B Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
B Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

B.F. Saul Company Finds Flexibility in Sharing and Securing Information with TITUS by  TITUS

March 19, 2012 - This brief white paper details a SharePoint security system that provides high-level security for important content while also allowing end-users to easily access the documents they need.


B.Y.O.D Without the Risk by  Juniper Networks, Inc.

June 06, 2012 - As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.


B2B Cloud Integration: A strategic approach to optimizing your value chain by  IBM

November 01, 2013 - This E-book presents an overview of the B2B integration landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution.


B2B Collaboration: Assessing the ROI of Process Integration Business Value Research Series by  Sterling Commerce Manufacturing Solutions

March 01, 2008 - Business and IT leaders are under increasing pressure to improve B2B collaboration and the electronic communication capabilities of their organizations. This report looks at the key drivers for B2B collaboration in both the purchase-to-pay and...


B2B Collaboration: How On-Demand Platforms Accelerate Value and Impact TCO by  E2open

February 01, 2007 - This report provides a value framework that can help companies validate if on-demand solutions are right for their B2B collaboration needs.


B2B Integration and Collaboration: Strategies for Building a ROI Business Case by  IBM

November 16, 2011 - Aberdeen conducted a follow-up survey in May 2011 in which over 60 organizations detailed their B2B integration and collaboration issues and challenges - specific focus was given to return on investment (ROI) related issues. This research excerpt summarizes the findings of this survey.


B2B integration tools for a streamlined value chain by  IBM

August 31, 2012 - Did you know that while 73% of executives say B2B integration is key to business success, only 17% believe they've actually achieved this goal? If you're struggling to manage a complex value chain of partners, suppliers, customers, and distributers, the right B2B integration tools may be the answer to your woes.


Back to Business: A Practical Look at Cloud Portfolio Management by  Innotas

September 21, 2013 - Has your IT organization become a house of cards?  With new projects, goals, and tasks—come applications that need management and maintenance. In this whitepaper, you will find out how Cloud Portfolio Management (CPM) helps realign critical projects and applications with business goals of the organization.


Back to the Future: How Linear Tape File System (LTFS) and Other Innovations Are Returning Tape to a Production Storage Role in the Data Center by  Iron Mountain

July 17, 2013 - Several recent tape advances have put this technology back on the IT radar, turning recent attention away from hard disks, flash SSDs, and cloud storage. This expert video examines the latest developments leading this comeback, including the availability of free file systems, new partitioned media offerings from a variety of vendors, and more.


Back to the Future: The Hybrid Organisation: People by  ComputerWeekly.com

June 15, 2010 - This ‘thought paper’ draws a parallel between young people in the 1960s and 1970s, the group that became known as the baby boomer generation and young people of today, often termed Generation Y or Digital Natives.


Back to the Future: The New IT Infrastructure Opportunity by  Avocent

June 08, 2011 - Access this exclusive resources to discover new technology and solutions to address security and operating expense (OPEX) issues related to distributed computing such as thin client, fast client, diskless workstations, SaaS, and VDI.


Back Up More Data, In Less Time, At Lower Cost by  PHD Virtual Technologies Inc.

March 09, 2009 - By conducting backup and restoration of virtual infrastructures in a unique and smarter way, esXpress is able to achieve unprecedented economies of scale, simplicity of management and cost-effectiveness.


Backing up SharePoint: 5 Different Options by  Hewlett-Packard Company

June 07, 2011 - This SearchStorage.com E-Guide looks at different backup options for Microsoft SharePoint to help make this required process easier. Read on to learn native backup and recovery options, third-party SharePoint backup options and more.


Backing Up Virtual Servers by  BakBone

April 15, 2009 - In this presentation transcript, backup expert, Mark Bowker, answers questions regarding virtual server environments and how their deployment affects the backup process.


Backing up VMs: Traditional apps vs Virtual Machine backup software by  Quantum Corporation

March 14, 2012 - Check out this SearchVirtualStorage.com E-Guide for best practices regarding VM backup. Learn about different backup and data protection solutions designed to handle today's demanding workloads, and discover how you can start getting more out of your virtual environment. Read on to learn more.


Backup by  Panasas, Inc.

August 12, 2010 - The explosion of unstructured data and the advent of scale out NAS systems has caused backup of these systems to be an ever growing concern. This white paper describes the overall strategy for backup and restore taking into account the tape subsystem, networking, file system workload and administrative policy.


Backup & Recovery for VMware Environments with Avamar 6.0 by  EMC Corporation

October 31, 2011 - This white paper highlights several new features within EMC® Avamar® 6.0 that specifically target and greatly advance the capabilities and performance of VMware® data protection.


Backup = Archive: Can You Tell the Difference? by  CommVault Systems, Inc.

September 01, 2008 - The way we think about backup and archiving has changed recently. This stems from advances in synthetic and incremental capabilities, as well as a breadth of support for archiving information across data management sources. Think you know the difference?


Backup Acceleration with EMC NetWorker and Snapshot Management by  EMC Corporation

November 07, 2011 - By combining management of heterogeneous replication and snapshot technologies with backup operations, EMC NetWorker provides a unified "command-and-control" platform to deliver unparalleled performance and reduced complexity for mission-critical application and data protection. Read this white paper to learn more.


Backup and Data Protection approaches in today’s storage market by  Hewlett-Packard Company

December 13, 2010 - Download this guide to find out how to go about making sure your data and more importantly your systems are secure and protected. Going along with this topic and these threats, this guide explores data protection options and the next generation of APIT technologies that are taking the market by storm.


Backup and Recovery for Enterprise Applications in VMWare Environments by  EMC Corporation

March 31, 2011 - This ESG white paper is your key to improving backup operations in your virtual environment. Read on to learn more.


Backup and Recovery for Enterprise Applications in VMware Environments by  EMC Corporation

October 14, 2011 - An in-depth survey of 463 senior IT professionals in both large midmarket and enterprise-class organizations in North America revealed some interesting trends around server virtualization.


Backup and Recovery for Microsoft Exchange Server - Data Domain Deduplication Storage Best Practices Guide by  EMC Backup and Recovery Solutions

May 08, 2009 - In many companies, Microsoft Exchange is now commonly viewed as a mission-critical application. Protecting Exchange information is critical and backup is still the primary method used. This paper focuses on the traditional backup and recovery practices for Microsoft Exchange Server along with solutions from Data Domain.


Backup and Recovery for Microsoft SQL by  EMC Corporation

May 17, 2012 - This white paper maps out how EMC Data Domain deduplication storage systems preserves data integrity, meets stringent RTO/RPO objectives, and integrates easily into a multitude of active SQL or third-party backup environments.


Backup and Recovery for Oracle Database 11g with EMC Deduplication by  EMC Corporation

November 07, 2011 - This white paper provides guidelines for the use of EMC Data Domain deduplication for Oracle Recovery Manager backup over a Network File System mount.


Backup and Recovery for Oracle® Databases With Snapshot Feature of Sun™ Storage 7000 Unified Storage System by  Oracle Corporation UK Ltd

April 01, 2010 - Sun™ Storage 7000 Series Unified Storage System has comprehensive data protection features that provide instant snapshots, cloning, rollback, and remote replication. This document shows the methodologies to be followed for performing backup and recovery operation of Oracle® databases using the snapshot, clone, and rollback features.


Backup and Recovery for VMWare by  EMC Backup and Recovery Solutions

November 19, 2009 - As data growth and virtualization continue to change the IT paradigm, backup strategies must evolve to deliver even greater consolidation and value. This webcast will examine how virtualization changes backup, the benefits of deduplication, as well as EMC’s Avamar and Data Domain solutions and how they work in VMware environments.


Backup and Recovery for VMware using EMC Data Domain Deduplication Storage – Best Practices Planning by  EMC Backup and Recovery Solutions

August 25, 2010 - This paper provides general information for using EMC Data Domain deduplication storage to back up VMs using VMware Consolidated Backup (VCB) with VMware Infrastructure 3(VI3).


Backup and Recovery in VMware Environments by  EMC Backup and Recovery Solutions

August 18, 2010 - Learn more about EMC backup and recovery solutions for VMware, which combine industry-leading deduplication storage and software to help you fully realize the benefits of virtualization.


Backup and Recovery Made Simple with EMC NetWorker by  EMC Corporation

December 20, 2006 - Centralize, automate and accelerate your data backup and recovery. Download this white paper and learn how to securely manage and protect your critical business data.


Backup and Recovery Performance and Best Practices for Exadata Cell and the Oracle Exadata Database Machine by  Oracle Corporation

June 30, 2010 - One of the key operational aspects of deploying a Sun Oracle Database Machine is to ensure that database backups are performed and restoration of the Oracle Database is possible if disaster strikes. This paper describes the best practices for setting up the optimal backup and recovery strategy to protect your mission-critical data.


Backup and Recovery Requirements for Business-Critical Applications by  SearchStorage.com

December 17, 2013 - In this e-guide, learn strategies to determine what data is considered most important. Also, read about the different ways to select and establish an effective backup policy to ensure essential data is properly monitored.


Backup and Recovery with Oracle’s Sun ZFS Storage Appliances and Oracle Recovery Manager by  Oracle Corporation

February 07, 2011 - Oracle Recovery Manager is the preferred backup solution for Oracle database environments and is engineered to work together with Oracle’s Sun ZFS Storage Appliances to meet today's challenging backup requirements. Advantages of Sun ZFS Storage Appliances include; simplicity, speed, savings, and reduced risk. Read on to learn more.


Backup and Recovery: Accelerating Efficiency and Driving Down IT Costs Using Data Deduplication by  EMC Backup and Recovery Solutions

March 05, 2010 - Deduplication is a technology that not only aids in accelerating storage efficiency by reducing cost but also alleviates physically constrained data centers. This white paper covers the basics of deduplication and lists considerations for evaluating deduplication technology.


Backup and Recovery: The Benefits of Multiple De-duplication Policies by  Quantum Corporation

October 23, 2008 - This white paper explains the differences between the de-duplication approaches, discusses the strengths and limitations of each, shows how different backup tasks are likely to benefit from them, and talks about the business benefits.


Backup and Restore Service for Data Protection: Facilitate Greater Business Resilience with Onsite Data Protection by  IBM

August 12, 2011 - What is your organization's rate of successful data backup and restore? Are you worried about your exposure to data loss? Unsuccessful backups and long restore times can negatively impact your business. This data sheet discusses how IBM can help with an on-site data protection and business resilience solution.


Backup Appliances: Key Players and Criteria for Selection by  SearchStorage.com

June 21, 2013 - This E-Guide provides an up-to-date definition of today's backup appliances and points out the pros and cons of using them.


Backup Apps: State of the Art by  SearchStorage.com

January 22, 2013 - Check out this expert January 2013 Storage Handbook to explore backup apps going into the new year, and get the scoop on cloud backup and DR, snapshots, VM backups and big data protection.


Backup Basics: Disk, CDP and Cloud by  Barracuda Networks

March 28, 2013 - Check out this exclusive SearchDataBackup.com E-Guide for an expert look at backup approaches including continuous data protection (CDP), cloud and disk.


Backup Best Practices and Solution Selection Criteria by  Dell Software

February 24, 2014 - This E-Guide higlights the trend of virtual machine deployment and focuses on the ways in which VM backup purchases can go wrong. It also offers ways to avoid those pitfalls.


Backup critical data with smart solutions by  Hewlett-Packard Company

August 07, 2013 - Check out this short video to explore one industry-leading vendor's backup and data protection solutions. Whether you're just starting out, building momentum or expanding your business, these storage solutions for backup and data protection can help you. Watch now to learn more.


Backup Deduplication: Experts Compare 3 Methods and Quantify Capacity Reductions by  SEPATON

June 18, 2013 - This E-Guide reports and analyzes surprising facts surrounding dedupe usage, maturity and deployment plans.


Backup Deduplication: Solutions and Success Stories by  CommVault Systems, Inc.

July 03, 2013 - This e-guide follows the evolution of data dedupe, from its inception back in 2003 to it's current state ten years later. Explore the latest dedupe developments and usage scenarios and find out which solutions your peers are using and whether they are satisfied with them.


Backup Exec 2010: Archiving Options by  Symantec Corporation

July 15, 2010 - Symantec makes it easier for companies of all sizes to store, manage, protect, and discover Exchange and Windows file servers, with Backup Exec’s new Archiving Options, powered by market-leading Symantec Enterprise Vault. Learn and explore Backup Exec 2010 Archiving Options in this insightful white paper.


Backup Exec 2010: Deduplication Option by  Symantec Corporation

June 24, 2010 - Data deduplication offers companies the opportunity to dramatically reduce the amount of storage required for backups and to more efficiently centralize backup data from multiple sites for assured disaster recovery. This paper discusses Backup Exec 2010 which now includes integrated deduplication capabilities.


Backup Exec 2010: Protect More, Store Less, Save More by  Symantec Corporation

June 24, 2010 - Would you like to improve your backup performance while reducing storage costs? Join this webcast to learn how to easily eliminate excess storage consumption with ease through integrated deduplication and archiving technology introduced in Symantec Backup Exec 2010.


Backup Express and NetApp: A Better Backup and Recovery Solution by  Syncsort

August 01, 2008 - The new technology which fulfills the ambitious goal combines the benefits of disk-based backup, continuous blocklevel incremental backup, synthesized virtual base and file-level restore.


Backup Express and NetApp: Remote Site Business Continuity with Syncsort BEX Advanced Recovery and NetApp FAS Systems by  Syncsort

August 01, 2008 - This paper explains the low cost and high speed of Advanced Technology Attachment (ATA) disks. It explains how they enable near-instant recovery from past points in time, and employ new technologies that maximize the speed of data transfers.


Backup Express and Novell Open Enterprise Server: A Business Continuity Model for OES Migration by  Syncsort

March 01, 2008 - An operating system migration might complicate backup and recovery if you are not cautious. This white paper offers guidelines to assess whether your business-critical data and applications are protected and available during a migration project.


Backup Express for Microsoft Exchange by  Syncsort

September 16, 2008 - Read this paper to learn how the Backup Express Microsoft Exchange Server Application Interface works with the standard Microsoft backup API to provide a flexible, database-specific backup and restore solution for your critical Exchange data.


Backup in times of virtualization and IT optimization by  Hewlett-Packard Company

March 31, 2009 - Forrester Consulting recently conducted primary customer research to determine how the global economic downturn would affect IT priorities and technology deployments in 2009 and how these changes...


Backup Mobile and Remote Users Securely, With or Without a VPN by  Copiun

October 29, 2010 - This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.


Backup Mobile and Remote Users Securely, With or Without a VPN by  Copiun

January 17, 2011 - This whitepaper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.


Backup Partner Criteria for Smart Partnerships by  Iron Mountain

March 01, 2012 - Check out this white paper to discover how an offsite storage partner can be the answer to your content security and storage challenges. Learn about the advantages associated with offsite storage, discover how to define your needs and find the best potential backup partner you can, receive 4 key questions to ask regarding storage partners and more.


Backup Perspectives: Mobile Data, Hot Sites & Vendor Management by  SearchStorage.com

June 01, 2012 - This SearchDataBackup.com e-brief featuring backup expert Brien M. Posey covers how IT can protect mobile data, the pros and cons of managing your own recovery site and the most recent advances in the virtualization market.


Backup Power by  APC by Schneider Electric

April 11, 2011 - This part of the Interactive Data Center takes a closer look at the role of a generator in providing backup power to data centers.


BACKUP REDESIGN: Do More with Less ... Really! by  AppAssure Software, Inc.

April 10, 2009 - The call to protect corporate data in less time and for less money has inspired a whole new way of thinking about backup - a complete backup redesign. This paper explores a better way to backup and protect data and applications - disk-based application.


Backup School 2009 by  EMC Backup and Recovery Solutions

May 26, 2009 - This Advanced Backup School seminar presentation is guaranteed to provide you with time-tested advice and techniques that will make backup easier. Renowned backup guru W. Curtis Preston will review the basics - but will also be going into in-depth detail on the newest issues, technologies, and solutions surrounding backup.


Backup School 2010 Presentation Download by  SearchDataBackup.com

April 09, 2010 - Storage demands continue to grow exponentially – even as the budgets and resources available to satisfy those demands shrink. This Storage Decisions’ Data Deduplication seminar presentation download provides independent information that will help end users select the appropriate deduplication system for their IT environment.


Backup School Presentation Download by  SearchStorage.com

March 29, 2011 - Storage managers have two responsibilities: providing a home for the company’s data and protecting those assets from damage or loss. If the first part is tough, the second is more so. Backup is at the top of every storage manager’s priority list. This backup Presentation Download will address key data protection topics.


Backup Software: Nine Must-Ask Questions by  Iron Mountain

February 24, 2012 - Check out this white paper for 9 key questions to ask when shopping for backup software solutions. Learn how to accurately define your needs and expectations, and know what to look for to determine if a particular solution will meet them or not. Read on to learn more.


Backup Software: Recent Developments and Vendor Rankings by  CommVault Systems, Inc.

July 05, 2013 - This E-Guide evaluates the top enterprise and midrange backup applications in the marketplace and rates them across five key categories


Backup Solutions For Today's Data Center by  SearchStorage.com

March 27, 2012 - This expert E-Guide explores the different data backup and storage systems available, and which ones will really eat up your storage budget. Read now to learn more.


Backup Solutions for Today’s SMB by  Hewlett-Packard Company

September 30, 2013 - This white paper explores a continuum of solutions, including advances in both tape and disk technologies, that allow SMBs to proactively and systematically backup their data affordably, without disrupting day-to-day operations.


Backup to the Cloud is Still Cloudy by  ExaGrid Systems, Inc.

December 18, 2013 - This informative paper addresses the cloud as it relates to data backup. In all cases, it is assumed that a backup application is in place and that data will be backed up locally and then replicated to the cloud for disaster recovery. Read on now to learn more.


Backup Today: Managing Cost, Complexity, and Capabilities by  IBM

October 29, 2013 - This white paper features highly scalable data protection software for virtual environments designed to help organizations manage and protect their data by simplifying backup administration, delivering more scalable solutions and helping to reduce costs related to backup and recovery.


Backup Transformation from the Inside by  EMC Corporation

November 30, 2012 - This white paper provides an insider's view of the need for and impact of backup transformation in today's ever-changing IT landscape.


Backup, Archiving, and Tape: Expert Recommendations For Improving Data Protection Efficiency by  Iron Mountain

August 29, 2013 - This e-guide elaborates on two recommended storage efficiency tactics and reveals other lesser known benefits they deliver. Explore common criticisms you may encounter as you leverage them and obtain expert perspectives on how they can be addressed.


BackupCare "Lights-Out" Backup Assistance by  Iron Mountain

March 01, 2012 - As IT becomes increasingly global, managing remote offices and data centers is becoming a sizable challenge for administrators and organizations with already dwindling budgets. There is, however, a solution. Check out this white paper to learn exactly what it is.


Bailing Out Your Budget: How Websense Lowers Your TCO by  Websense, Inc.

December 01, 2010 - The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership.


Bailing Out Your Budget: How Websense Lowers Your TCO by  Websense, Inc.

January 13, 2011 - The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the same time that the resources available to mitigate them are diminishing or, at best, remaining constant.


Balance End User Satisfaction and Business Productivity by  BlackBerry

April 11, 2014 - This white paper talks about the benefits of corporate owned, personally enabled devices that provide a lot of the same benefits as BYOD, but without the security issues.


Balancing compliance with information security threat assessment by  IBM

December 06, 2011 - This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.


Balancing Cost Control with Strategic Investments by  Cisco Systems, Inc.

March 16, 2011 - Listen to this podcast as the Senior Director and Lead in the European Markets for Cisco's Internet Business Solutions Group, explores how CIOs balance cost containment with making strategic investments that will help their businesses accelerate growth today and into the future.


Balancing Cost, Risk and Complexity in Your Disaster Recovery Strategy by  CommVault Systems, Inc.

February 27, 2014 - This guide goes over the requirements for a suitable Disaster Recovery strategy and highlights the fact that traditional backup plans aren't capable of dealing with new technologies.


Balancing HADOOP Data Security with Performance by  Vormetric

June 05, 2014 - This white paper features a Hadoop data security system that offers encryption to boost protection without weighing down performance.


Balancing Risk and Complexity with Quality Management by  IBM

March 21, 2011 - This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.


Balancing Risk and Innovation with Sourcing Alternatives: Helping IT managers and CIOs raise the ROI of IT by  IBM

December 01, 2010 - This paper explains how clients can balance risk and innovation through the use of services from IBM.


Balancing Risk with Agility: Best Practices for Securing Cloud Deployments by  Trend Micro

May 28, 2014 - Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.


Balancing Risk with Agility: Best Practices for Securing Public Cloud Deployments by  Trend Micro

May 30, 2014 - This exclusive webcast will give you key advice for ensuring the security of your data and applications in the cloud.


Balancing Security and Usability of Mobile Devices by  BlackBerry

July 24, 2012 - This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability.


Balancing Social Networking with Network Security Objectives by  BlueCoat

March 04, 2011 - Social networking has achieved a level of popularity that requires reasonable access at work, but it is also sufficiently mature to bring value to many businesses. But safe social networking requires an aggressive and layered security strategy at the web gateway, as well as the definition of new usage policies and priorities from management and IT.


Balancing the Mobile Data Load by  ComputerWeekly.com

January 14, 2011 - The proliferation of mobile broadband devices along with the unlimited data bundles from the operators has led to network congestion and deteriorating network quality.


Ball Corporation: Leading Manufacturer Increases Accuracy of Business Transaction Processing by 5-10% by  Sterling Commerce Manufacturing Solutions

March 01, 2008 - Ball Corporation needed to reevaluate its existing B2B IT environment, which was built on a legacy EDI platform. Many processes and data conversions within the supply chain were still manually driven. Ball selected an integration suite and...


Ballarat Grammar Secures BYOD with HP Sentinel SDN by  Hewlett-Packard Company

August 31, 2013 - In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.


Banca Intesa Counters Threats with HP ArcSight by  Hewlett-Packard Company

March 29, 2013 - Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.


Banco Azteca Spearheads Desktop Virtualization Initiative with VCE Professional Services by  VCE

December 31, 2011 - Access this case study to discover how one banking institution used an infrastructure platform for their VDI deployment with great results. Learn how this system jumpstarted the process by delivering accelerated assessment and planning and provided valuable benefits like accelerated proof-to concept completion and faster deployment time.


Banco Credito e Inversiones (Bci) worked w/ HP on mobile app by  Hewlett-Packard Limited

September 30, 2013 - This informative video examines how a Chilean bank utilized an external service provider to build and distribute successful mobile applications, increasing their reach to new customers while also improving satisfaction with existing ones.


Bank Of New Zealand Reduces Carbon Footprint With Red Hat On The Mainframe by  Red Hat and JBoss

July 29, 2009 - Like a large number of businesses in New Zealand and around the world, BNZ was close to reaching capacity in its datacenter and needed to determine how to maximise space while keeping costs down. In this case study we'll see how BNZ handled this and other challenges by migrating to Red Hat Enterprise Linux 5 running under z/VM on the mainframe.


Bank Reduces Management Time and Avoids External Consultancy Costs with Dell Fluid Data Technology by  Dell Compellent

September 09, 2011 - Bankadati wanted to support rapid business growth by installing a more agile, manageable data storage platform that would help avoid unnecessary downtime. Read this white paper to learn how they successfully implemented Fluid Data technology.


Banking Evolves: How Intelligent Imaging Fuels Performance and Profitability by  IBM

April 21, 2014 - The following white paper explores how intelligent document imaging solutions can help banks enable a mobile-friendly environment. Get a firsthand look at how this technology can virtually eliminate the reliance on paper documents, improve productivity, reduce customer attrition, and more.


Banking: Differentiate Through Service Excellence with SAP CRM – Optimizing Customer Satisfaction, Efficiency, and Profit by  SAP America, Inc.

September 02, 2010 - Read this paper to learn how SAP for Banking solutions, which encompass the SAP® CRM application, encourage agility and customer centricity in today’s demanding market. By seamlessly connecting front- and back-office tasks, they can provide a superior customer experience and stronger top-line growth.


Barclays Application Security Assurance Project by  Veracode, Inc.

February 17, 2011 - As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.


Barclays Bank by  Lumension

August 01, 2008 - Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices.


Barcodes vs RFID: The pros and cons of each side reviewed by  IQMS

October 02, 2013 - This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.


Bare Metal Cloud: A Non-Virtualized Cloud Option for Performance-Sensitive Workloads by  IBM

January 17, 2014 - This informative guide explores the role of virtualization and how it pertains to cloud computing and MSPs.


Basic Building Blocks: Preparing for PCI DSS 2.0 by  Veracode, Inc.

October 04, 2010 - With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.


Basics of Switching by  Global Knowledge

June 28, 2013 - A switch is a Layer 2 network device that forwards Ethernet frames based on the destination media access control (MAC) address. A switch has RJ-45 ports for connection and the intelligence to read MAC addresses to make forwarding decisions. The purpose of the switch is to quickly and accurately forward frames toward the destination.


Basics of Virtual Server Protection by  CommVault Systems, Inc.

July 18, 2012 - This explanatory video delivers the answers to modern data protection in a virtual server context. Watch now as one IT pro pinpoints a solution to data protection in the modern IT landscape.


Basingstoke and North Hampshire NHS Foundation Trust unites the ‘clinical five’ by  IBM

August 05, 2011 - Check out this case study to learn how leading health care provider Basingstoke and North Hampshire NHS Foundation Trust was able to integrate and consolidate data between locations for significant cost savings, as well as increases in efficiency and productivity.


Batch processing with WebSphere Compute Grid: Delivering business value to the enterprise by  IBM

January 11, 2010 - Reduced windows for operation and increases in data make it imperative for today's batch processing systems to scale out and perform better. Read this white paper to learn how to address these and other challenges of modern batch processing while reducing costs and improving time to market.


Battery Optimization Services: A Guide to Optimize your Battery Maintenence by  Emerson Network Power

May 15, 2014 - This whitepaper explains how by combining these different techniques and deploying them throughout the battery life cycle in a dynamic fashion, you can design an optimized maintenance regime that will deliver improved battery reliability that is fully cost effective.


Battery Technologies for Data Centers and Network Rooms: Environmental Regulations by  APC by Schneider Electric

February 04, 2009 - This paper offers a high level summary of the regulations and provides a list of environmental compliance information resources.


Battery Technology Data Centers and Network Rooms: Lead-Acid Battery Options by  APC by Schneider Electric

February 04, 2009 - This paper discusses the advantages and disadvantages of Flooded, Valve Regulated Lead Acid (VLRA), and Modular Battery Catridge (MBC) lead-acid battery technologies.


Battery Technology for Data Centers and Network Rooms: Fire Safety Codes - USA by  APC by Schneider Electric

October 07, 2011 - Proper interpretation of the fire codes is essential in the design and implementation of data centers and network rooms. This resource explores fire safety regulations and their application to uninterrupted power supply (UPS) battery installations.


Battling Modern Botnets by  FireEye

April 28, 2008 - The FBI ranks cybercrime among its top priorities in part because botnets are proliferating at an alarming rate, crossing corporate boundaries and spreading infections behind corporate firewalls. Learn how FireEye provides advance detection and a blended approach to today’s botnet problem that "traditional" solutions do not.


Battling Modern Botnets in the Enterprise by  FireEye

September 01, 2008 - The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business.


Baylor College of Medicine Ensures Integrity of Groundbreaking Scientific Research with VMware vFabric Hyperic by  VMware, Inc.

December 31, 2010 - How did Baylor College of Medicine achieve comprehensive application monitoring, as well as reduce response time, increase speed of resolution, and improve virtualization performance? Read this case study to find out!


BBVA seamlessly monitors and improves its online reputation by  IBM

November 30, 2012 - This white paper examines a business case for analytics at financial institutions. BBVA, a global group that offers individual and corporate customers a range of financial and non-financial products and services, was interested in knowing what new and existing clients were saying about the business through social media.


BC and DR with CA Recovery Management and VMware Infrastructure by  CA Technologies.

April 01, 2008 - CA Recovery Management solutions complement the management and protection features of VMware Infrastructure to offer powerful protection and recovery of your physical and virtual servers across the entire enterprise.


BC/DR for Virtualized Environments by  SearchServerVirtualization

April 02, 2013 - This expert handbook presents key tips for putting the pieces together to develop a strategy to make the most out of next-generation virtualization technology.


BDNA for Security: Strengthened Security Through Visibility by  BDNA

June 07, 2011 - Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.


BDNA Normalize for SCCM: The End of Data. The Start of Information. by  BDNA

August 23, 2011 - Microsoft's System Center Configuration Manager (SCCM) helps administrators access and effectively control their IT systems and infrastructure. With BDNA Normalize for SCCM, IT professionals use advanced queries, collections and reporting features to automatically transform raw data into practical information without leaving the SCCM environment.


Be as Agile as you can be by  IBM

April 04, 2011 - Join Elizabeth Woodward, IBM Agile Practice Expert, as she discusses how software development leaders and agile teams can identify the impact of choices in organizing their team structure to optimize a distributed Agile methodology. 


Be SURE About Storage Capacity Management by  Dell Software

January 16, 2009 - In this Quest white paper you'll learn how you can become proactive - not reactive - when managing your storage capacity. Learn best practices to maximize your existing resources, and how doing keeps your budget under control. Read the paper white today.


Beating the Bad Guys: Strategies to Mitigate the Malware Threat by  RSA, The Security Division of EMC

November 23, 2011 - While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.


Beating the Browser Wars: How to Win the Battle for Web Performance by  Gomez

August 03, 2009 - The war of the browsers is in full swing and we are stuck in the middle. This paper offers practical advice that can help you survive and even prevail in this combative environment. Read this paper to learn everything you need to know about the browser wars and how to survive them.


Beating web application security threats by  SearchSecurity.com

October 31, 2011 - Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.


Beating Web Application Security Threats by  Thawte Inc.

March 18, 2010 - The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.


Beaufort Memorial Hospital Case Study by  VMware, Inc.

July 16, 2013 - This informative case study details how a healthcare facility used a desktop virtualization solution to reduce desktop provisioning time, cut login time in half and dramatically improve security and productivity.


Becker Underwood achieves an ROI of 383 percent within 4 months by  IBM

January 10, 2014 - Access the following case study to gain a firsthand look at how Becker Underwood was able to increase their ROI, visibility, and overall productivity by deploying the right business intelligence and analytics solution. Uncover the technologies and strategies they used and what you can do to achieve the same results.


Become a Java developer by  IBM

January 03, 2012 - <p>Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.</p>


Become a social business on the cloud: IBM SmartCloud for Social Business collaboration services by  IBM

April 16, 2012 - This brief paper outlines a social business cloud solution that provides integrated e-mail, social business capabilities and third-party applications, all delivered through cloud computing. Learn how it offers a security-rich environment that will allow your business to become a social butterfly in addition to reducing costs and complexity.


Become a Social Business: Tap Into Social Data Insights by  IBM

January 09, 2014 - Access the following webcast to uncover what you need to know to become a successful social business. Learn about the tools and techniques and how to properly use them to turn social data into the actionable insights you need to be competitive.


Become an Automated, Agile Enterprise by  Hewlett-Packard Company

June 12, 2014 - The pressure is on for IT to become more agile, and while many organizations have responded by leveraging cloud and automation, the promise of seamless service delivery often goes unfulfilled. In this webcast, discover a better approach to automation that takes inspiration from the manufacturing world -- IT as an "assembly line."


Becoming a Social Business: Social Business Enterprise Strategy Accelerator by  IBM

July 16, 2013 - The way people interact and form relationships is changing, social business is the way of the future. This resource explains more about the opportunities that social business provides. It discusses how to go about adopting social media for both external and internal purposes, read on to learn more tips on transitioning to the social enterprise.


Becoming a Social Business: The IBM Story by  IBM

June 22, 2011 - In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.


Becoming More Energy Efficient by  IBM Software Group

February 14, 2008 - Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?


Becoming Value-driven: Focusing on What Matters Most by  IBM

August 20, 2008 - This white paper provides insight into the six key areas essential for becoming a value-driven organization. Discover how to gain the visibility and control essential to meet and exceed customer needs.


Becoming “One Bupa” hinges on having a single platform for communication and collaboration by  Jive Software

June 20, 2013 - Discover how Bupa, an international healthcare group, created a global social business networking and collaboration community that complemented their existing content management systems (CMS) while adding web 2.0 capabilities. Read on to learn why an out-of-the-box social platform enabled more collaborative behavior than their previous CMS.


Before & After: Quantifying Business Rule Results in Key Banking Applications by  ILOG, an IBM Company

April 01, 2008 - This white paper details five actual business rule management systems deployments, providing a before and after view for each credit and lending application.


Before You Renew With Your Legacy Backup Software by  CommVault Systems, Inc.

April 29, 2013 - This white paper explores five questions to ask when choosing a backup solution. Discover key considerations that will enable you to make a smart and informed decision.


Beginners guide: Tiered healthcare storage by  BridgeHead Software

April 28, 2014 - This expert e-guide from SearchHealthIT.com shares the basics behind using tiered storage for healthcare data, and how this affects HCOs' backup priorities.


Beginner’s guide to manufacturing PLM tools by  IQMS

January 08, 2013 - In this product lifecycle managment (PLM) e-guide, discover an overview of the basics of PLM tools, software selection and implementation tips from industry experts, the value of cloud PLM, 3D CAD imagery, and social media add-ons, and why− and how− PLM is branching out from discrete manufacturing into process manufacturing.


Behavior Driven Development: Agile Testing with Red Hat JBoss BRMS by  Red Hat

June 30, 2013 - In this resource, discover how a software development process known as behavior-driven development, combined with a tool that integrates business rules management, business process management (BPM), and complex event processing (CEP), enables you to speed up and improve the application delivery lifecycle.


Behavior-Driven Development and BRMS by  Red Hat

April 04, 2014 - Download this whitepaper to learn how organizations can keep pace with the demands of our rapid global marketplace with a combination of software and professional services from Red Hat.


Behavior-Driven Development and BRMS by  Red Hat

September 24, 2013 - This whitepaper explains how enterprise organizations can keep pace with the demands of our rapid global marketplace with a combination of software and professional services from Red Hat.


Behavior-driven Development and BRMS by  Red Hat

July 31, 2014 - View this informative white paper for an in-depth look at behavior-driven development (BDD) and learn how to leverage this framework for iterative software development and testing in an Agile environment.


Behavior-Driven Development and Business Rules Management System by  Red Hat

July 31, 2013 - View this helpful white paper to learn more about three development frameworks, that when integrated, comprise an approach to business rules management system (BRMS) development that ensures fast application delivery and the ability to keep up with market change.


Being Agile in a non agile world by  Ivar Jacobson Consulting

March 01, 2008 - Learn how to effectively combine agile development techniques with traditional SDLC and other software engineering techniques. Explore the basic concepts behind agile thinking and the three perspectives associated with this process.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts