A Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
A Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

Architecting Cost-effective Scalable Oracle Data Warehouses by  Sun Microsystems, Inc.

May 28, 2009 - This paper describes reference configuration and sizing information for Oracle data warehouses on Sun servers for small, medium, and large solutions to meet business intelligence/data warehouse needs.


Architecting Enterprise Social Computing for Business Value by  NewsGator

October 01, 2008 - This paper builds a model of enterprise social computing by analyzing business goals. It builds the architectural components and the relationships between them by starting from a basic definition of social computing and the most common goals.


Architecting Oracle VM Solution with Sun ZFS Storage Appliances and Sun Servers by  Oracle Corporation

September 01, 2010 - With virtualization and its ability to install multiple operating systems (OSs) and run them independently on a single server, IT can effectively consolidate hundreds of servers while optimizing resources and simplifying the infrastructure. Read this paper to find out so much more.


Architecting Storage in Virtualized Environments by  Nimble Storage

December 04, 2013 - This guide will show you how to lay the foundation for an efficient, easy-to-manage storage infrastructure in your virtualized environment.


Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation by  Intel

October 13, 2010 - This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.


Architectural Quality: Design, Development and Testing Rules by  hello2morrow, Inc.

September 01, 2008 - Read this white paper and explore essential architectural quality rules and their individual considerations. Discover a tool that enforces the most important rules automatically during development.


Architectural Strategies for Cloud Computing by  Oracle Corporation

December 20, 2010 - This paper explains how cloud computing is now also evolving in a private variant whereby enterprises set up cloud-like, centralized shared infrastructure with automated capacity adjustment that internal departmental “customers” utilize in a self-service manner. Realization of efficiency, performance, and agility benefits is reinforcing this trend.


Architecture Plan and Design Best Practices: Outputs, Interfaces, and Scheduling by  IBM

March 13, 2014 - Consult this expert e-guide for advice from Gartner Vice President Anne Thomas Manes and other IT professionals on architecture planning, design best practices, and new approaches to building services with service-oriented architecture (SOA).


Archive Attender™ for Exchange - Affordable Email Archiving by  Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available.


Archive tape management made easy: Cut complexities and costs to better handle data requests by  Iron Mountain

December 31, 2013 - Locating and retrieving data from thousands of tapes is time-consuming and costly. It can also create security and compliance issues. This data sheet explains a service that can make handling archive data requests easy by storing tapes offsite.


ArchiveOne Content Archiving Solution by  C2C Systems

May 24, 2010 - Check out C. Keiper's review of the C2C ArchiveOne complete data archiving solution. This review will not only introduce you to this robust solution, but will also break down the ArchiveOne's competitive advantages and weaknesses as well as the different product offerings and packages offered by C2C.


Archiving Compliance with Sunbelt Exchange Archiver by  Sunbelt Software

August 06, 2008 - Archiving for compliance is an important step in securing your company's future. Learn how to implement an email archiving solution that will minimize the burden on your Exchange server and help to avoid costly legal penalties in this whitepaper.


Archiving in the Cloud: Essential Tips and Questions to Answer by  Symantec Corporation

November 20, 2012 - Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.


Archiving Stays Active with LTFS and the Cloud by  SearchStorage.com

March 27, 2013 - Access this exclusive E-Book containing three expert articles regarding archiving with LTFS and cloud services to learn about modern approaches to archiving - and not missing out on value in data that must be retained.


Archiving Storage vs. Data Backup Storage: The Dos and Don'ts of Using Backups and Data Archives by  Quantum Corporation

May 11, 2010 - It's important not to confuse data backups with data archives; backups should not be used as archives and archiving products have many features that backups don’t. Read this white paper as W. Curtis Preston examines these differences further and discusses the dos and don’ts of each.


Archiving with Symantec Enterprise Vault and Dell DX Object Storage by  Dell, Inc.

June 06, 2011 - Check out this short video from Dell to learn about Dell DX Object Storage Platform and Symantec Enterprise Vault - and how the pair can provide a comprehensive archive solution designed to help you better store, manage and discover your unstructured data.


Archiving: A Dell Point of View by  Dell, Inc.

April 27, 2011 - Dell has developed a customer centric strategy designed to provide customers with the right archiving solutions for their IT infrastructure. Access this paper to learn more about Dell's strategy and archiving point of view.


ArcSight Case Study: BMW by  ArcSight, an HP Company

November 17, 2009 - Watch this video case study to learn how ArcSight helped BMW drastically decrease incidence response times.


ArcSight Case Study: Vodafone by  ArcSight, an HP Company

March 10, 2011 - Vodafone, the world's leading mobile communications group, uses ArcSight Enterprise Threat and Risk Management platform to get a consolidated global view of security, increase the efficiency in security operations and increase the reaction time to cyberattacks or security breaches.


ArcSight IdentityView: Increasing Security and Compliance with a 360-Degree View of User Activity by  ArcSight, an HP Company

June 15, 2010 - This paper describes ArcSight IdentityView, a new application designed to leverage the power of the ArcSight SIEM Platform and apply it to user monitoring, for security and compliance purposes.


ArcSight Logger: Universal Log Management Solution by  ArcSight, an HP Company

March 04, 2011 - ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.


ArcSight Case Study: Experian by  ArcSight, an HP Company

May 11, 2010 - Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study.


Are Big Files Big Problems? by  OpenText

October 17, 2013 - This paper discusses the challenges associated with file transfer solutions and how managed file transfer solutions solve these problems.


Are businesses taking chances when it comes to managing outsourcing risk? by  ComputerWeekly.com

December 08, 2010 - Nearly 95 percent of organisations buy, provide or both buy and provide outsourced services and functions, in which they face inherent risks created by new and unforeseen challenges.


Are We Getting Any Closer to Self-Service Business Intelligence? by  Dell Software

December 28, 2010 - The need for self-service business intelligence (BI) is greater than ever. And while the market is filled with BI tools, they don't readily enable everyone to access and work with data


Are you Agile Enough? by  IBM

September 09, 2009 - If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]


Are You Doing All You Can to Protect Your Critical Business Information? by  Citrix

December 31, 2013 - Gain insight on the current vicious threat landscape and 7 information security best practices to keep your data protected wherever it goes.


Are You Looking for a Way to End the Finger Pointing and Improve your Customers’ Experience? by  CA Technologies.

April 30, 2014 - This white paper explains the benefits of a monitoring solution that equips enterprise IT organizations and service providers with capabilities to dramatically improve service quality and reduce the costs and time of IT service delivery.


Are you minding your business's reputation? What can you do to mind it better? by  IBM

May 22, 2013 - Changing social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.


Are You Prepared for a Software Audit? by  CDW Corporation

February 27, 2014 - Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.


Are You Providing Your Customers with the Satisfying Experience That will Keep Them Coming Back? by  Cisco Systems, Inc.

September 01, 2008 - In today's tough economic times, businesses face a daunting challenge: do everything possible to attract and retain customers. This paper examines eight strategies for creating a relationship with your customers that will keep them coming back.


Are you ready for 2020? by  ComputerWeekly.com

August 02, 2013 - Dan Wood, senior manager for software market development at HP, discusses the results of HP's Enterprise 2020 study in this presentation.


Are you ready for ANALYTICS 3.0? by  SAS

April 17, 2014 - Join analytics pioneer, Tom Davenport in the following Q&A as he explores the evolving state of analytics. Learn what you can do to prepare for analytics 3.0, how you can intend to get there, which tools you need as well as the supporting roles to make it all happen.


Are You Ready for Cloud-Based HD Video Collaboration? by  LifeSize

September 27, 2011 - At last, HD video collaboration has become inexpensive enough and easy enough for just about any business to use.


Are You Ready for Economic Bounce Back? by  Micro Focus, Ltd

October 27, 2009 - This paper examines the concept that preparing for economic recovery is not something that can wait; it is something that businesses should plan for now. It will introduce enterprise application migration strategies that can be considered within any organization and also emphasize the importance of forward thinking and planning in down economy.


Are You Ready for Marketing Automation? by  Marketo

June 27, 2013 - Marketing automation offers many benefits to an organization, but it also requires a certain degree of readiness. Take a look at this checklist to determine if your company is ready to use marketing automation by evaluating your marketing initiatives in 10 key areas.


Are you ready to handle the challenges of modern backup? by  SearchDataBackup.com

March 19, 2014 - This white paper explains some of the toughest backup challenges facing IT professionals today including data growth and virtual servers. It goes over the ins and outs of backing up large volumes of data and talks about the importance backing up data for mobile devices due to the rise of popularity in BYOD.


Are you running a Smarter data centre? by  IBM

October 16, 2013 - This white paper shows the results of a survey of more than 300 IT leaders in terms of data center efficiency.


Are You Securely Delivering Enterprise Data and Services? by  Webroot

November 10, 2011 - Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.


Are you securing the right things? How to effectively secure your data by  ComputerWeekly.com

October 13, 2010 - The idea of putting walls around the network is being replaced by a drive to understand what really needs to be secured and how to secure it. This paper examines the relative merits of the different approaches.


Are you Struggling to Manage your Healthcare Data Deluge? by  Iron Mountain

May 21, 2013 - This white paper highlights a modern approach to health care information lifecycle management, as well as the need to team up with partners that can help deliver it. Read now to learn how to make an accurate assessment of you ILM strategy.


Are Your File Transfer Methods Compliant? by  OpenText

October 18, 2013 - This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.


Argyle Conversation with IBM: Big Data Buzz, Less is More by  IBM

July 03, 2013 - In this informative resource, access a Q and A with the Director of Information Lifecycle Governance for IBM Worldwide, Sylvan H. Morley III, as he discusses the impact of big data on modern organizations, and gives advice on overcoming challenges to information lifecycle management.


Article: Best practices for deploying iSCSI SANs in DSS database solutions by  Dell, Inc.

April 27, 2011 - Scalability and availability are key factors of an effective DSS or DW solution. Adhering to the best practices outlined in this article for integrating Dell EqualLogic PS Series iSCSI SAN arrays into the design can help IT administrators create a scalable high-performance infrastructure.


Article: Design Patterns for Case Management by  EMC Corporation

August 01, 2011 - This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes.


Article: How end-to-end services can transform Oracle environments by  Dell, Inc.

April 27, 2011 - The creation of the Dell Services Oracle Practice builds on the long and successful relationship between Dell and Oracle - a collaboration that can offer significant benefits to organizations running Oracle software on Dell hardware. Read this article for more.


Aruba’s MultiUse Video by  Aruba Networks

March 29, 2013 - Why continue managing devices, when you can manage the applications? This video will teach you about enterprise mobile management, and how you can make enterprise mobility a lot simpler. Dive in to learn more.


As data grows, so do the risks: How to improve data and app sec by  IBM

September 30, 2012 - Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.


As Virtual Machine Migrations Accelerate, Don't Get Left Behind by  SearchServerVirtualization

March 20, 2014 - Live virtual machine migrations have always been a critical part of virtualization, and there are still ways to improve this essential function.


ASG's Business Service Portfolio™ Virtualization Management by  ASG Software Solutions

February 08, 2010 - Read this paper to learn how ASG’s BSP Virtualization Management allows you to continually optimize and monitor the performance health of your entire physical and virtual environment, in addition to discovering application dependencies and reducing VM sprawl.


ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information by  ASG Software Solutions

May 25, 2010 - The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.


ASG-Discovery and Dependency Mapping (ASG-DDM) by  ASG Software Solutions

February 23, 2010 - This paper explains ASG's unique, automated solution for discovery and dependency mapping for change and configuration management.


ASG-Discovery and Dependency Mapping (ASG-DDM)™ by  ASG Software Solutions

May 25, 2010 - Understanding which hardware and software components support which business systems is extremely difficult. For many years, the clipboard and spreadsheet appear to have been the tools of choice, with the result that many decisions were made based on outdated and inaccurate information. Read this paper to find out more.


ASG-Rochade the Leading Metadata Repository by  ASG Software Solutions

ASG-Rochade is a metadata management solution for large and medium-sized organizations. It is a strategic, facilitating technology that manages information about data and systems across your enterprise.


ASG-Total Content Integrator™(TCI) and Microsoft® Office® SharePoint Server (MOSS) by  ASG Software Solutions

February 08, 2010 - Read this paper to see how Microsoft Office SharePoint Server (MOSS) brings together collaboration and document management in a way that is extremely easy for knowledge workers to learn and use.


Ashurst Australia Focuses on Domestic and International Growth by  IBM

March 31, 2013 - This exclusive case study reveals how the right analytics strategy enabled the law firm Ashurst Australia to address the challenges of business growth by analyzing business performance, identifying opportunities for improvement, and more.


Asigra Cloud backup Newsletter featuring Gartner Research for MSPs by  Asigra

August 23, 2011 - The introduction of smart phones has blurred the line between the professional and personal uses of IT. To stay in control of your organization's corporate data footprint – from desktops to laptops to mobile devices – organizations need to find a long term sustainable data protection strategy.


Ask Questions Until You Get the Right Answers and the Right Network by  Cisco Systems, Inc.

December 08, 2011 - Establishing a relationship with a trusted reseller can help you turn your network into something that matches your business and fulfills the specific needs of your organization.


ASOS: The boardroom view of IT by  ComputerWeekly.com

September 07, 2012 - Nick Beighton , CFO of the online fashion retailer ASOS.com, draws on his experience in both IT and finance to offer tips to CIOs on building credibility with the board of directors.


Assemble Your Information with IBM Cognos Enterprise by  IBM

November 08, 2013 - The following webcast depicts the best way to sift through your data to find the most relevant and actionable insight. Discover the importance of mining intelligence from data and what you can do to take advantage of this ability to help drive your business forward.


Assess IT as a service : Enterprise Cloud Services–Virtual Private Cloud, Proof of Concept by  Hewlett-Packard Limited

August 16, 2012 - Read this white paper to learn how you can test out enterprise cloud services – specifically the virtual private cloud – and see how it performs in conjunction with your current systems.


Assess Virtualization Security Risk in Six Simple Steps by  Intel

August 19, 2011 - There are several critical issues every security pro must consider when evaluating risk in virtual environments. This expert tip provides six simple steps to perform a virtualization security risk assessment and highlights key points to ease security integration as your virtualization project comes together.


Assess your mobile infrastructure by  IBM

February 24, 2014 - This informative resource provides a helpful self-assessment so you can identify areas where you can improve the IT infrastructure that supports mobility within your organization so you can enhance your mobile environment.


Assessing ROI for Mobile Acceleration Clients by  Riverbed Technology, Inc.

April 25, 2014 - This paper examines the business case for deploying mobile WAN optimization client software and builds an ROI model based on the experiences of three organizations.


Assessing the benefits and costs of SQL Server Virtualization by  SearchSQLServer.com

June 19, 2013 - Virtualizing SQL Servers can be a costly venture. With the maturation of technology in recent years, though, it can mean increased productivity, and—overtime—less power consumption.


Assessing the Current Cloud Marketplace: Report on the Top 10 Cloud Vendors by  HP and Intel

November 22, 2013 - This whitepaper features a detailed report on the current state of the cloud market.


Assessing the Financial Impact of Downtime by  Vision Solutions

August 16, 2010 - This white paper will address the assessment of threats to your IT operations, inclusive of systems, applications, and data, and will guide you through the process of developing solid numbers around the potential costs they represent.


Assessing the Total Cost of Ownership for BI by  LogiXML

January 31, 2012 - This report provides mid-market organizations a framework for evaluating the total cost of ownership (TCO) of business intelligence (BI) solutions.


Assessing the Value of Cloud Security Threat Intelligence Services by  Hewlett-Packard Company

April 24, 2013 - This expert E-Guide deep dives into what a global threat intelligence service is, how well the services perform and if they are worth the investment. Read on to learn more.


Assessing VMware View's Full Value by  VMware, Inc.

May 02, 2011 - Many enterprises utilize virtualization to support desktop workloads, improve data security, enable thin clients, and simplify data backup. However, there are challenges and obstacles associated with desktop virtualization that can hinder these benefits. Learn the necessary steps to avoid and overcome these common pitfalls.


Assessing Your Cloud Backup Opportunity by  Asigra

April 28, 2014 - This guide provides the key questions and discussion points you'll need to consider before integrating cloud backup into your services portfolio.


Assessing Your Cloud Backup Opportunity: A guide to addressing 7 key questions about your customers by  Asigra

December 30, 2011 - <p>This resource details seven questions and discussion points you should consider before integrating cloud backup into your service offerings. </p>


Assessing your IT infrastructure for desktop virtualization by  F5 Networks

November 17, 2011 - Virtual desktops can help your organization reduce costs and centralized applications. But to reap its benefits, your IT infrastructure must be able to fully support VDI, otherwise, you'll run into performance and stability issues. Learn best practices and how to avoid these VDI pitfalls in this e-guide.


Asset and service management solutions to manage government assets by  IBM

April 15, 2011 - Read this brochure and find out how IBM Maximo Asset Management helps government agencies address accountability with asset optimization.


Asset Management to Support Product Lifecycle Management by  IBM

October 01, 2009 - Leading-edge manufacturers are discovering that they can improve production efficiencies and manage MRO expenditures by integrating their Product Lifecycle Management (PLM) with Enterprise Asset Management (EAM) systems.


Asset Management to Support Product Lifecycle Management (PLM) by  IBM

December 07, 2010 - Many manufacturers are already using Product Lifecycle Management (PLM) technology to design products, test them and automate their production. This same technology can be integrated with Enterprise Asset Management (EAM) solutions, like IBM’s Maximo® Asset Management to manage manufacturing assets involved in production.


Asset Management: Improve Efficiency and Asset Lifecycle with Mobility by  Motorola RFID Solutions

November 30, 2007 - Whether you need to scan bar codes or read RFID tags on boxes of office supplies, Motorola's mobile asset management solutions enable the easy, accurate and cost effective tracking of asset location and status-- with minimal administrative effort.


Asset: Healthcare 2015 and U.S. Health Plans New Roles, New Competencies by  IBM Line of Business

February 01, 2008 - The U.S. healthcare system is on an unsustainable path that will force its transformation.


Assuaging Concerns about Public Cloud Services And APM: Expert Roadmap by  XO Communications

January 21, 2014 - In this e-guide, cloud networking expert Amy Larsen DiCarlo shares her insight on the public cloud, with emphasis on use cases, common concerns, and how to choose the right provider. Click through to also find 5 FAQs about network-based application performance management (APM) to ensure your business stays up-to-speed.


Assured Federated Records Management - Achieving Compliance across the Enterprise by  EMC Corporation

March 12, 2008 - Compliance is now a major issue for organizations and they're beginning to rethink their records management strategies. Read this white paper to learn about a records management solution that effectively addresses all of the needs required for this task.


Assuring Asset Documentation Integrity by  McLaren Software

February 01, 2008 - In this whitepaper, we will discuss best practices for assuring the integrity of your asset documentation.


Assuring Enterprise-Quality Agile Development by  HP Software

August 15, 2011 - This white paper provides an overview of the advantages of hybridizing agile development methods with the QA lessons learned from previous methods. Learn how this strategy provides the best of both worlds for developing flexible, secure software products.


Assuring Next Generation Backhaul Deployments with Performance Visibility by  InfoVista Corporation

November 22, 2011 - Read this whitepaper to discover the challenges Wireless SPs have in managing Carrier Ethernet-powered backhaul networks and how they can achieve operational excellence.


Assuring Regulatory Compliance in Your Mainframe Environment by  IBM

June 01, 2008 - In this webcast you will get an over of the regulatory context and the issues compliance raises for the IBM mainframe environment.


Assuring Software Security Through Testing by  (ISC)2 UK Ltd

February 25, 2014 - This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.


AstraZeneca: Success Story by  SuccessFactors

April 27, 2012 - AstraZeneca was looking for a way to automate its manual duty assignment and logging training processes. Read this case study to learn how they accomplished this by implementing a learning management system to automate and streamline the assignment of all regulatory and job-specific training.


AT&S Increases Efficiency and Business Agility with Improved IT Management by  CA Technologies.

October 31, 2013 - This case study tells how one organization was able to leverage the lastest infrastrucutre monitoring solutions and how it helped them mitigate the challenges associated with tight budgets and increasing demands.


AT&T and IBM's Private Cloud Partnership:  From Competition to Coopetition by  IBM

November 30, 2012 - Access this Frost & Sullivan report for key findings on how the joint program between cloud and network providers will affect the individual providers, as well as the customers.


AT&T Brings Consumers Closer to Their Favorite Musicians with Red Light Management by  AT&T Corp

November 02, 2011 - This brief white paper examines the business benefits associated with promotional marketing campaigns aimed at barcode scanning via consumer mobile devices.


AT&T Global Network Client: Providing Secure Remote Access with the AT&T Global Network Client by  AT&T Corp

October 24, 2011 - The AT&T Global Network Client provides secure remote network access anywhere, at any time.


AT&T Global Network Pandemic Preparedness by  AT&T Corp

February 07, 2007 - Having a business continuity plan in place is crucial to surviving an unforeseen catastrophic event. This white paper details some important concerns and suggestions for making sure your enterprise's critical operations can withstand a crisis.


AT&T Mobile Remote Access Services by  AT&T Corp

October 21, 2011 - AT&T's Mobile Remote Access Services provides flexible, highly secure access to corporate assets for all users.


AT&T MPLS: The Platform for your Apps by  AT&T Corp

August 05, 2010 - Watch this video to learn how to maximize the capabilities of your MPLS Network. This is the first in a series of videos that will help you understand how to make your VPN more efficient.


AT&T Network-based IP VPN Remote Access (ANIRA) by  AT&T Corp

October 24, 2011 - AT&T Network-based IP VPN Remote Access (ANIRA) offers remote users and traveling users access to corporate information & productivity applications on the fly, whether away from or within the office.


AT&T Virtual Tunneling Service by  AT&T Corp

October 24, 2011 - AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.


AT&T Business Continuity Survey: 2008 by  AT&T Corp

September 01, 2008 - The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.


At-a-Glance: Cisco Regional WAN Solution Overview by  Cisco Systems, Inc.

July 11, 2012 - Read this white paper to learn how to upgrade your enterprise networking solution to deliver exciting new services such as cloud computing, virtual desktops, videoconferencing, and more to your remote branch-office environments in a secure, highly scalable, tightly integrated manner.


Atrion Enhances Managed Services and Boosts Profit Margins with Nimsoft by  Nimsoft, Inc.

November 04, 2009 - Atrium needed help gaining end-to-end service level monitoring insights and finding a monitoring platform with a strategic vendor partnership that could help support business growth objectives. Read this case study to learn about the problems Atrion faced and how Nimsoft products helped them overcome those challenges.


Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit by  Attachmate Corporation

March 30, 2012 - This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!


Attachment Spam - The Latest Trend by  GFI Software

March 18, 2008 - This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.


Attack Mitigation System by  Radware

October 10, 2011 - Radware’s Attack Mitigation System (AMS) is a real-time network and application attack mitigation solution that protects the application infrastructure against network and application downtime, application vulnerability exploitation, malware spread, information theft, web service attacks and web defacement. View now to learn more.


Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware by  Sophos, Inc.

April 11, 2011 - Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore.


Attacks on Point of Sale Systems by  Symantec Corporation

March 11, 2014 - Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.


Audit Tracking & SOX Compliance by  RevSoft

September 01, 2008 - Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.


Audits, Compliance and Security: IT Pros share their experience by  Dell Software

May 16, 2014 - Changes to your Windows environment can be dangerous to your network and applications, but event logging and change reporting can be time-consuming and ineffective. Fortunately, this helpful white paper introduces a way to audit changes from a central web-based console, saving time, reducing risk, and quickly identifying security violations.


Augmenting the Value of ERP to Achieve the Perfect Plant by  Apriso Corporation

September 10, 2008 - This paper reviews multiple compelling issues of establishing and maintaining connectivity to manufacturing operations to achieve the Perfect Plant through an existing ERP system.


Augmenting the Value of ERP with an Operations Execution System by  Apriso Corporation

June 01, 2008 - This white paper reviews the history behind ERP deployments and why today's business requirements necessitate direct, real time integration between corporate planning applications and the shop floor.


August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders by  Information Security Magazine

August 08, 2011 - This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.


August Technical Guide on Authentication by  SearchSecurity.com

August 06, 2012 - This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.


August 2011 SharePoint eZine: PRACTICAL IT STRATEGIES FOR ENTERPRISE COLLABORATION by  SearchContentManagement

June 30, 2011 - In this edition of our quarterly SharePoint e-zine, you'll find expert advice on setting up a successful SharePoint 2010 programs, avoiding user-adoption problems and using the latest administrative features to wrangle good performance.


Aungate Policy Management by  ZANTAZ

December 01, 2007 - Aungate Real-Time Policy Management technology automatically evaluates documents for their fiscal, legal, operational and historic value.


Aungate Real Time Monitoring by  ZANTAZ

December 01, 2007 - Aungate's Policy Management module sets a new benchmark in enterprise communication and regulatory monitoring.


Austbreak Improves Total Cost of Ownership with SYSPRO by  SYSPRO

December 31, 2013 - In this brief case study, learn how the Australia-based machinery manufacturer Austbreck eliminated operational challenges and improved the total cost of ownership by overhauling its ERP system.


Austin Energy – Implementing Effective BI and Data Warehousing in Weeks by  Infobright, Inc.

November 16, 2010 - This case study looks at how an Austin, TX energy company, Austin Energy, has incorporated business intelligence (BI) best practices to achieve effective data warehousing in a matter of weeks.


Australian consulting firm meets strong growth demands by  Dell, Inc.

October 31, 2012 - In this brief case study, you will discover how an Australia-based international consulting company supports its high virtualized environment and increases volumes of data generated through consultancy projects and replace their aging SAN.


Australian document process outsourcing firm realizes benefits of virtualization by  Dell, Inc.

November 30, 2012 - This short case study reveals how one company easily and affordably deployed a next-generation infrastructure connected to a storage system that keeps pace with all of their needs.


Australian document process outsourcing firm realizes benefits of virtualization by  Dell, Inc. and Intel®

November 29, 2012 - This white paper presents a key case study of how Speedscan consolidated their disparate physical infrastructures within a single virtualized data center to improve energy efficiency by 92%.


Australian technology service provider scales to enterprise grade solutions by  Dell, Inc. and Intel®

December 05, 2012 - This white paper presents a case study of an international technology service provider that improved efficiency by deploying highly scalable blade servers and storage arrays.


Authentication in the Enterprise: Current and Changing Requirements by  PistolStar, Inc.

August 25, 2009 - This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.


Author and deploy rules using WebSphere Decision Management by  IBM

July 07, 2011 - Learn how the WebSphere ILOG Business Rules Management System (BRMS) can automate decision making for data validation, eligibility and pricing. This demo uses an insurance industry scenario to show how the WebSphere ILOG BRMS can be used by organizations.


Author and deploy rules using WebSphere ILOG JRules Business Rules Management System by  IBM

December 12, 2010 - Learn how the WebSphere ILOG JRules BRMS can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions.


Authoring reports with Cognos Business Intelligence by  IBM

November 06, 2013 - The following white paper discusses how a new technology has effectively eliminated the challenges associated with report authoring and what you can do to satisfy the need of your company to maintain and communicate the best reports possible.


Authoritative Guide to Advanced LTE Testing by  Ixia

March 06, 2014 - Find out how to measure the critical elements of network performance under real-world conditions and extreme scale in order to take the guesswork out of determining network quality.


Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines by  Dell, Inc.

November 10, 2008 - Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.


Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines by  Dell | EqualLogic

November 01, 2008 - Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.


Auto-Snapshot Manager/Microsoft Edition for Hyper-V by  Dell, Inc.

March 25, 2009 - Dell's Auto-Snapshot Manager / Microsoft Edition is an innovative bundled data protection feature of the Dell EqualLogic PS Series iSCSI SAN. It's designed to help deliver high-performance, redundant, highly-available storage platforms for Hyper-V deployments - supporting departmental to mission-critical Windows server applications.


Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines by  Dell, Inc.

June 24, 2009 - This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.


Auto-Snapshot Manager/VMware Edition in Action by  Dell, Inc.

March 15, 2008 - Auto-Snapshot Manager/VMware Edition is a new feature of the Dell EqualLogic PS Series iSCSI SAN that enables fast online backup and quick restores of Virtual Machines.


Auto-Snapshot Manager/VMware® Edition: Automated, Integrated, and Scalable Protection of Virtual Machines by  Dell, Inc.

September 01, 2008 - Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines.


Automate Spending Controls for Big Savings, a Case Study by  ExpenseWatch.com

March 24, 2008 - In this case study, learn how one company automated company expense reporting, saving thousands of dollars a year and accelerating the review and approval process.


Automate Storage Tiering Simply and Efficiently with Dell EqualLogic PS Series Virtualized iSCSI SANs by  Dell, Inc.

December 01, 2011 - Tiered storage is a smart storage solution that directs application workloads to a specific storage location (or "tier") based on performance and cost characteristics. This white paper provides an introduction to tiered storage; learn exactly how tiered storage functions, and how to determine which data should be sent to which tier.


Automate storage tiering simply and efficiently with Dell EqualLogic PS Series virtualized iSCSI SANs by  Dell, Inc.

August 03, 2010 - Automated Storage Tiering features provided standard on Dell™ EqualLogic™ PS Series SANs are designed to help organizations to reduce costs, improve performance, optimize SAN storage, and much more. Read this solution brief to learn more about the features and business benefits.


Automate to Thrive: Driving Business Agility with Effective Release Management by  SERENA Software, Inc.

April 03, 2012 - This white paper gives an overview of the challenges release management presents, three tips for improving your software release strategies, and insight on how effective release management is poised to become a driver of competitive advantage.


Automate Your Business Processes with the Digital Mailroom by  Kofax, Inc.

December 31, 2013 - Check out this exclusive white paper to uncover the tool capable of transforming documentation reception and processing into a more efficient "digital mailroom", so you can improve customer service, reduce costs and more.


Automate Your Cloud-based Services: HP Business Cloud for SAP Landscape by  HP & Intel®

December 20, 2010 - Enterprises depend on SAP applications to support their mission-critical business processes today more than ever before. Read this solution brief to discover how your organization can take advantage of the speed, agility and unsurpassed automation of cloud-based services.


Automated Business Intelligence: Delivering Real Business Value, Quickly, Easily, and Affordably by  Birst

June 19, 2009 - This White Paper explores how traditional approaches fall short, what the automated solution and its benefits look like, how the on-demand delivery model best represents the integrated stack necessary for automation, and how the automated, on-demand model brings the benefits of BI to a far broader audience than ever before.


Automated Compliance: Making the Case and Reaping the Rewards by  Tripwire, Inc.

March 30, 2009 - Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.


Automated Data Backup: Protect Distributed Data with a Robust, Security-Rich Backup and Recovery System by  IBM

August 04, 2011 - Your business depends on consistent access to vital data. Without an automated data backup system, your organization can be vulnerable if your storage systems are compromised. This data sheet discusses how IBM can help with a professionally managed, cloud-based data protection service.


Automated Disaster Recovery with VMware SRM and Dell EqualLogic iSCSI SANs by  Dell, Inc.

September 01, 2008 - Dell EqualLogic™ PS Series arrays and VMware® Site Recovery Manager (SRM) software provide integrated, cost-effective, automated site recovery and testing for enterprise data centers.


Automated Energy Efficiency for the Intelligent Business by  Intel Corporation

April 20, 2009 - By replacing aging single-core processor-based servers with new, more energy-efficient servers, you can gain capacity to grow and to increase IT performance using fewer servers. The estimated cost savings from energy and other operating cost efficiencies can pay for new servers in a an estimated 8 months.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts