A Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
A Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

Application performance and testing with Agile by  Hewlett-Packard Company

May 25, 2012 - This expert e-guide will help you formulate an application performance management strategy. Read this now and learn about certain techniques that can help your agile development team prevent potential problems before deploying apps. Discover why communication is an essential component to preventing problems, as well as three testing models.


Application Performance Brief: Microsoft Office SharePoint Server by  BlueCoat

April 07, 2011 - Blue Coat Systems provides an end-to-end acceleration solution to regain performance, minimize bandwidth usage, and significantly reduce the time to complete all SharePoint Server 2007 and 2010 operations.


Application Performance for Business Efficiency by  IPANEMA TECHNOLOGIES

August 29, 2013 - This quick video reveals how you can regain control of your network and the applications using it with an innovative application performance management solution.


Application Performance for Oil and Gas Seismic Analysis by  Dot Hill Systems Corp.

March 14, 2014 - The reference solution combines Dot Hill storage solutions, Intel Enterprise Edition for Lustre, and Mellanox Infiniband to deliver a highly scalable and high performance infrastructure for oil exploration computing platforms, as well as other HPC applications.


Application Performance Guaranteed for Unified Communications by  IPANEMA TECHNOLOGIES

August 29, 2013 - This video reveals how a particular application and network performance solution can help you guarantee the performance of UC and other business-critical apps with ease. View now to learn more!


Application Performance Management (APM) for TIBCO Users: Extending Visibility across Your TIBCO Infrastructure and Beyond by  SL Corporation

October 01, 2008 - TIBCO users may wish to expand IT monitoring and management beyond their TIBCO infrastructure.


Application Performance Management for Dummies by  Riverbed Technology, Inc.

July 24, 2013 - Application performance management helps deliver the application performance users and the business demand. Effectively monitoring and troubleshooting application performance issues requires a comprehensive solution.


Application Performance Management in a Virtualized Environment by  Compuware Corporation

April 12, 2011 - This white paper focuses on the APM challenges of implementing VMware’s ESX server, the leading virtualization solution in use today, and the application performance challenges when running in a VMware ESX environment, successful approaches to solving these challenges, and how Compuware’s Vantage 11.5 provides a complete VMware APM solution.


Application Performance Management Tools For The Cloud by  CA Technologies.

August 13, 2013 - Application performance management tools are a good investment for organizations maintaining cloud applications. In this eGuide, our experts take a closer look at these tools and the ways that they can aid data center administrators.


Application Performance Management Tools for the Cloud by  CA Technologies.

January 23, 2014 - This expert e-guide covers a variety of cloud application monitoring tools so you can pick out the right ones for your environment.


Application Performance Management: A Prerequisite for Successful Cloud Computing by  CA Technologies.

April 01, 2011 - This research report clarifies a common misunderstanding concerning the relationship between virtualization and cloud computing. Discover how application performance management fits into your cloud project and obtain advice to help you avoid pitfalls throughout the execution process.


Application performance management: a six-step approach to improving staff efficiency and customer satisfaction by  Hewlett-Packard Company

July 21, 2010 - This paper details an approach that application owners and operations managers can use to achieve a successful application performance management deployment. The ultimate goal is to help you take clear steps toward robust application performance management capabilities so that you can serve your internal and external customers more effectively.


Application Performance Management: Intelligence for an Optimized WAN by  XO Communications

April 30, 2012 - In this resource, uncover valuable information about application performance management (APM), and why it's crucial to optimize network delivery as businesses demand more from their networks.


Application Performance Testing by  Neotys

March 22, 2011 - Application performance is always in the minds of development lifecycle professionals. This e-guide explores effective strategies for managing some of the tradeoffs associated with application performance testing and monitoring. Learn performance testing strategies for improving application performance without touching a performance test tool.


Application platform system with integrated expertise by  IBM

January 31, 2013 - Access this informative resource to learn how integrated systems built on patterns of expertise combine the flexibility of general-purpose systems, the elasticity of cloud computing, and the simplicity of an appliance to optimize the economics of your IT environment. Discover the benefits and capabilities of these systems by reading now.


Application Problem Resolution in a J2EE Environment by  BMC Software, Extending Value with Identify Software

April 22, 2008 - When considering deploying J2EE applications, designing an efficient and rapid application problem resolution process is important. Discover common J2EE application problems and strategies to accelerate resolution and minimize risk.


Application Quality Management by  Oracle Corporation

March 01, 2010 - Read this white paper to learn how AQM solutions include thorough testing capabilities that can help users identify application quality and performance issues prior to deployment, saving valuable time, money and reputation.


Application Quality Management and Testing Tools by  IBM

June 01, 2008 - As As companies implement SOA and extend their mainframes applications as web services, it is important that all applications be maintained and enhanced appropriately.


Application Rationalization Datasheet by  Apptio

October 15, 2013 - To achieve decision agility, IT organizations need a scalable way to make business sense out of disconnected financial, operational, and project data about their application portfolio. Read on to learn more about innovative solutions!


Application Ready Network Guide: Oracle Application Server 10g by  F5 Networks

January 01, 2007 - FS's Application Ready Network for Oracle Application Server 10g provides a comprehensive application delivery platform that greatly enhances the productivity and agility of both the Oracle applications and the organizationswho rely on these devices.


Application Release and Deployment For Dummies by  IBM

March 06, 2014 - In this digital entry of the popular For Dummies book series, get a primer on application release and deployment, and find insight to help you speed time to market, drive down costs, and reduce risk.


Application Release Automation with Zero Touch Deployment by  CA Technologies.

July 16, 2013 - While application release automation can cut time-to-market and decrease bottlenecks, it isn't without difficulties. In this helpful resource, explore the key technological and organizational challenges that you might face when implementing an automated deployment system, and learn how to overcome them.


Application Release Automation: An Introduction by  UC4 Software, Inc

January 31, 2012 - Application release can be very complex and challenging due the manual efforts involved. Automating this process can free up IT staff, cut costs, and accelerate release cycles. This brief video introduces application release automation, a new technology that takes care of the whole package, including planning, deploying, monitoring and more.


Application Retirement: Enterprise Data Management Strategies for Decommissioning Projects by  IBM

December 05, 2008 - This paper describes how incorporating an enterprise data management solution into your decommissioning project can help your company increase the business value of your enterprise applications.


Application Security Assessment Options by  Security Innovation

December 03, 2010 - This scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect the enterprise against application threats. Read this e-guide to learn how to solve these types of problems.


Application Security Handbook: Application Security: Managing Software Threats by  CA Technologies.

December 13, 2012 - Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'.


Application Security in the Cloud with BIG-IP ASM by  F5 Networks

August 03, 2012 - Access this white paper to discover a high-performance web application firewall that provides a strategic point of control within the infrastructure from which enterprises can adapt to changing conditions. Learn how your organization can benefit from this cloud-ready solution, offering cloud security for virtualized applications.


Application security testing: Protecting your application and data by  IBM

November 07, 2011 - Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.


Application Security Viewpoint by  Ounce Labs, an IBM Company

February 03, 2010 - Application security is the aspect of understanding how applications are built and how someone could gain an advantage by looking at the application’s flaws. In this podcast, dive into the nature of applications for details on their security and how we interact with them.


Application Services: Connect and grow to create seamless, secure, and context-aware experiences by  Hewlett-Packard Company

December 31, 2011 - Access this whitepaper to learn how third-party IT services can drastically ease the pain of modernizing your IT portfolio.


Application Testing Survey Results by  AdvizeX Technologies

March 10, 2014 - Software testing is a critical component of application delivery -- no matter what industry you're in -- in order to ensure applications meet your business needs. Unfortunately, software testing is often underfunded -- so how are successful organizations balancing budgets with testing strategies?


Application Tiering and Tiered Storage by  Dell, Inc.

March 25, 2009 - Storage consolidation brings many applications together to a single storage pool. It improves storage utilization, simplifies management, and increases reliability in well implemented SANs. While consolidation makes it easier to manage, provision, and backup your data, how do you manage different application service level requirements?


Application Transformation and Modernization by  Hewlett-Packard Company

April 02, 2013 - Many organizations are finding that their applications are much more diverse and varied than many businesses would like. Access this presentation transcript to learn how to go about improving and updating your applications for a modern age. Learn the key considerations you must take into account and where to start.


Application Transformation and Modernization by  Hewlett-Packard Limited

November 26, 2012 - Many organizations are finding that their applications are much more diverse and varied than many businesses would like. Access this presentation transcript to learn how to go about improving and updating your applications for a modern age. Learn the key considerations you must take into account and where to start.


Application Transformation – evolution or revolution? by  Hewlett-Packard Company

July 02, 2012 - With a variety of new application transformation solutions, businesses are attempting to bring together cloud, mobile and collaborative technologies to expand reach, enhance customer engagement, and drive bigger revenues. Access this video for more on the application transformation evolution and how it can affect your business and its success.


Application Virtualization and Desktop Virtualization Are Better Together by  Citrix

November 01, 2008 - This document is designed to help Citrix XenApp customers understand how and when Citrix XenDesktop can be used with Citrix XenApp to deliver virtual desktops to further reduce application and desktop computing costs.


Application Virtualization Delivers Cost-saving IT Solution for Georgia’s K-12 Peach County Education District by  InstallFree Inc.

January 21, 2010 - As the systems and hardware continue to be replaced and upgraded, the incremental effort is minimal, even when moving to new versions of the operating system. The wireless system readily manages remote desktops using InstallFree, which links both the PC and the User to the virtual application.


Application virtualization: Powerful delivery or problematic distraction? by  Dell and Microsoft

June 26, 2013 - Using virtual-application delivery platforms is easy – but have you considered the challenges of application virtualization? What's the best way to solve them? In this new white paper, discover the road bumps when creating and installing virtual applications – and how to easily get past them.


Application Visibility and Control by  Aerohive Networks

April 08, 2013 - Read on to discover a way you can visualize, monitor and manage your edge network infrastructure, and learn how to keep track of when and where users are attempting to access your network and how it is being used.


Application Visibility and Monitoring: An integrated approach to application delivery by  BlueCoat

October 07, 2010 - This white paper looks at the specific issues behind application performance problems and how to resolve them within an ADN environment. It explores how to deliver superior application performance by using application-level insight to manage bandwidth demand, protect against malware and so much more.


Application Visibility and Monitoring: An Integrated Approach to Application Delivery by  BlueCoat

April 16, 2009 - It's no secret that application performance drives business performance. But to achieve the level of application performance your business demands, you need total visibility into your network infrastructure so you can identify and monitor all your applications and resolve the issues that impede performance.


Application Visibility: The Root of Good Service Management by  Riverbed Technology, Inc.

December 31, 2012 - This guide highlights some best practices for managing your services and how to enhance your existing tools to provide a more effective network and application visibility.


Application Whitelisting Best Practices: Lessons from the Field by  Lumension

February 17, 2014 - This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.


Application-Aware Firewalls by  Juniper Networks, Inc.

March 02, 2012 - This IT Checklist outlines the capabilities application-aware firewalls can and should have. It also can guide you to discover the criteria your firewall should have to meet your security needs.


Application-Centric Networking by  Cisco Systems, Inc.

December 30, 2013 - In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control.


Applications and best practices to keep your mobile devices secure by  Good Technology

March 06, 2012 - Uncover best practices for keeping your mobile devices and applications secure.


Applications Re-host: Shift to more modern, agile, cost-effective platforms by  Hewlett-Packard Company

December 31, 2012 - This resource offers an in-depth look at the rationale and requirements related to re-hosting legacy apps to distributed or mid-range computing systems. Discover what it to takes to achieve a successful re-hosting project, and determine if it's a reality for your business.


Applications, Virtualization, and Devices: Taking Back Control by  Sophos, Inc.

October 01, 2008 - This paper explains why it is important to control unauthorized applications and devices, discusses the different approaches and highlights how integrating this functionality into malware protection is the simplest and cost-effective solution.


Applied Desktop Virtualisation by  ComputerWeekly.com

January 01, 2011 - This analyst report from Freeform Dynamics gives helpful advice for companies embarking on Desktop Virtualisation projects.


Apply the ITIL Framework with Confidence by  TechExcel

August 01, 2008 - This whitepaper explains how ITIL provides the foundation for quality IT service management. It actively supports corporate goals by offering services that are based on efficient principles and adequately fulfilling business requirements.


Apply the power of CRM to build customer loyalty by  Infor CRM

February 07, 2012 - This tip guide comes straight from Paul R. Timm's book, 'Technology and Customer Service: Profitable Relationship Building.' Read on to learn how to utilize today's technologies for enhancing customer relationship management (CRM) strategies.


Applying agile and lean principles to the governance of software and systems development by  IBM

November 22, 2011 - This paper presents eighteen best practices for leaner, more agile software development project governance.


Applying agile principles to the development of smarter products by  IBM

October 31, 2012 - Consult this informative resource to learn how applying agile practices to smarter product development can improve the product lifecycle and help you meet (and exceed) consumer demand.


Applying Business Analytics Webinar Series - Confident Predictions. Accurate Results. by  SAS

April 09, 2010 - Learn how to easily gain profitable data mining results in less time and improve accuracy and usefulness of analytical models during this Webinar. You’ll find out how to deliver precise and confident results, manage and improve model performance, and derive and share insights to improve the quality and precision of your decisions.


Applying Business Analytics Webinar Series - Got Bad Data? by  SAS

April 09, 2010 - Tune in to this Webinar to find out how to improve key data areas through data quality profiling and provide decision makers with trustworthy information. You’ll learn how to apply analytics to your reliable, high-quality data and come away with insights that optimize your organization’s decision-making capabilities.


Applying Business Analytics Webinar Series - Got Bad Data? Part 2 by  SAS

April 09, 2010 - Tune in to this Webinar to find out how data quality can improve business performance. You’ll learn how to improve key data areas by performing data quality profiling and data collection through closed-loop monitoring, and how to address data quality as a process to derive value and drive continuous improvement.


Applying Business Analytics Webinar Series - Got Bad Data? Part 3 by  SAS

April 09, 2010 - Tune in to this Webinar to find out how data quality influences the effectiveness of predictive analytics and forecasting. You’ll learn how to go beyond name and address matching to realize the potential of numerical data quality, how to overcome insufficient yet relevant data from your predictive and forecasting models, and more.


Applying Business Analytics Webinar Series - Integrate Your Office by  SAS

April 09, 2010 - This Webinar explains how by combining the power of SAS® Business Analytics with Microsoft Office you will be able to easily access data from any operational system without IT intervention, automate spreadsheets and PowerPoint decks, and save time and money by reducing redundancy and improving productivity.


Applying Factory Principles to Accelerate Enterprise Virtualization by  Dell, Inc. and Intel®

February 01, 2011 - This white paper points out the challenges of virtualizing a large quantity of servers and describes seven clearly defined steps that comprise the virtualization process. Get detailed information on each one of these phases and obtain lessons learned from one company that employed this approach.


Applying Factory Principles to Accelerate Enterprise Virtualization by  Intel

August 08, 2011 - Adopting the private cloud infrastructure is a prime goal for many organizations, however, the first critical step to achieving this goal is ubiquitous server virtualization. Access this exclusive resource to learn how you can apply factory principles to your processes and virtualize nearly 75% of your data center.


Applying ITIL Best Practice Principles to IPAM by  BT Diamond IP

December 20, 2010 - This white paper will explain how each of the main ITIL areas can be applied specifically to IP address management (IPAM), and the benefits that can be accrued from using this management framework.


Applying Lean, Six Sigma, BPM, and SOA to Drive Business Results by  IBM

August 27, 2013 - This white paper describes the key BPM, SOA, and Lean Six Sigma components, summarizes the linkages between them, and highlights recent results that leading firms have achieved. Companies that successfully combine Lean Six Sigma, BPM, and SOA initiatives will realize a competitive advantage.


Applying Requirements to the Life Cycle by  IBM

September 04, 2013 - Tune in to this podcast for an in-depth discussion about how requirements management can improve the entire development lifecycle, along with best practices of managing requirements for quality delivery, every time.


Applying the Four Standards of Security-Based CIA by  Global Knowledge

October 28, 2013 - High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats.


Appreciating People: An Asset Perspective on Human Capital by  SuccessFactors

April 26, 2012 - This informative presentation discusses the importance of human capital and its effect on business performance and financial success.


Appreciating People: An Asset Perspective on Human Capital by  SuccessFactors

April 26, 2012 - This informative presentation discusses the importance of human capital and its effect on business performance and financial success.


Approaches for Agile development teams by  IBM

June 14, 2012 - This expert e-guide discusses the different approaches for agile development teams. Learn about a handful of methods from experts Mary LeMieux-Ruibal, Mirkeya Capellan and Lisa Crispin, including focusing more on trends than numbers, employing a risk-based testing approach, calculating testing costs and much more.


Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis by  VeriSign, Inc

June 03, 2010 - Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.


Apps Revolution by  ComputerWeekly.com

February 24, 2014 - This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.


AppSense DataNow by  AppSense

June 19, 2012 - <p>Learn how your organization can provide instant access to work documents from mobile devices. This videocast presents a solution that extends your IT infrastructure out into the mobile world in minutes.</p>


AppSense DataNow: Anywhere data access with enterprise-class governance and control by  AppSense

June 18, 2012 - Discover a solution that can be added to your existing IT infrastructure which makes users instantly productive anywhere without compromising IT governance or efficiency. Gain insight into flexible offline data access options and non-disruptive integration.


AppSense DesktopNow helps Sunrise Health Region cut costs on Windows 7 migration and increases user productivity by  AppSense

July 22, 2013 - Sunrise Health faced intense pressure to address their failing IT environment, and did so by turning to user virtualization. Read on to learn about their experience and discover the tools they used to achieve success.


AppSense The Low down: What does user virtualization boil down to? by  AppSense

June 07, 2011 - Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.


AppSense User Virtualisation Platform by  AppSense

June 08, 2011 - Immense changes are taking place throughout the IT infrastructure, especially in the area traditionally referred to as the "desktop." With mobile devices, laptops, netbooks and fixed desktops allowing simultaneous and varied computing experiences, user virtualisation creates one centralised control that manages users across multiple devices.


AppSense User Virtualization Platform by  AppSense

July 26, 2011 - Among a number of important changes to the enterprise computing environment, none are perhaps as impactful as those surrounding the end user. Take a look at this resource to learn how user virtualization is the key to offering your end-user community an effective and consistent computing experience, no matter the location, device or application.


Apptix Chooses Replay as Their Exchange Backup Solution by  AppAssure Software, Inc.

March 02, 2009 - Maintaning an Exchange backup was certainly a challenge for Apptix, to overcome this challenge they used Replay, as a result of which they were able to eliminate about five hours of restore processes.


April Business Information E-Zine - Cutting-edge App That In-Memory Technology Makes Possible by  SearchBusinessAnalytics

April 23, 2013 - Consult this resource to find out more about how recent advances have opened in-memory technology to more businesses. It outlines how the excess of business information creates obstacles for many enterprises. Uncover how your business can take control of your data instead of vice versa by reading this resource now.


April Essential Guide to Data Protection by  SearchSecurity.com

April 11, 2012 - In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.


April Issue of Information Security Magazine: Cloud Migration: Look before you leap by  Information Security Magazine

April 05, 2011 - This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.


APT Defense Mechanisms and Best Practices by  Infoblox

February 20, 2013 - Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.


APTARE StorageConsole Backup Manager by  APTARE

August 30, 2013 - This informative paper examines a backup and recovery software solution that can help you increase your backup and restore success, streamline compliance, improve backup performance and much more. Read on to learn more.


APTARE StorageConsole: Capacity Manager by  APTARE

May 31, 2013 - This two page data sheet explores an innovative storage capacity manager designed to help organizations maximize storage utilization, improve capacity planning and reduce costs.


APTARE StorageConsole: Product Suite by  APTARE

April 30, 2013 - This two page data sheet explores an innovative storage capacity manager designed to help organizations manage explosive data growth and complex infrastructure. Find out how this technology also helps maximize storage utilization, improves capacity planning and reduces costs.


AQS, Inc. Major Software Delivery Lifecycle Improvements at AQS, Inc. with StarTeam by  Micro Focus

May 16, 2012 - When software company AQS, Inc. needed to build consistency in their source code management and automate change processes they leveraged a change and configuration management system. Read this case study to learn the benefits they were able to achieve.


ARC View In Dynamic Market, Consumer Goods Companies Rely on Manufacturing Operations Management Systems by  Apriso Corporation

October 27, 2011 - In this paper, discover a manufacturing operations management (MOM) platform and system has seen proven success in consumer goods companies.


ArcGIS® Server and Virtualization by  Esri

January 01, 2010 - Virtualization is becoming a standard IT practice. It is becoming more popular among ArcGIS customers as well. ESRI uses virtualization technologies for the development, QA and certification processes of ArcGIS Server. This paper provides an overview of virtualization and addresses some common questions regarding ArcGIS Server and virtualization.


Architect Versatile, Efficient Remote Site IT with the Dell PowerEdge VRTX by  Dell India

December 31, 2013 - Explore this game-changing resource to find out how this integrated IT solution was designed so you can make the most out of your ROBO sites.


Architecting a Better Network Storage Solution by  BlueArc Corp.

January 01, 2007 - BlueArc's Titan Architecture is a revolutionary step in file servers with its hardware-based file system. This paper explains the details of the architecture to better understand the unique hardware-accelerated design and the object based file system.


Architecting A Big Data Platform for Analytics by  IBM

October 31, 2012 - Business is now demanding more analytical power to analyze new sources of structured and multi-structured data. The IBM Big Data Platform rises to the challenge to create this new analytical environment, making IBM a serious contender to support end-to-end analytical workloads.


Architecting A Compelling and Engaging Digital Presence by  Limelight Networks, Inc.

May 21, 2013 - Creating meaningful relationships with your customers is one of the keys to success. Before the widespread adoption of digital communication, the resources and tools were often limited to sustain and improve these relationships. Consult this white paper to learn more about how digital communication creates new opportunities for businesses.


Architecting a vCloud by  VMware, Inc.

May 20, 2011 - If your organization has decided to take advantage of cloud computing benefits such as increased agility and flexibility, you may be wondering: Where is the best place to start? Read on for a guide to taking the first steps toward leveraging cloud computing across your organization.


Architecting an Effective Document and Records Management Approach by  Arrow and HP

January 07, 2013 - In this SearchContentManagement.com e-guide, discover three macro steps that can help you take a broad view in the initial stages of setting up a records management policy and automated procedures, and four factors that inform effective, long-term strategy for document management tools.


Architecting Cost-effective Scalable Oracle Data Warehouses by  Sun Microsystems, Inc.

May 28, 2009 - This paper describes reference configuration and sizing information for Oracle data warehouses on Sun servers for small, medium, and large solutions to meet business intelligence/data warehouse needs.


Architecting Enterprise Social Computing for Business Value by  NewsGator

October 01, 2008 - This paper builds a model of enterprise social computing by analyzing business goals. It builds the architectural components and the relationships between them by starting from a basic definition of social computing and the most common goals.


Architecting Oracle VM Solution with Sun ZFS Storage Appliances and Sun Servers by  Oracle Corporation

September 01, 2010 - With virtualization and its ability to install multiple operating systems (OSs) and run them independently on a single server, IT can effectively consolidate hundreds of servers while optimizing resources and simplifying the infrastructure. Read this paper to find out so much more.


Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation by  Intel

October 13, 2010 - This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.


Architectural Quality: Design, Development and Testing Rules by  hello2morrow, Inc.

September 01, 2008 - Read this white paper and explore essential architectural quality rules and their individual considerations. Discover a tool that enforces the most important rules automatically during development.


Architectural Strategies for Cloud Computing by  Oracle Corporation

December 20, 2010 - This paper explains how cloud computing is now also evolving in a private variant whereby enterprises set up cloud-like, centralized shared infrastructure with automated capacity adjustment that internal departmental “customers” utilize in a self-service manner. Realization of efficiency, performance, and agility benefits is reinforcing this trend.


Architecture and Core Capabilities of NetApp Clustered Data ONTAP 8.2 by  NetApp

June 12, 2013 - This technical report provides an overview of NetApp® clustered Data ONTAP® 8.2, including basic components of the hardware and software architecture.


Architecture Plan and Design Best Practices: Outputs, Interfaces, and Scheduling by  IBM

March 13, 2014 - Consult this expert e-guide for advice from Gartner Vice President Anne Thomas Manes and other IT professionals on architecture planning, design best practices, and new approaches to building services with service-oriented architecture (SOA).


Archive Attender™ for Exchange - Affordable Email Archiving by  Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available.


Archive Tape Management Made Easy by  Iron Mountain

December 31, 2013 - Locating and retrieving data from thousands of tapes is time-consuming and costly. It can also create security and compliance issues. This data sheet explains a service that can make handling archive data requests easy by storing tapes offsite.


ArchiveOne Content Archiving Solution by  C2C Systems

May 24, 2010 - Check out C. Keiper's review of the C2C ArchiveOne complete data archiving solution. This review will not only introduce you to this robust solution, but will also break down the ArchiveOne's competitive advantages and weaknesses as well as the different product offerings and packages offered by C2C.


Archiving Compliance with Sunbelt Exchange Archiver by  Sunbelt Software

August 06, 2008 - Archiving for compliance is an important step in securing your company's future. Learn how to implement an email archiving solution that will minimize the burden on your Exchange server and help to avoid costly legal penalties in this whitepaper.


Archiving in the Cloud: Essential Tips and Questions to Answer by  Symantec Corporation

November 20, 2012 - Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.


Archiving Stays Active with LTFS and the Cloud by  SearchStorage.com

March 27, 2013 - Access this exclusive E-Book containing three expert articles regarding archiving with LTFS and cloud services to learn about modern approaches to archiving - and not missing out on value in data that must be retained.


Archiving Storage vs. Data Backup Storage: The Dos and Don'ts of Using Backups and Data Archives by  Quantum Corporation

May 11, 2010 - It's important not to confuse data backups with data archives; backups should not be used as archives and archiving products have many features that backups don’t. Read this white paper as W. Curtis Preston examines these differences further and discusses the dos and don’ts of each.


Archiving with Symantec Enterprise Vault and Dell DX Object Storage by  Dell, Inc.

June 06, 2011 - Check out this short video from Dell to learn about Dell DX Object Storage Platform and Symantec Enterprise Vault - and how the pair can provide a comprehensive archive solution designed to help you better store, manage and discover your unstructured data.


Archiving: A Dell Point of View by  Dell, Inc.

April 27, 2011 - Dell has developed a customer centric strategy designed to provide customers with the right archiving solutions for their IT infrastructure. Access this paper to learn more about Dell's strategy and archiving point of view.


ArcSight Case Study: BMW by  ArcSight, an HP Company

November 17, 2009 - Watch this video case study to learn how ArcSight helped BMW drastically decrease incidence response times.


ArcSight Case Study: Vodafone by  ArcSight, an HP Company

March 10, 2011 - Vodafone, the world's leading mobile communications group, uses ArcSight Enterprise Threat and Risk Management platform to get a consolidated global view of security, increase the efficiency in security operations and increase the reaction time to cyberattacks or security breaches.


ArcSight IdentityView: Increasing Security and Compliance with a 360-Degree View of User Activity by  ArcSight, an HP Company

June 15, 2010 - This paper describes ArcSight IdentityView, a new application designed to leverage the power of the ArcSight SIEM Platform and apply it to user monitoring, for security and compliance purposes.


ArcSight Logger: Universal Log Management Solution by  ArcSight, an HP Company

March 04, 2011 - ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.


ArcSight Case Study: Experian by  ArcSight, an HP Company

May 11, 2010 - Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study.


Are Big Files Big Problems? by  OpenText

October 17, 2013 - This paper discusses the challenges associated with file transfer solutions and how managed file transfer solutions solve these problems.


Are businesses taking chances when it comes to managing outsourcing risk? by  ComputerWeekly.com

December 08, 2010 - Nearly 95 percent of organisations buy, provide or both buy and provide outsourced services and functions, in which they face inherent risks created by new and unforeseen challenges.


Are We Getting Any Closer to Self-Service Business Intelligence? by  Dell Software

December 28, 2010 - The need for self-service business intelligence (BI) is greater than ever. And while the market is filled with BI tools, they don't readily enable everyone to access and work with data


Are you Agile Enough? by  IBM

September 09, 2009 - If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]


Are You Fully Prepared to Withstand DNS Atacks? by  Infoblox

December 16, 2013 - Did you know since 2012 attacks on Domain Name System (DNS) have increased 200%? This white paper explores the role of DNS in the modern business landscape and the various strategies used to prevent attacks on DNS.


Are you minding your business's reputation? What can you do to mind it better? by  IBM

May 22, 2013 - Changing social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.


Are You Prepared for a Software Audit? by  CDW Corporation

February 27, 2014 - Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.


Are You Providing Your Customers with the Satisfying Experience That will Keep Them Coming Back? by  Cisco Systems, Inc.

September 01, 2008 - In today's tough economic times, businesses face a daunting challenge: do everything possible to attract and retain customers. This paper examines eight strategies for creating a relationship with your customers that will keep them coming back.


Are you ready for 2020? by  ComputerWeekly.com

August 02, 2013 - Dan Wood, senior manager for software market development at HP, discusses the results of HP's Enterprise 2020 study in this presentation.


Are You Ready for Cloud-Based HD Video Collaboration? by  LifeSize

September 27, 2011 - At last, HD video collaboration has become inexpensive enough and easy enough for just about any business to use.


Are You Ready for Economic Bounce Back? by  Micro Focus, Ltd

October 27, 2009 - This paper examines the concept that preparing for economic recovery is not something that can wait; it is something that businesses should plan for now. It will introduce enterprise application migration strategies that can be considered within any organization and also emphasize the importance of forward thinking and planning in down economy.


Are You Ready for Marketing Automation? by  Marketo

June 27, 2013 - Marketing automation offers many benefits to an organization, but it also requires a certain degree of readiness. Take a look at this checklist to determine if your company is ready to use marketing automation by evaluating your marketing initiatives in 10 key areas.


Are you running a Smarter data centre? by  IBM

October 16, 2013 - This white paper shows the results of a survey of more than 300 IT leaders in terms of data center efficiency.


Are You Securely Delivering Enterprise Data and Services? by  Webroot

November 10, 2011 - Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.


Are you securing the right things? How to effectively secure your data by  ComputerWeekly.com

October 13, 2010 - The idea of putting walls around the network is being replaced by a drive to understand what really needs to be secured and how to secure it. This paper examines the relative merits of the different approaches.


Are you Struggling to Manage your Healthcare Data Deluge? by  Iron Mountain

May 21, 2013 - This white paper highlights a modern approach to health care information lifecycle management, as well as the need to team up with partners that can help deliver it. Read now to learn how to make an accurate assessment of you ILM strategy.


Are your DNS Servers as Secure and Available as the Rest of Your Network? by  Infoblox

September 30, 2013 - Did you know that DNS is probably a hole in your security? Fortunately, this white paper gives you information about how to protect your servers. Read on to learn what you can do to protect your organization.


Are Your File Transfer Methods Compliant? by  OpenText

October 18, 2013 - This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.


Argyle Conversation with IBM: Big Data Buzz, Less is More by  IBM

July 03, 2013 - In this informative resource, access a Q and A with the Director of Information Lifecycle Governance for IBM Worldwide, Sylvan H. Morley III, as he discusses the impact of big data on modern organizations, and gives advice on overcoming challenges to information lifecycle management.


Article: Best practices for deploying iSCSI SANs in DSS database solutions by  Dell, Inc.

April 27, 2011 - Scalability and availability are key factors of an effective DSS or DW solution. Adhering to the best practices outlined in this article for integrating Dell EqualLogic PS Series iSCSI SAN arrays into the design can help IT administrators create a scalable high-performance infrastructure.


Article: Design Patterns for Case Management by  EMC Corporation

August 01, 2011 - This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes.


Article: How end-to-end services can transform Oracle environments by  Dell, Inc.

April 27, 2011 - The creation of the Dell Services Oracle Practice builds on the long and successful relationship between Dell and Oracle - a collaboration that can offer significant benefits to organizations running Oracle software on Dell hardware. Read this article for more.


Aruba’s MultiUse Video by  Aruba Networks

March 29, 2013 - Why continue managing devices, when you can manage the applications? This video will teach you about enterprise mobile management, and how you can make enterprise mobility a lot simpler. Dive in to learn more.


As Cloud Empowers Lines of Business, Challenges for IT by  Cisco Systems, Inc.

September 16, 2013 - This whitepaper covers the results of a thorough survey that was conducted to determine the impact of cloud technology on IT departments.


As Virtual Machine Migrations Accelerate, Don't Get Left Behind by  SearchServerVirtualization

March 20, 2014 - Live virtual machine migrations have always been a critical part of virtualization, and there are still ways to improve this essential function.


ASG's Business Service Portfolio™ Virtualization Management by  ASG Software Solutions

February 08, 2010 - Read this paper to learn how ASG’s BSP Virtualization Management allows you to continually optimize and monitor the performance health of your entire physical and virtual environment, in addition to discovering application dependencies and reducing VM sprawl.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts