A Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
A Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
 

Achieving a Higher Level of Business and Network Adaptability with Unified Application Infrastructure Services by  F5 Networks


December 01, 2004 - Although F5's BIG-IP traffic management solutions brings numerous features and benefits to an organization, the goal of this paper is to explore a more fundamental business problem plaguing today's organizations - and how BIG-IP solves it.

 

Achieving a New Level of Data Center Performance by  Emerson Network Power


July 25, 2012 - Data center infrastructure management (DCIM) can provide accurate, real-time information and help planning and management in the data center. Access this white paper to learn how your organization can benefit from the right DCIM tools and optimize efficiency and capacity in your IT environment.

 

Achieving a Single View of the Citizen With Information Management by  Information Builders


December 31, 2012 - This resource explores how creating a single view of the citizen by consolidating and synchronizing data can empower government agencies to support enhanced, information-based decision-making, improve operational performance, and more.

 

Achieving academic business agility by  Dell, Inc.


February 29, 2012 - This brief case study will guide you into how the University of Canberra significantly expanded centralised storage and improved responsiveness with an innovative SAN approach to deliver flexible storage for hosting a range of services provided to business applications and the academic community.

 

Achieving Actionable Insights from IT Operations Big Data by  IBM


November 20, 2013 - IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.

 

Achieving Agility: The Role of the Case Management Platform by  Singularity


March 15, 2011 - Most large corporations are at risk of capture by inertia - the force that holds back progress as organizations grow. But there’s an effective weapon against inertia for organizations determined to be on top of their game: agility. Agility is a key attribute of successful organizations and is a top priority on most management teams’ agendas.

 

Achieving Business Agility with BPM and SOA Together: Smart Work in the Smart Enterprise by  IBM


October 30, 2009 - This white paper describes the principles for the convergence of BPM and SOA from a business perspective. The primary audiences are leaders and architects that need to understand how to effectively combine BPM and SOA as a key differentiator for successful enterprises in their drive toward business agility.

 

Achieving Business Value with Network and Application Visibility by  Riverbed Technology, Inc.


January 09, 2012 - This resource provides in-depth information and data taken from 9 comprehensive interviews with current Riverbed Cascade customers. Customer experiences before and after the application visibility solution was implemented are explored.

 

Achieving Business Value with Network and Application Visibility by  Riverbed Technology, Inc.


April 01, 2010 - IDC conducted nine in-depth interviews with current Riverbed Cascade customers in order to obtain qualitative information about the end-user experience since deploying the network and application visibility solution, and obtain quantifiable data specific to each customer. Read this analyst report to learn more.

 

Achieving Compliance in a Virtualized Environment by  Tripwire, Inc.


September 19, 2008 - The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.

 

Achieving Cost Savings in Backup with Deduplication by  ExaGrid Systems, Inc.


July 09, 2010 - This document discusses that dollars and time currently consumed by existing tape libraries can be far better utilized by moving to disk back-up with deduplication.

 

Achieving customer loyalty with customer analytics by  IBM


October 31, 2012 - This white paper explores how you can build strong customer relationships in this age of social media and maintain loyal customers who will not only provide you with their valuable business, but also share their enthusiasm online with their peers.

 

Achieving Disaster Recovery with Virtualization by  Dell Compellent


May 24, 2011 - Implementing disaster recovery is both time consuming and costly. And as an IT pro, you are constantly on the look out for new strategies that can help make the process more cost-efficient. Learn how turning to virutalization can help simplify your disaster recovery initiatives and more.

 

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by  Lumension


May 28, 2009 - The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management.

 

Achieving Financial and Functional Advantages in Connected Building Solutions with the Unified Physical Infrastructure℠(UPI) by  Panduit


January 28, 2010 - Read this paper to learn about being connected building planning requires tightly integrated, well-coordinated cross-functional communication and project management across four functional phases: organizational alignment, technology strategies, network design considerations, and financial analysis.

 

Achieving Five-9's Availability by  Dot Hill Systems Corp.


January 11, 2012 - This white paper describes the stringent quality and measurement procedures that ensure maximum uptime.

 

Achieving flexible storage scalability: The Case for Enterprise Modular Storage Arrays by  NEC Corporation


August 06, 2009 - For businesses on a data growth path, the management of storage creates numerous problems, including business disruptions when upgrading and the need for greater availability and scaling flexibility. This paper makes the case for enterprise modular storage arrays to achieve the flexible storage scalability businesses need.

 

Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops by  Red Hat and JBoss


October 05, 2009 - This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility.

 

Achieving High Oracle Performance by  Dell Software


August 19, 2013 - In an ever-changing world, DBAs are managing more complex, business-critical systems. With demands of high performance and around-the-clock uptime, how can they keep providing maximum service levels? Advanced performance management is the answer. Learn more – read this Dell Software white paper.

 

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops by  Red Hat and JBoss


October 05, 2009 - This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.

 

Achieving ISO 27001 Compliance using Titus Solutions by  TITUS


November 11, 2010 - This paper provides IT professionals with a high level overview of ISO 27001 and 27002, along with their implications for security of email and digital documents.

 

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI by  Netcordia


July 17, 2009 - Many network monitoring products are easy to install and give you basic tools for managing your network, but achieving and maintaining compliance with the latest version of the PCI DSS requires a network solution that can manage unprecedented levels of change and complexity. Read this whitepaper to learn more about one such solution.

 

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI by  Netcordia


October 01, 2008 - This paper describes the ways that Netcordia's NetMRI can help you quickly achieve and maintain PCI DSS compliance across your network.

 

Achieving New Productivity Gains Through Unified Communications and Collaboration Solutions by  HP & Intel®


September 20, 2010 - The HP/Microsoft solutions for unified communications and collaboration aim to enable midsize organizations to optimize their own communications and collaboration by leveraging actual customer experiences to develop "best practices" for this area, thus reducing the operational costs incurred by disruptions and recoveries. Read this paper for more.

 

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by  Lumension


March 02, 2009 - Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.

 

Achieving Oracle Database Scalability With or Without RAC Using SharePlex for Oracle by  Dell Software


December 14, 2010 - In this Quest Software white paper, read about other alternatives that work alongside RAC - or in place of RAC entirely - without the drawbacks of using RAC alone. Discover how your company can reduce risk and downtime and still achieve scale, and how using a third-party solution can benefit your business for less cost. Read this white paper today.

 

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data by  Bit9, Inc.


June 09, 2009 - As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance...

 

Achieving PCI compliance with Dell SecureWorks' security services by  Dell, Inc.


May 18, 2011 - It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.

 

Achieving PCI Compliance with Log Management by  Hexis Cyber Solutions Inc


July 16, 2008 - This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement.

 

Achieving PCI Compliance with Red Hat Enterprise Linux by  Red Hat and JBoss


August 19, 2009 - While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis.

 

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by  Red Hat and JBoss


October 05, 2009 - The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates.

 

Achieving Pervasive Mobility through Integrated Campus Networking by  Brocade


January 04, 2010 - Brocade® Mobility enterprise Wireless LAN (WLAN) solutions, featuring support for 802.11n-based wireless networking, can help organizations efficiently meet these requirements while increasing their business agility and building value-driven edge networks.

 

Achieving Profitable Growth through Exceptional Customer Experience by  CA Technologies.


November 01, 2008 - In this whitepaper, Datamonitor focuses on nine key steps that can - and should - be taken by CSPs to improve standards by delivering outstanding service and achieving various objectives.

 

Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX by  Vision Solutions


May 09, 2008 - This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.

 

Achieving ROI from Enterprise Communications: A Revolutionary Approach by  Thunderhead


July 08, 2011 - This white paper provides an overview of how Thunderhead customers have achieved truly revolutionary ROI by streamlining their communications processes through the implementation of the Thunderhead Enterprise Communications platform.

 

Achieving SaaS Security with Connected® Online PC Backup by  Iron Mountain


September 23, 2008 - This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.

 

Achieving Security With Cloud Data Protection by  Iron Mountain


January 27, 2011 - Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.

 

Achieving Security With Cloud PC Backup by  Iron Mountain


September 14, 2010 - This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.

 

Achieving Superior Manageability, Efficiency, and Data Protection with Oracle's Sun ZFS Storage Software by  Oracle Corporation


December 01, 2010 - Oracle's Sun ZFS Storage software is the key ingredient that enables Oracle's Sun ZFS Storage Appliances to deliver unmatched simplicity, ease-of-use, increased storage efficiency, and industry leading price/performance.

 

Achieving Sustained Growth through Operational Excellence by  SAP AG


June 02, 2009 - Operational excellence is a simple concept with complex implications. Consistently doing things well across every element of the value chain is clear enough in principle. The ultimate goal is a "single source of truth" where senior executives have shared visibility into all parts of the organization, enabling management by facts.

 

Achieving the Best Possible Cloud Revenue Stream and Profit: Expert Insight by  Dell, Inc.


May 06, 2014 - This expert e-guide covers the current state of the hybrid cloud and unveils some best practices for optimizing your revenue stream and profits.

 

Achieving the Lowest Server Virtualization TCO by  Citrix


July 06, 2009 - This paper explores the TCO of server virtualization, the costs that drive TCO and factors you should consider when calculating the return on your next virtualization investment.

 

Achieving Timeliness and Relevance for Smarter Retail by  IBM


December 31, 2012 - This e-book examines how forward-looking retailers meet challenges and how IBM Informix software serves as the right data management framework to help retail organizations make the right offers to the right customers at the right time.

 

Achieving Value in Healthcare Through Efficiency and Effectiveness by  Dell, Inc.


June 20, 2012 - this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.

 

ACOs: Treat Patients More Effectively with Health Analytics by  IBM


March 29, 2013 - This e-guide from SearchHealthIT.com highlights the importance of data analytics in the success of today's ACOs. Read now to learn the difference between collaborative and captive ACOs and discover how predictive analytics can provide the information necessary to dramatically improve patient care.

 

Acoustics Management and Noise Mitigation in the OSP Environment by  Emerson Network Power


August 15, 2007 - This white paper details the noise problems that come with an expanding client base and how to stay quiet and meet regulations.

 

ACP- The Truth About Power Consumption Starts Here by  Dell, Inc. and AMD


August 24, 2011 - Based on customer demands, one company as developed a new metric designed to give customers a more accurate idea of the power consumed by the processor, thus enabling the customer to more accurately plan for future power budgets.

 

Acquire a global view of your organization's security state: the importance of security assessments by  IBM Software Group


January 11, 2008 - Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.

 

Acquire the ideal customer with IBM Customer Analytics by  IBM


February 10, 2014 - View the following webcast to get a firsthand look at the technology you need to handle today's "choosy consumer." See how with the appropriate customer analytics solution, you can strengthen nearly every aspect of your customer relationships, allocate resources more successfully, and achieve a greater overall ROI.

 

Acronis Backup & Recovery 11.5 Server for Linux (64 bit) by  Acronis


December 12, 2013 - [Click here] to access this complementary software demo of the 32-bit version of Acronis Backup & Recovery for Linux.

 

Acronis Backup & Recovery 11.5 Server for Windows: Fast and Simple Disaster Recovery by  Acronis


December 10, 2013 - This exclusive trial will give you a hands on look at a disaster recovery solution that will help you minimize your downtime.

 

Acronis Backup & Recovery® 11.5 for Workstation by  Acronis


March 31, 2013 - This data sheet highlights the benefits of a backup solution for built for laptops and desktops.

 

Acronis Backup & Recovery® 11.5 for Workstation by  Acronis


February 25, 2014 - This is a free trial download for a software backup solution from Acronis that offers an array of unique features

 

Acronis Backup & Recovery® 11.5 Virtual Edition for Hyper-V® by  Acronis


December 31, 2013 - Check out this exclusive white paper to find out the ins and outs of Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V, and how it will provide top-notch protection for your Hyper-V environment.

 

Acronis vmProtect 6 by  Acronis


December 14, 2011 - Built specifically for VMware vSphere™, Acronis® vmProtect™ 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks.

 

Acting Locally, Succeeding Globally by  OpenText


March 31, 2014 - In this white paper, learn more about the importance of localization, the challenges and benefits of deploying multilingual content, and the tools you'll need to improve your web experience management (WEM) strategy on a global scale.

 

Actionable Enterprise Architecture by  IBM


June 01, 2009 - This white paper provides an overview of the enterprise architecture concept and highlights how an actionable enterprise architecture approach from IBM can help organizations manage complexity and align IT projects and solutions with business objectives.

 

Active Administrator™, Version 5.6.1 by  ScriptLogic Corporation


December 29, 2010 - Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.

 

Active Anti-Malware Protection: Self-Defending IronKey Flash Drives Stop MalWare and Viruses from Spreading to Computers and Networks by  IronKey


March 06, 2009 - Read this paper to discover why only IronKey - with a unique end-to-end security that extends from the Cryptochip to firmware to services - is able to deliver a complete range of anti-malware controls down to the hardware level.

 

Active Archive: Front‐End File System for Tape and Disk by  Spectra Logic Corporation


October 28, 2010 - Tape has come back into its own, with the advent of new hardware and software that lets tape act like disk. Now the cycle is complete, through the use of active archive applications that put a file system in front of tape. Read this white paper to learn more about active archiving.

 

Active Directory Change Reporter Download - 20 Day Evaluation! by  Netwrix Corporation


July 20, 2010 - Download this 20 day evaluation version of the Active Directory Change Reporter.  This download includes both the standard and enterprise editions.  Just select between the Basic (standard) or Full-featured (Enterprise) modes in the setup wizard or in the Start Menu.

 

Active Directory Disasters and Tools to Prevent Them by  Dell Software


January 09, 2013 - Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?

 

Active Directory Expert Best Practices and Security Tips by  Centrify Corporation


December 03, 2012 - Access this expert e-guide for Active Directory best practices and security tips. Learn about securing domain controllers, group policy security settings and more.

 

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You by  Dell Software


August 21, 2012 - Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.

 

Active Directory Provisioning: Overcoming Top Challenges by  Dell Software


July 01, 2010 - In this new Quest white paper, learn about the challenges of managing Active Directory using native tools – and how provisioning in your diverse environment is equally difficult. Then, discover a third-party solution that not only delivers a comprehensive provisioning solution, but one that makes it quick, easy and painless.

 

Active Infrastructure, the fastest way to deliver the services your end users demand by  Dell, Inc.


September 12, 2013 - This resource discusses the Active Infrastructure platform from Dell, and how it can optimize your workloads and provide you with unified management for IT resources.

 

ActivEcho Trial Download by  Acronis


October 17, 2013 - activEcho is an enterprise file sharing and syncing solution that balances the end user’s need for simplicity and effectiveness with the security, manageability and flexibility required by Enterprise IT. Download this free trial to give it a try.

 

Activity based working: The Hybrid Organisation: Buildings by  ComputerWeekly.com


June 15, 2010 - The way we work is now open to wide-ranging review. The concept of the office as the ‘dumb’ container for work, housing the corporation and its infrastructure assets, will be challenged by a number of factors explored in this paper. Work, in the future, will only be a verb. It is becoming a process, not a place.

 

Actuate OnPerformance How to Turn on World-Class Performance Management Using SaaS by  Actuate


January 31, 2008 - For many organizations, implementing a Performance Management initiative properly requires not only developing good business strategies and aligning the key indicators that drive success, but also involves overcoming internal operational challe...

 

Actuate OnPerformance – Performance Management OnDemand by  Actuate


Actuate OnPerformance provides all the benefits of the world's leading Performance Management application without the IT headache. For as little as $60 per user, per month, Actuate OnPerformance eliminates the resource requirements associated

 

Actuate Performancesoft Suite Product Tour by  Actuate


May 17, 2007 - An effective method of monitoring and managing metrics is critical to increasing the performance of any organization. Learn how to gain visibility into all areas of concern and leverage insight into operations that stakeholders demand to ensure success.

 

Actuate Rich Information Applications Platform Tour by  Actuate


January 03, 2008 - Discover how Actuate enables organizations to make interactions and service a better, more convenient experience for their customers.

 

Acumin Contract Rate Index August 2012 by  ComputerWeekly.com


September 27, 2012 - Check out the daily contract rates for IT security professionals in this research from Acumin and Computer Weekly.

 

Acxiom Case Study by  CommVault Systems, Inc.


April 25, 2014 - This case study explains how one organization was able to secure their employee data, reduce migration costs and boost productivity with a new approach to backup/data protection.

 

Acxiom Deploys Business Intelligence for Best-of-Breed Solutions by  SAP America, Inc.


October 13, 2009 - Find out how Acxiom, specializing in providing customer and information management solutions for companies around the world, uses SAP BusinessObjects Business Intelligence (BI) solutions to transform consumer data into actionable BI.

 

Adapt to Changing Market Demand with IBM PureApplication Patterns by  IBM


May 21, 2013 - In this brief video, discover how you can achieve game-changing improvements in IT efficiency and economics with a platform system specifically designed and tuned for running applications.

 

Adapt to the Speed of Business: Unlock the Value of your SAP and Microsoft Investments by  SAP America, Inc.


August 21, 2013 - In this newsletter from Gartner, learn how IT can securely integrate SAP and Microsoft, so your users can access SAP data and processes from a Microsoft environment, without turning your infrastructure upside-down.

 

Adapt your technology, services, and organization to cloud: HP Converged Cloud Workshop by  HP & Intel®


May 31, 2012 - This paper introduces the HP Converged Cloud Workshop, which helps you gain clarity on your cloud strategy, identify the cloud initiatives that can work for your business, and create a roadmap that defines your steps forward. Read on to better understand the cloud computing model and how it fits in with traditional IT solution sourcing.

 

Adaptable and Resilient VDI Deployments by  F5 Networks


May 09, 2012 - Discover how to successfully deploy virtual desktop infrastructure (VDI) and achieve benefits like centralized management and reduced restore time. This white paper presents a VDI solution that lightens the burden on your network while making deployment faster and more secure.

 

Adaptable System Recovery (ASR) for Linux: How to Restore Backups onto Hardware That May Not Be Identical to the Original System by  Storix Software


February 01, 2008 - This paper will introduce the concept of Adaptable System Recovery (ASR) that makes it possible to easily adapt a system backup to fit new hardware by enabling a means for reconfiguring drivers.

 

Adaptec Intelligent Power Management: Reducing IT Costs and Storage Power Consumption by Up to 70% by  Adaptec, Inc.


October 27, 2009 - The challenge of saving power while maintaining server performance has become a primary concern within the IT environment. But, the latest generation of Adaptec RAID controllers provides Intelligent Power Management software and supports a variety of techniques that, together, enable significant savings without compromising performance.

 

Adaptec Zero-Maintenance Cache Protection by  Adaptec, Inc.


November 04, 2009 - Adaptec Series 5Z RAID controllers with Zero-Maintenance Cache Protection (ZMCP - pronounced “zemcap”) provide maximum protection for cached data and eliminate the substantial costs and environmental impact of complex, messy and expensive Lithium Ion batteries, while improving cache protection and cache performance.

 

Adapting to the change: Modernizing your IT by  Dell, Inc.


March 12, 2014 - This informative resource explores the inefficiencies in conventional network architecture and how with an network fabric management tool, you can save money and enhance overall performance.

 

Adapting to the new web security and email security threats by  Cisco Systems, Inc.


May 06, 2014 - In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.

 

Adaptive Access Management: An ROI Study by  Oracle Corporation


September 01, 2010 - Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.

 

Adaptive Memory Management for Virtualized Java Environments by  BEA Systems, Inc.


January 01, 2008 - This white paper discusses how to optimize Java application performance in a virtualized environment. Discover how to effectively operate a Java Virtual Machine in conjunction with emerging hypervisor technology.

 

Adaptive Packet Filtering by  Gigamon


December 31, 2013 - This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.

 

Adaptive Security for the Health/Pharma Vertical by  Juniper Networks, Inc.


April 13, 2011 - Healthcare and pharmaceutical organizations are more sophisticated than ever before; but with that sophistication, they also face new challenges.

 

Adaptive Strong Auth & Federated SSO - The New Power Couple by  Intel


October 03, 2011 - Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.

 

ADC-VX Whitepaper: The Agility of Virtual; The Predictability of Physical by  Radware


May 10, 2011 - Read our white paper, to learn how ADC-VX is an ideal solution for large enterprises, hosting and service providers as well as cloud providers that aspire to achieve significant cost savings by consolidating multiple dedicated ADC devices into a single, cost-effective consolidated ADC device.

 

Add Agility to your Existing BI: How LogiXML Complements Incumbent Traditional BI by  LogiXML


November 04, 2011 - Agile BI can supplement your traditional BI methods without having to do a total system overhaul. Read this white paper now to learn more about these alternatives.

 

Adding Business Value With Cross-Platform Solutions: Linux running on IBM Servers by  IBM


October 01, 2008 - This IDC White Paper is based on research data collected at a dozen customer sites in the United States, Canada, and Europe, all with mixed server platforms, to find the technical and business outcomes from deploying cross-platform Linux solutions on IBM servers. This paper presents the key findings of a return on investment (ROI) analysis.

 

Adding location intelligence to BI applications by  Esri


November 28, 2012 - Location intelligence can provide your business with unprecedented insight into customer behavior, market trends, and more -- so why don't more organizations include location features in their overall BI applications? Read on to learn the benefits of integrating location intelligence with BI and get 7 expert steps for getting started.

 

Adding Mainframe Focus to End-to-End Application Performance Management by  IBM


June 01, 2008 - Enterprise organizations need to take a serious look at end-to-end application performance management.

 

Address Management Challenges with Prime for Enterprise by  Cisco Systems, Inc.


January 26, 2012 - Managing your network is never without problems. Discover a solution that can simplify it.

 

Address performance and capacity issues by deploying a virtual infrastructure for SAP by  VMware, Inc.


March 01, 2009 - This white paper describes technical and business considerations for deploying a virtual infrastructure for SAP landscapes with EMC and VMware technologies. The white paper addresses a variety of key considerations for deploying such an infrastructure.

 

Address System-on-Chip Development Challenges with Enterprise Verification Management by  IBM


September 01, 2009 - This white paper addresses the multidimensional challenges posed by verification management and offers a compelling solution known as enterprise verification management solution (EVMS) based on over a decade of development and in-house experience at IBM. 

 

Address the small and midsized storage challenge by  IBM


November 07, 2012 - This white paper showcases an entry-level disk storage system designed with capabilities that offer efficiency and flexibility through built-in thin provisioning and non-disruptive migration of data from existing storage. Find out how this solution addresses block storage requirements of SMBs at an affordable price point.

 

Address VDI Storage Challenges with Data Dedupe, NAS Storage Systems by  Dell, Inc.


January 09, 2012 - VDI storage presents a slew of new challenges to data storage professionals. Read this expert E-Guide to explore how to address VDI storage challenges with data dedupe and NAS systems.

 

Addressable Advertising Opportunities for Network Operators by  Motorola, Inc.


December 23, 2008 - This paper provides an overview of advanced advertising opportunities and outlines Motorola's commitment to targeted video advertising.

 

Addressing changing customer behavior by  IBM


May 31, 2013 - This resource offers valuable insight to help you better understand customer behaviors and improve online customer experiences.

 

Addressing Cloud Backup Security by  SunGard Availability Services


February 06, 2012 - As cloud deployments continue to expand, there are a number of security issues IT managers must keep in mind to ensure that content is protected. This white paper is here to keep you up to date on the latest cloud security challenges and solutions, and will help you understand how to accurately define your backup and security needs.

 

Addressing Common Contact Center and Enterprise Business Issues with Speech Analytics by  Verint Systems


April 01, 2008 - As a solution to contact center issues, this paper suggests Speech analytics, which gives organizations the ability tap into existing recorded customer interactions to gain actionable intelligence for improving business performance.

 

Addressing common SaaS BI obstacles by  BeyeNETWORK


July 01, 2012 - What is the future of business intelligence (BI)? According to industry expert Wayne Eckerson, it's cloud computing. Review this comprehensive e-book to gain expert insight into what cloud computing is, the top business benefits cloud-based BI, an in-depth analysis of the SaaS BI market, and much more.

 

Addressing Compliance Initiatives with Center for Internet Security Benchmarks by  Tripwire, Inc.


January 01, 2009 - This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.

 

Addressing Data Security In The Cloud And Low Cost Large File Transfer by  SearchSecurity.com


October 10, 2013 - The location of cloud storage can play a huge part in cost as well as security. Delivering large files from non-scrutinized locations can compromise sensitive data in more ways than not.

 

Addressing Engineering Simulation Data Management (SDM) Challenges: How Engineering Enterprises Can Improve Productivity, Collaboration and Innovation by  IBM


February 28, 2013 - This informative paper shines light on the challenges of data and storage management, and how deploying simulation data management (SDM) software can help maximize business value.

 

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations by  IBM


August 08, 2011 - Organizations must implement the right IT GRC controls to meet meet regulatory requirements in areas of specific concern to auditors and reduce operational risk. Learn how IBM provides the capabilities to tackle specific compliance and audit requirements and address issues affecting long-term, ongoing risk management.

 

Addressing Mobile Threats: Effective Detection and Response by  ArcSight, an HP Company


March 07, 2007 - Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.

 

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration by  Thawte Inc.


May 19, 2011 - Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet.

 

Addressing SAN Management Issues in Virtual Environments by  SearchStorage.com


December 17, 2012 - This expert SearchStorage.com E-Guide dives into warning signs of SAN management problems-to-come so you can catch them before they manifest in your virtual environment. Check it out to learn how your peers are responding to these pain points.

 

Addressing Single Sign-On Inside, Outside, and Between Organizations by  Prolifics, A Premier IBM Business Partner


December 29, 2008 - This white paper examines how IBM Tivoli Unified Single Sign-On addresses the needs of organizations for enterprise single sign-on, Web single sign-on, and federated single sign-on.

 

Addressing Storage Management Challenges with Scalable NAS by  BlueArc Corp.


January 01, 2008 - Finding the best solution for handling your storage management challenges can be a difficult task. Download this white paper to learn about a NAS solution that addresses all of your storage and data management issues in an efficient manner.

 

Addressing the Broken State of Backup with a New Category of Disk-Based Backup Solutions by  ExaGrid Systems, Inc.


February 28, 2014 - This guide provides best practices for modern backup architecture are well as information on a disk-based backup solution that is built to handle the challenges of backup.

 

Addressing the Complexities of Remote Data Protection by  IBM


September 15, 2009 - This white paper reviews the factors that can make data protection and recovery in remote offices a complicated problem and describes the range of technology options available, explaining the benefits and shortcomings of each in the context of remote offices.

 

Addressing the Destructive Business Impact of Data Performance Problems by  Syncsort


October 28, 2009 - This paper details non-disruptive strategies for eliminating performance problems in existing data integration environments.

 

Addressing the Problem of Inactive Data Filling Up Expensive Active Disk Silos by  SGI


April 20, 2011 - This paper examines how an active archive strategy requires planning and tools, but when done properly it can dramatically reduce the overall costs of managing a growing pool of data. By de-coupling production disk from other tiers of storage, single points of failure are virtually eliminated.

 

Addressing Windows® 7 Application Compatibility by  Dell, Inc. and Microsoft Windows 7


March 09, 2011 - Understand the key elements of Application Compatibility, including, but not limited to Inventory & Assessment, Compatibility Testing and Remediation Options.

 

AdminStudio Suite: Powering an Application Readiness Process for Application Migrations and Day-to-Day Application Operations by  Flexera Software


March 02, 2011 - AdminStudio Suite powers an enterprise’s Application Readiness process for migrations to Windows 7, application virtualization and day-to-day application packaging operations. Its automation, integration, and workflow capabilities help companies streamline processes and reduce the time and cost of application migration projects.

 

AdminStudio Virtual Desktop Assessment by  Flexera Software


May 07, 2014 - Read on to learn about a solution that utilizes on-device agents to monitor behavior and transfers data to centralized servers for detailed reporting and analysis.

 

AdminStudio Virtual Desktop Assessment Overview by  Flexera Software


May 05, 2014 - This whitepaper will help you learn about AdminStudio Virtual Desktop Assessment 1.0 and how to optimize the benefits it brings to organizations when it comes to managing a virtual desktop environment.

 

Admiral Group ensures superb performance and scalability by  IBM


June 30, 2011 - Read this white paper to learn how one growing organization leveraged an advanced platform to scale and meet increasing demands. Discover how they were able to improve the overall performance of their systems, enabling them to cut costs and respond quicker to changing requirements.

 

Adobe ColdFusion 9 by  Adobe Systems, Inc.


October 05, 2009 - Adobe ColdFusion 9 software enables developers to rapidly build robust Internet applications by condensing complex business logic into fewer lines of code.

 

Adobe Flash Builder 4 by  Adobe Systems, Inc.


January 04, 2011 - Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more.

 

Adobe Solutions for eLearning: Transforming Customer Service in the Telecommunications Industry by  Adobe Systems, Inc.


November 01, 2008 - Adobe eLearning solutions enable enterprises to deploy rapid, real-time training for CSRs while helping them correlate training effectiveness with business results.

 

Adopt a Unified Approach to Data Management by  Hitachi Data Systems


April 01, 2012 - This IDC white paper explains why unified storage management solutions are best for today and tomorrow's data avalanches.

 

Adopt complex technologies with confidence by  Dell, Inc. and Intel®


April 06, 2013 - This resource presents Dell ProSupport Plus that enable you to get ahead of any IT infrastructure problems before they happen with a more proactive and preventative approach.

 

Adopting Big Data Projects: Key Tips by  IBM


March 28, 2014 - Read this expert e-guide from SearchHealthIT.com to learn how healthcare organizations can best utilize big data. Click through to learn how hospitals are leveraging analytics to further the benefits of Lean and Six Sigma methodologies.

 

Adopting iPad for Enterprise Use. Register Now! by  Sybase, an SAP company


July 26, 2010 - There is little doubt that Apple's iPad and iPhone will become valuable enterprise productivity tools. Watch this Sybase webcast and learn why IT departments should consider iPad and iPhone when planning new enterprise mobility strategies.

 

Adoption Readiness Tool (ART) Training and Services by  Hewlett-Packard Limited


January 01, 2013 - Well-trained users are more productive and more successful in carrying out their roles. This whitepaper looks at what companies can do to build custom training and documentation.

 

Advance Beyond the Barriers of Your Legacy Computing Infrastructure by  Sybase


September 30, 2010 - For customers running Sybase ASE 12.5 on Solaris 8, the long-planned end of support for that platform means that they must move their workloads to a new environment or face special support contracts. Moving to HP infrastructure brings immediate payback through lower support costs and reduction in power and cooling requirements.

 

Advance Your Data Management: Reduce Cost and Risk through the effective and efficient Management of Master Data by  Atos Origin


November 04, 2009 - Effective and efficient management of master data within the manufacturing sector is a key factor in reducing TCO, providing accurate global spend analysis and improved reporting and decision making. Implementing SAP's Master Data Management solution into an organization enables the backbone of a complete data governance model to be established.

 

Advanced ADCs Take Over Where Server Load Balancers Leave Off by  Coyote Point Systems, Inc.


July 19, 2011 - Access this whitepaper and learn what to look for when evaluating an application delivery solution. Get the tools you need to develop a successful virtualization strategy while improving your data center to obtain your business objectives.

 

Advanced Analytics Comes of Age for Business Executives by  SAP America, Inc.


July 28, 2011 - This white paper discusses the factors driving the coming of age for advanced business analytics. Learn about the options available to begin reaping the benefits of this strategy and why a services-led approach is key to success.

 

Advanced analytics emerges as key game-changer by  IBM


August 23, 2013 - Business Intelligence is top priority for many organizations, but many overlook the power of analytics. View this expert E-guide to learn more about the relationship between analytics and business intelligence and how your enterprise can benefit.

 

Advanced Attacks Require Federal Agencies to Reimagine IT Security by  FireEye


February 27, 2014 - This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.

 

Advanced Authentication Methods: Software vs Hardware by  CA Technologies.


June 30, 2011 - View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.

 

Advanced Case Management for Smarter Energy and Utilities by  IBM


October 23, 2010 - Read this paper to gain an approach to unifying utility company's information, processes and people to gain a 360-degree view of contracts, work orders and so much more, effectively enabling employees to make better-informed decisions which then reduce costs and elevate efficiency. Learn how case management can make your business smarter.

 

Advanced Case Management for Smarter Government by  IBM


August 20, 2010 - Case management is an area in which many government agencies can benefit by using new tools and approaches. By reading this White Paper, learn how to unify information, processes and people to provide better, faster services and programs.

 

Advanced case management solutions for smarter decision making in banking by  IBM


October 12, 2011 - Financial institutions are under pressure to make better decisions. Real-time decisions depend on access to information and the technology available to analyze it. This paper outlines an option that aggregates all of the content from across the entire organization to enable a holistic view of each case, reduce risk and support accurate decisions.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts