significant network change are better able to plan the service packages and define the target audience. This white paper presents ECI Telecom’s proposed approach to marketing pilots, their possible components, and expected results.


A Midmarket Guide to Leveraging data as an asset with Business Intelligence and Analytics by  SAP America, Inc.

May 24, 2011 - This eBook is written for IT and BI professionals as well as business executives involved in BI decisions. It introduces BI and analytics for midmarket organizations plus practical advice on how to get started on deploying a BI system, from building a business case to evaluating BI technology.


A midmarket guide to leveraging data as an asset with business intelligence and analytics by  SAP America, Inc.

July 05, 2011 - Business intelligence (BI) tools have long enabled large corporations to uncover insights into business patterns and trends. Despite these benefits, many small and medium-sized businesses (SMBs) have yet to use BI, primarily due to concerns about the complexity and cost.  Learn how SMBs can also take advantage of BI and gain a competitive edge.


A mobile application development primer by  IBM

April 30, 2012 - Access this informative white paper to explore the unique challenges of mobile app development, including usability and choice of implementation technology, and get a primer on the tools and processes that will help you achieve the five key themes of mobile app development.


A Mobile Application Management Primer for IT by  SearchSecurity.com

October 05, 2012 - This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.


A Model of Virtualization by  Intel Corporation

September 08, 2009 - This paper demonstrates the value of a Xeon 7400 Dunnington system, the Dell IT group has virtualized more than 5,000 servers and saved the company over US$29 million using a scalable, worldwide virtualization model.


A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by  RSA, The Security Division of EMC

February 19, 2009 - Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts