D Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
D Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
 

Diagnosing the Cause of Poor Application Performance by  Fluke Networks


October 20, 2010 - When troubleshooting application performance issues, there are two steps you can take. First, understand the common causes and, second, use the right tool to diagnose them. Read about these common causes and learn about using the right diagnostic tool to quickly identify and resolve a problem.

 

Dialing for Dollars: Nine Tips on Call Prospecting by  Cisco Systems, Inc.


January 20, 2011 - The truth about effective call prospecting is that it’s a numbers game: the more calls you make, the better your chance of attaining customers. Just one customer could be enough to make your sales numbers. Continue reading this paper to learn nine tips for effective calling.

 

Dictate at the point of care with smartphones and tablets by  Nuance


December 31, 2012 - This brief resource introduces a mobile dictation tool designed with today's busy clinicians in mind. Inside, discover how this tool enables clinicians to use leading mobile devices to reduce documentation time, increase report accuracy, and more.

 

Dictate Directly Into The EHR by  Nuance


December 31, 2012 - Discover how clinicians can use speech recognition technology to dictate directly into their EHR systems, allowing them to spend more time with patients rather than paperwork.

 

Dictate the Terms of Your Data Center to Your Provider, Not the Other Way Around by  Raritan Inc.


April 09, 2014 - This video details an example of how one company will help you shape your data center to your exact needs and specifications.

 

Differences between Avaya Aura Contact Center (AML or SIP) and Avaya Aura Call Center Elite by  Global Knowledge


October 29, 2013 - In this exclusive paper, Global knowledge instructor Brett Hanson answers crucial questions concerning the various Contact Center solutions that are available from Avaya.

 

Different Workloads, Different Architectures, One Solution by  Citrix


September 19, 2013 - This webcast reviews the two very different architectures required by traditional vs. cloud-era workloads, and how a single cloud management platform can be used to control them both.

 

Differentiate Your Business through Customer Engagement by  Hewlett-Packard Limited


December 31, 2013 - This Forrester Consulting report reveals the findings of a study of 159 managers and business decision-makers regarding their customer engagement strategies.

 

Differentiated Architectures for the Data Center by  Juniper Networks, Inc.


September 02, 2011 - The promise of the cloud for data centers is that it converts all of the compute and storage capacity into pools of resources which can be dynamically allocated and shared. Shared resources are more efficient than resources in silos. With cloud computing, applications can be added quickly and they function more efficiently.

 

Differentiated Architectures for the Data Center: Key Factors Driving the Need to Change Architecture in Today's Data Center by  Juniper Networks, Inc.


July 01, 2011 - This white paper details the key characteristics of a cloud-ready data center and highlights network architecture you can implement to meet them.

 

Differentiating Banking Services by Testing New Ideas Faster by  Cisco


March 06, 2012 - Read this white paper that presents a case study of how ING DIRECT Australia, a leading international bank, took advantage of a new, fully integrated testing and development architecture, including hardware, software and professional services.

 

Differentiation through Service Excellence Driving Customer Loyalty and Service Profitability by  SAP America, Inc.


September 17, 2008 - The importance of achieving service excellence is growing. Products are increasingly becoming commodities, and CEOs are recognizing that first-rate service is crucial to enhancing customer satisfaction. This paper explores the crucial links between customer service and customer satisfaction.

 

Case Study: Digital Archiving Promotes Sustainability and Improved Service Delivery for the London Borough of Islington by  Xerox DocuShare


May 01, 2008 - Learn how visionary IT management helped this local government deliver financial, environmental and social benefits to the community and save hundreds of thousands of Pounds in its first year using Xerox DocuShare.

 

Digital Billboard Advertising - New Life for a Classic Medium by  Motorola, Inc.


March 02, 2009 - Read this paper to learn more about the emerging trend of digital billboard advertising and how it can enhance responsiveness, flexibility and profits.

 

Digital Certificates and the Apache Web Server by  Thawte Inc.


May 07, 2013 - This guide offers support on how to test, purchase, install, and use digital certificates for SSL connections on your Apache web server. View now to learn more.

 

Digital CRM and the Customer Experience by  IBM


March 24, 2014 - This e-guide from the experts at SearchCRM.com describes why digital technologies are proving to be the "next big thing" in the world of CRM, and explores the strategies that small businesses are using to stay competitive in e-commerce.

 

Digital identities and the open business by  ComputerWeekly.com


October 21, 2013 - Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.

 

Digital Intermediate: Content-Aware Compression and Data Deduplication for Online Storage for Media/Entertainment and Post-Production by  Ocarina Networks


January 23, 2009 - This application paper provides an overview of Ocarina technology, describes a typical media workflow, specifically citing a 2K/4K film and Digital Intermediate (DI) environment.

 

Digital Transformation: Creating New Business Models Where Digital Meets Physical by  IBM


May 01, 2012 - <p>Access this resource to discover what makes up an enterprise-grade digital transformation strategy. Gain insight into the 3 transformation paths available, 4 factors to consider before choosing a transformation policy, and 5 critical components an effective strategy must contain.</p>

 

Digital Trust in the Cloud: Liquid Security in Cloudy Places by  CSC


November 17, 2011 - While some individual users are experimenting with cloud processing, other users have already fully committed to the cloud as an important part of their enterprise architecture and operation. Read this white paper to learn about the evolution of cloud processing and whether or not the cloud processing boom will continue.

 

DigitalPersona Pro by  DigitalPersona


January 01, 2006 - This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.

 

Digitize Your Workflow To Streamline Your Process by  Iron Mountain


December 02, 2013 - Consult this expert white paper to uncover how to reframe the challenges associated with shifting over to digital records management. Discover what needs to be done to make the transition as smooth as possible and how you and your organization can reap the benefits of doing so.

 

Dimension Data Helps Purdue Pharma Deploy and Manage Unified Communications to Support Corporate Growth by  Dimension Data


February 24, 2010 - Read this case study to learn how Dimension Data’s managed services helped a pharmaceutical company replace a legacy phone system with a converged communications solution.

 

Dimension Data Helps South Carolina Department of Social Services Achieve Rapid Network Upgrade and Maintain Top Performance with Uptime Powered by Cisco Services Support by  Dimension Data


February 25, 2010 - Faced with limited time and money to upgrade its network and network support, the South Carolina Department of Social Services determined it needed a new services partner to provide world-class expertise and support. Learn how they used Uptime powered by Cisco Services to achieve a seamless upgrade of their network infrastructure and more.

 

Dimensional Excellence - Build it or Buy it? by  Oracle Corporation


August 02, 2010 - The true total cost of ownership favors the adoption of a proven, configurable, best-of-breed tool for which the costs and implementation timescales are predictable, and through which risks are minimized. Continue reading to learn more.

 

Dimensional Research - Uncovering the Business Value of IT Service Management by  Hewlett-Packard Company


December 31, 2011 - The rapidly changing world of IT can be tough to adapt to, especially with further decentralization via the cloud. This white paper highlights IT service management and how it can increase your business efficiency.

 

Directory Services Integration with Database Enterprise User Security by  Oracle Corporation


April 01, 2008 - This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment.

 

Dirk Hohndel on Intel and the Linux Foundation by  Intel


November 01, 2010 - In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

 

Dirty Little Secrets: Mobile Apps Invading Your Privacy by  Veracode, Inc.


July 27, 2011 - Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.

 

Disable Lost PCs and Data Remotely by  Intel


January 22, 2010 - Learn how the all new 2010 Intel® Core™ vPro™ processor family can help by disabling lost or stolen PCs via a poison pill, and how they can be easily reactivated via server-generated passwords thanks to Intel® Anti-Theft Technology and WinMagic.

 

Disaster Got You Down? by  CDW Corporation


January 27, 2010 - The risks attached to not having a BC or DR plan are neither small nor cheap. Every good plan employs certain technologies and methodologies to limit the disruptiveness of an outage. CDW offers storage, power and networking specialists to assist with disaster recovery needs.

 

Disaster Got You Down? by  CDW Corporation


September 08, 2009 - While trying to predict an outage is impossible, being prepared for one is not. Having the right tools in place to respond to a "disaster" is essential to sustaining a successful organization. A business-continuity / disaster-recovery plan can help you cut costs by avoiding downtime, lost revenue and dissatisfied customers.

 

Disaster Preparedness for Core Network Services by  Infoblox


January 31, 2013 - This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.

 

Disaster Preparedness for Core Network Services by  Infoblox


January 31, 2013 - This in-depth white paper details the potential of network failure and how building a more resilient network infrastructure can cut back on time lost during disaster recovery.

 

Disaster Preparedness: Is there a hole in your disaster recovery plan? by  Iron Mountain


January 04, 2012 - Access this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan.

 

Disaster Recovery 101: Assessing Risk & Preventing Human-made Disasters by  QuorumLabs


December 29, 2011 - This SearchDisasterRecovery.com E-Guide will provide you with the necessary steps for evaluating risk in you DR plan, and offer insight into the high-level threats you need to watch out for today. Read on for a deep dive into the risk evaluation process, information on preventing human-made disasters and more.

 

Disaster Recovery and the Cloud: Are you prepared? by  Symmetry Corporation


October 17, 2011 - Check out this E-Guide for key considerations when drawing up a DR plan and to learn how the cloud can work into such a strategy. You'll also learn what types of organizations can most benefit from DR in the cloud. Read on to learn more.

 

Disaster Recovery and the Cloud: New solutions for offsite data protection by  Nasuni Corporation


April 20, 2011 - offers an unlimited supply of reliable storage at a very low cost. Traditionally slow access speeds prevented the real use of the cloud in disaster recovery planning. However, modern cloud storage gateways accelerate the speed of access and can provide immediate access to data stored in the cloud. Read on to learn more today!

 

Disaster Recovery Best Practices by  Hewlett-Packard Company


June 01, 2008 - Learn best practices for developing a disaster recovery plan for your organization, including disaster recovery strategies for companies that are using data de-duplication.

 

Disaster Recovery E-Brief by  SearchStorage.com


January 16, 2012 - Featuring a detailed list of everything you need to establish an effective DR strategy, this resource featuring expert Paul Kirvan has all of the information you need to get started developing and managing a successful DR plan. Read on for today's best practices and newest DR strategies.

 

Disaster Recovery eZine - Covering All the Bases: A Concise Guide to Disaster Recovery Essentials, from Building a Plan to Putting It to the Test by  SearchDisasterRecovery.com


December 05, 2008 - Disaster recovery (DR) has quickly become the top priority for today's storage managers. However, the issue isn't whether or not you have a DR plan, but rather if you have one that will work when needed. This paper covers all the bases.

 

Disaster Recovery Planning 2012: Essential Steps for Building a Business-Savvy Business Continuity Capability by  EMC


March 20, 2013 - Access this exclusive disaster recovery/business continuity presentation by Jon Toigo, CEO and managing partner of Toigo Partners International, to explore expert insight into the steps to building a business-savvy business continuity strategy.

 

Disaster Recovery Planning 2012: Essential Steps for Building a Business-Savvy Business Continuity Capability by  EMC Corporation


March 14, 2013 - Access this expert Storage Decisions E-Book by Evaluator Group Senior Strategist Randy Kerns to learn what big data means for storage. Check it out to explore why storage pros need to care about big data and find out what big data demands of your storage infrastructure.

 

Disaster Recovery Planning 2012: Essential Steps for Building a Business-Savvy Business Continuity Capability by  EMC Corporation


March 20, 2013 - Access this exclusive disaster recovery/business continuity presentation by Jon Toigo, CEO and managing partner of Toigo Partners International, to explore expert insight into the steps to building a business-savvy business continuity strategy.

 

Disaster Recovery Planning and Network Services by  Dell Compellent


October 03, 2011 - In this FAQ, Carrie Higbie, global director for data center solutions at the Siemon Company, discusses the role of network services in DR planning.

 

Disaster Recovery Planning for BlackBerry Enterprise Server for Microsoft Exchange by  BlackBerry


March 18, 2009 - This document provides an overview of BlackBerry® Enterprise Server components and is intended to help administrators prepare for the design and delivery of disaster recovery procedures for the BlackBerry environment.

 

Disaster recovery planning for health care data by  Sirius and NetApp


June 15, 2012 - This E-Guide from SearchHealthIT.com demonstrates why disaster recovery and business continuity is particularly important for health care facilities. Within, learn how to formulate a successful disaster recovery plan to ensure the avoidance of compliance penalties or reputational damage due to data loss.

 

Disaster recovery planning for HIPAA compliance by  HP & Intel®


September 19, 2011 - The HIPAA Security Rule requires all HIPAA covered entities to create a plan for first protecting and then restoring confidential patient data in the event of a disaster. Unfortunately, HIPAA does not say much about what should go into such a disaster recovery plan. Inside this e-guide, find tips for a compliant disaster recovery plan.

 

Disaster Recovery Planning with Virtualization Technologies by  Vision Solutions


May 27, 2010 - Business continuity is not just a good business practice - it can mean success or failure if data and applications on a production server are lost. Read this white paper which examines Double-Take Software and their innovative approach to business continuity - one that goes beyond just recovery.

 

Disaster Recovery Plans Should Affect More Than Just IT by  Veeam Software


January 31, 2014 - Take a look at this expert e-guide to find out about the many disaster recovery options available, and how they would fit into your company's environment.

 

Disaster Recovery Seminar Presentation Download by  EMC Backup and Recovery Solutions


September 15, 2009 - This presentation is divided into three modules. In the first module, we will examine the three keys to successful disaster recovery planning. In modules two and three, we will analyse data protection techniques and testing techniques.

 

Disaster Recovery Services FAQ for Resellers by  IBM


June 21, 2011 - In this SearchStorageChannel.com FAQ Guide on disaster recovery services, ESG analyst Bob Laliberte discusses several important disaster recovery trends - including greater use of virtual tape libraries and disk-based backups - and the impact these trends will have on resellers and service providers.

 

Disaster Recovery Solutions from VMware: Transforming Disaster Recovery - VMware Infrastructure for Rapid, Reliable and Cost-Effective Disaster Recovery by  VMware, Inc.


October 01, 2008 - VMware Infrastructure is transforming the way disaster recovery is done today and in the future; it changes the disaster recovery paradigm to one that is cost effective, rapid and reliable.

 

Disaster Recovery Strategy Building by  Dell, Inc.


March 20, 2013 - In this transcript of a video by expert Jon Toigo, founder and CEO of Toigo Partners International outlines what should go into a disaster prevention strategy and why, above all, data must be protected. Also discussed - the importance of data restore time.

 

Disaster recovery strategy’s impact on patient care by  HP & Intel®


May 14, 2013 - How confident are you that your health care organization can recover from a disaster? This resource highlights the impact unplanned downtime can have on your hospital. Read now to learn about an effective disaster recovery strategy that will ensure the safety of your patient data.

 

Disaster Recovery Utilizing P2Vs by  AMD


November 01, 2011 - This presentation transcript follows the history of P2V and explains how companies can extend virtualization to the physical machines in their production environments. Find out when virtualization may not be recommended and discover key DR points to keep in mind. including RTO and RPO.

 

Disaster Recovery with ETERNUS DX – The Data Safe – and VMware SRM by  Fujitsu America, Inc.


December 06, 2010 - This paper shows the way to protect data and business, where hardware is only one factor. The other factor is the proof that in a worst case scenario the protection works well. The challenge is to test that protection in near real-life situations but without impact on business production.

 

Disaster Recovery with Sunbelt Exchange Archiver by  Sunbelt Software


January 01, 2008 - Sunbelt's Exchange Archiver simplifies disaster recovery by using its revolutionary designed Hierarchical Storage Management (HSM). The HSM store is integrated into the SEA server and redirects archived email into various storage media.

 

Disaster Recovery with the HP StorageWorks Enterprise File Services Clustered Gateway Linux Version and HP StorageWorks XP Continuous Access by  Hewlett-Packard Company


December 01, 2007 - This white paper reviews proof points and best practices for file sharing disaster recovery.

 

Disaster Recovery, Made Easy by  Emerson Network Power


April 30, 2014 - This whitepaper covers the what, who and how of disaster recovery and divulges some keys to creating a successful plan.

 

Disaster Recovery: A CIO’s First Line of Defense by  Dell and VMware


March 05, 2013 - Access this e-guide for an expert Q&A discussion with independent consultant and auditor, Paul Kirvan, on developing an effective disaster recovery and business continuity plan. In addition, compare the gains and losses for today's DR management.

 

Disaster Recovery: Identify Data Value for a Targeted DR Solution by  American Megatrends Inc.


April 01, 2008 - A disaster can strike at anytime and your organization is vulnerable. This white paper provides a complete outline - filled with tips and best practices - on creating the most effective disaster recovery plan for your company's needs.

 

Disaster Recovery: Identify Data Value for a Targeted DR Solution by  Excel Meridian Data, Inc.


June 01, 2008 - The StorTrends© line of storage products from American Megatrends offers a wide variety of DR solutions in its StorTrends storage server appliances including remote, real-time replication, and D2D2T Backup.

 

Disaster Recovery: The Game Has Changed by  SunGard Availability Services


January 29, 2014 - This expert resource covers the changes that have made disaster recovery that much more challenging and offers managed recovery service providers as a helpful solution.

 

Disaster Tolerant Solutions Using Continuous Access for HP StorageWorks Enterprise Virtual Array in a Vmware Infrastructure 3 Environment by  Hewlett-Packard Company


April 01, 2008 - This paper describes two deployment types of a VMware tolerant solution, based on coupling key VMware features with disaster tolerance functionality of HP StorageWorks Continuous Access EVA.

 

Disclosure Management for budgeting, planning and forecasting -- the next frontier? by  IBM


October 31, 2012 - This resource explains how disclosure management can lead to significant productivity gains when used for statutory reporting, and evaluates the viability of this strategy as an option for improving budgeting, planning, and forecasting (BPF) financial processes.

 

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by  Veracode, Inc.


May 23, 2012 - In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.

 

Discount Tire Accelerates Its E-Commerce Business With Red Hat Satellite And IBM by  Red Hat and JBoss


July 28, 2009 - In 2000, Discount Tire Company decided to bring management of its e-commerce infrastructure in-house after having outsourced it for several years. Learn how they turned to the rock-solid reliability of Red Hat's Enterprise Linux platform to handle the task of supporting their new e-commerce environment.

 

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention by  Trend Micro, Inc.


July 15, 2010 - When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it.

 

Discover How Mail Express Solves 2 of Your Biggest IT Headaches by  GlobalScape


December 31, 2012 - Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.

 

Discover information integration and governance in your organization by  IBM


May 05, 2011 - In this presentation transcript, Ron Powell will provide an overview of the information integration and governance theme and discuss the importance of the five topics within that theme: information integration, MDM, data warehousing and analytics, database management and tools, and database security and privacy, and lifecycle management.

 

Discover the Benefits of Visibility in 2 minutes by  Gigamon


February 20, 2014 - Watch this concise webcast to find out about a recent innovation in visibility which can help identify and direct traffic to centralized tools.

 

Discover the Key to a More Cost Effective Data Center by  Alcatel-Lucent


October 27, 2011 - It is difficult for data center pros to make full use of their resources if they do not have the right infrastructure in place. This exclusive webcast explains how virtualization can enable you to leverage your IT assets more effectively and offers advice to help you prepare for new IT models like the cloud.

 

Discover the Key to a More Cost-Effective Data Center by  Alcatel-Lucent


November 04, 2011 - Emerging technologies such as virtualization and cloud computing are driving the demand for a next generation data center. This essential resource explores how you can make your business operations more cost effective and how service providers can help you rationalize and optimize your infrastructure, and sustain rapid expansion.

 

Discover the power of big data to uncover innovation by  Hewlett-Packard Limited


October 29, 2013 - This brief video introduces a big data discovery strategy that puts the power of big data in your hands – allowing you to affordably justify and prove your big data innovations before you put them to work.

 

Discover The Power To Do More by  Dell, Inc. and Intel®


February 22, 2012 - This white paper explores the attributes of efficient IT and reveals five core elements that you should focus on to keep pace in the virtual era. Hear from your peers on how they are successfully leveraging virtualization, managing ever-growing data volumes, preparing for the cloud, and more.

 

Discover the Risks and Rewards Behind a Mobile Workforce by  SearchSecurity.com


April 22, 2013 - Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

 

Discover the Unique Benefits of Enterprise Search Technology for Your Organization by  Google Search Appliance


December 06, 2010 - Read this e-guide and uncover how enterprise search technology is helping knowledge workers find relevant information quickly and easily. Learn about how enterprise search has positively impacted the content management applications market.

 

Discover What Makes CommVault a Leader in Enterprise Backup and Recovery by  CommVault Systems, Inc.


June 28, 2013 - Check out this informative resource to uncover the key features of CommVault's backup and recovery solution, as well as its current offerings, strategies and market presence.

 

Discover What’s New in Oracle Data Integrator and Oracle GoldenGate by  Oracle Corporation


August 18, 2011 - Join Oracle data integration experts as they discuss the new versions of Oracle Data Integrator and Oracle GoldenGate.

 

Discover Why Capacity Planning is Critical to Cloud Success by  SearchCloudComputing.com


January 29, 2014 - A successful cloud computing initiative balances costs with efficiency. Accomplishing that requires proper capacity planning.

 

Discover, deliver and set the right customer experience expectations by  Genesys


February 21, 2013 - This expert resource examines the ways businesses can make sure that their organizations are empowering agents with the right technology to resolve problems by providing the right information to the agent at the right time and proactively discovering and delivering on customer expectation.

 

Discover, Interact, and Optimize for Smarter Healthcare with BPM Powered by Smart SOA by  IBM


August 10, 2011 - Read this white paper to discover how leveraging business process management (BPM), powered by smart service-oriented architecture (SOA), can make critical information available in a fast, consistent way which improves the quality of health care organizations.

 

Discovering hidden costs in your data centre – a CFO perspective by  IBM


September 01, 2010 - This paper describes how CFOs can help ensure a healthier bottom line by taking proactive steps today.

 

Discovering Improved Data Protection Strategies for the Virtual World by  NetApp


January 01, 2010 - This report examines the impact that virtualization has on data protection and disaster recovery and the need for highly virtualized servers and storage within this context.

 

Discovering Novell ZENworks 11 by  Novell, Inc.


November 18, 2010 - Novell is taking its family of systems-management products to the next level with ZENworks 11—by integrating them all into a single policy-based platform; providing unified management for a wider range of Windows and Linux devices; and making it easy to extend automated device management across physical, virtual and cloud environ­ments.

 

Discovering the Hidden Treasures of Toad® for Oracle by  Dell Software


November 03, 2010 - Toad® software for Oracle has been around for over a decade, and yet many people are still amazed by the depth and breadth of this product. Are you aware of the full potential that Toad can offer your Oracle environment?

 

Discovering the Value of a Data Discovery Platform by  Teradata


January 31, 2014 - Access the following white IDC research paper to uncover the requirements and drivers for acquiring a data discovery platform. Also learn about the capabilities with deployment, recommendations to choose from, and more

 

Discovering Vulnerable Web Applications by  Qualys


August 31, 2012 - This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.

 

Discovery Communications Continues Global Expansion with Help from Savvis Managed Services by  SAVVIS


June 25, 2010 - Savvis delivers a complex, fully managed infrastructure for Discovery to support its real-time advertising deliverables, ad sales, scheduling, and programming for all its international operations. Savvis’ solution allows Discovery to take advantage of a broad portfolio of managed services.

 

Disk Assisted Back-Up White Paper: Backup to Disk and How to Implement It with HP Data Protector by  Hewlett-Packard Company


September 01, 2006 - Advancements in technology and price reductions have recently made it possible to use disk together with tape to improve data protection. This white paper discusses the benefits of this technology.

 

Disk Backup Systems Continue to Evolve to Meet Growing Challenges by  Quantum Corporation


February 02, 2012 - Check out this SearchStorage.com E-Guide to learn about recent developments that allow disk to remain a viable backup solution in today's data-intensive environments. In this guide you'll learn about the top challenges associated with disk backup today, and learn about technologies that are evolving in order to overcome them. Read on for more.

 

Disk Backup with Deduplication by  ExaGrid Systems, Inc.


September 12, 2013 - This webcast discusses disk backup with data deduplication and the paradigm shift that's going on in data protection overall. Discover common mistakes and pitfalls you can make in your selection process when considering a data protection plan and key takeaways to prevent them.

 

Disk Backup with Deduplication: 10 Critical Mistakes to Avoid by  ExaGrid Systems, Inc.


February 26, 2013 - Access this white paper to learn how to avoid 10 disk backup with deduplication mistakes that could persist for years. Read on to explore topics including tape backup, dedupe approaches, disk backup architectures and much more.

 

Disk Backup: Sorting Through the Confusion of 5 Alternative Approaches by  ExaGrid Systems, Inc.


December 13, 2010 - Many IT organizations have grown dissatisfied with tape-based backups and are looking for alternatives. This white paper will discuss the factors to consider when evaluating any of these alternatives, including a framework for assessing the value to IT for each approach.

 

Disk Backup: Sorting Through the Confusion of 5 Alternative Approaches by  ExaGrid Systems, Inc.


December 13, 2010 - Many IT organizations have grown dissatisfied with tape-based backups and are looking for alternatives. This white paper will discuss the factors to consider when evaluating any of these alternatives, including a framework for assessing the value to IT for each approach.

 

Disk-based Data Protection Options: The Changing Data Protection Landscape by  ExaGrid Systems, Inc.


October 20, 2008 - This paper will compare and contrast the benefits of all new disk-based data protection options to allow you to select the best technology for each of the data types to be protected in your environment.

 

Disk-Based Backup & Recovery by  Datalink Corp


January 16, 2008 - Whether you're integrating disk into your existing tape-only environment or augmenting your current disk-based backup infrastructure, disk-based technologies should be utilized for the RIGHT reasons. This Webcast will explain what those reasons are.

 

Disk-Based Backup and Recovery: Making Sense of Your Options by  Datalink Corp


August 01, 2008 - This white paper details four enhanced data recovery (disk-based backup) architectures and provides guidance on how to determine whether or not those architectures would be an overall fit within the IT infrastructure.

 

Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker by  i365, makers of Evault


July 01, 2008 - In this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice.

 

Dismantling Barriers to EHR Adoption and Health Information Exchange by  Nuance


December 31, 2012 - Explore the challenges CIOs and CMIOs are facing when it comes to EHR and HIE adoption and explore how speech recognition and clinical language understanding technologies are helping forward-thinking organizations overcome these issues.

 

Dispelling Myths & Revealing Truths about Email Management with SharePoint by  Colligo Networks Inc.


May 18, 2011 - This white paper outlines five things you need to know before developing an email management solution. It also seeks to dispel myths about SharePoint and Exchange.

 

Dispelling the Myths of IBM i Data Access by  SEQUEL-Software


July 14, 2010 - Accessing data in a format that is usable for each type of user is often referred to as Business Intelligence, or BI. When done correctly, BI can be a powerful force in an organization. Unfortunately, that’s not often the case. Part of the problem is the many myths surrounding BI and its basic concepts.

 

Dispelling the Vapor Around Cloud Computing: Drivers, Barriers and Considerations for Public and Private Cloud Adoption by  IBM


December 03, 2010 - IBM conducted a survey in June and July of 2009 of 1,090 IT and line-of-business decision makers around the world. The purpose of this white paper is to share the survey findings, and to provide the IBM point of view regarding key steps and considerations for cloud adoption.

 

Dispelling Top Ten Wireless Security Myths by  AirTight Networks, Inc.


December 31, 2012 - Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.

 

Dispelling Top Ten Wireless Security Myths by  AirTight Networks, Inc.


August 01, 2008 - Myths about wireless security can be both dangerous and costly, this paper will revisit and debunk top ten wireless security myths.

 

Disrupt IT:  A new model for IT in the digital age by  ComputerWeekly.com


March 18, 2014 - Ian Cox, specialist in digital transformation and IT leadership, assesses the impact of digital technology on the role of the CIO.

 

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy by  Trend Micro, Inc.


October 26, 2010 - This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.

 

Distribute Workload for Greater Efficiency and Power Using the HP StorageWorks EVA 4400 with HP Bladesystem and Vmware Solution by  Hewlett-Packard Company


April 01, 2008 - The HP StorageWorks EVA4400 with HP BladeSystem provides an ideal platform for virtualization, with hardware and software that have been certified for VMware ESX Server.

 

Distributed Caching: Why It Matters For Predictable Scalability on the Web, and Where It’s Proving Its Value by  Oracle Corporation


December 20, 2010 - This paper explains why it’s imperative for any Web-based organization to learn about the distributed caching technology and Oracle Coherence Data Grid technology to combat the increasing demand on the database.

 

Distributed Capture Platforms: Reducing Costs, Removing Bottlenecks and Mitigating Risks by  EMC Corporation


August 01, 2008 - Remote workforces are a growing trend that has documentation implications on your business processes. This paper explores that, placing special emphasis on a distributed capture strategy for resolving remote workforce-related issues.

 

Distributed Data Capture: Reducing the Cost of Remote Business Processes by  Kofax, Inc.


March 10, 2011 - In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process.

 

Distributed IT Infrastructures: Alternative Approaches by  VM6 Software


October 27, 2009 - This whitepaper outlines the benefits derived and the costs associated with virtualization in the Remote Offices/Branch Offices, in the classic model versus the proposed model.

 

Distributed Network Architecture for WiMAX: For a Digital, Converged, Mobile IP World by  Motorola, Inc.


June 01, 2007 - The world is moving to IP and service providers in all geographies are embracing the shift.

 

Distributed Object Store Principles of Operation: The Case for Intelligent Storage by  Hitachi Data Systems


February 16, 2012 - This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.

 

Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam by  MessageLabs Symantec Hosted Solutions


January 14, 2011 - Todays wireless work environment poses new challenges for IT departments who must monitor and secure the online interactions of highly distributed and roaming workers. Companies are calling on security experts who can help organizations more effectively manage and protect their distributed workforce via the cloud.

 

Diving Deeper Into DevOps For The Large Organization by  OpenMake Software


May 28, 2014 - In large organizations, each development team approaches the DevOps challenge in a different way, making it difficult to manage DevOps for the entire organization and develop standardized processes. However, it's not impossible, and with the right strategy you can create a broader, holistic, approach to DevOps.

 

DIY SharePoint - 6 Reasons to Enable Self-Service SharePoint Customization by  Dell Software


September 18, 2013 - Organizations are concerned about the risks of do-it-yourself (DIY) customization in SharePoint with power users, rather than IT developers, developing important business applications. Download the paper and learn how to embrace self-service, while minimizing risk and maximizing return in investment.

 

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry by  FireEye


May 30, 2014 - This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.

 

DLP Content Discovery: Best Practices for Stored Data Discovery and Protection by  Symantec Corporation


March 16, 2009 - According to author Rich Mogull, one of the most under-appreciated aspects of DLP solutions is content discovery. Read this paper on DLP and discover features, best practices for deployment, and example use cases to illustrate how it functions.

 

DLP for Health Care by  SearchHealthIT.com


August 17, 2011 - Data loss prevention (DLP) in healthcare entails preventing confidential patient records from falling into the wrong hands and requires thought out, well-enforced policies and the technology to back them up. Inside this resourceful e-book, learn how to achieve DLP through data encryption, monitoring tools, risk assessments and more.

 

DM Portfolio E-Book - 3 Ways to Boost Development Productivity by  IBM


July 22, 2009 - As IT budgets get tighter and skills get more expensive, companies are starting to think of ways to get more out of their existing workforce. This e-book proposes three solutions that can help your developers and architects realize the best possible value from their existing infrastructure.

 

DM Portfolio E-Book: (Top level) - Data Management for Smarter Business Outcomes by  IBM


July 16, 2009 - This e-book highlights ways in which you can drive more cost effective data management with less overall resources, in good times and in tough times.

 

DNS Attack Prevention: Inside DNS Components Vulnerable to Attack by  F5 Networks


January 29, 2014 - In this expert e-guide, industry leader Char Sample explains why the domain name system (DNS) is an attractive target for hackers, and which of its 4 components is most vulnerable. Click now to also unveil 3 mitigation tactics.

 

DNS Firewalls and Defense Tactics by  Infoblox


February 18, 2013 - Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.

 

DNS in the Cloud: Building a Secure DNS Architecture by  F5 Networks


January 29, 2014 - Access this expert e-guide about DNS in the cloud to unveil the suggested tactics to improve DNS architectures and security, including DNSSEC signed zones.

 

DNSSEC - Secure DNS For Government by  BlueCat


August 31, 2010 - This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines.

 

Do I Know You? Solid-state Vendors Need Brands or OEM Contracts by  The 451 Group


October 24, 2011 - Late last year, 451 Research evaluated two solid-state storage variants: Solid-sate drives and solid-state cache in networked storage. This paper breaks down the detailed examination, and you can access the key findings here. Read on to learn who the top-ranked vendors are, find 8 top SSD drive criteria and hear what your peers said about SSD!

 

Do I Need a Server? If you’re looking to grow your small business, make sure you have the right tools by  Dell, Inc. and Microsoft


December 15, 2009 - Whether they know it or not, many small businesses can benefit greatly from adding a centralized server to their network. In this article, you'll read about many of these benefits.

 

Do I really need a UPS? by  Eaton Corporation


December 31, 2013 - Explore this resource to learn about the benefits of deploying a UPS in your existing data centre, even if power cuts to your equipment are rare.

 

Do Mobile Users Need Full Desktop Access? by  VMware, Inc.


August 02, 2013 - In this expert guide from SearchVirtualDesktop.com, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future.

 

Do More with Less: The Five Strategies used by Successful SMB Manufacturers by  Infor


September 04, 2008 - A common issue facing small and medium-sized business (SMB) manufacturers today is how to increase revenue and grow their business without significantly adding staff. Read this paper to learn five strategies used by successful SMBs.

 

Do The Right Thing – Assess Your Desktops Before Virtualizing Them! by  Flexera Software


April 30, 2014 - This e-guide from the experts at BrianMadden.com teaches readers how to intelligently assess a desktop environment, including a review of assessment tools available on the market that help users evaluate physical desktop applications as well as those on virtual desktops.

 

Do You Know Where Your Assets Are? Maximizing ROI With Radio Frequency Identification (RFID) Asset Management by  Intermec


March 04, 2009 - This white paper examines asset tracking with RFID technology by providing a brief overview of technologies available, an explanation of how passive UHF RFID can be used for asset tracking, an exploration of who's using RFID, a discussion on deciding what to track and making a business case for RFID, and a guide to choosing the right RFID partners.

 

Do you need a robust IT infrastructure to support your rapid business expansion? by  IBM


January 23, 2013 - This white paper details a solution to protect consumer data with a solid disaster recovery plan that also brings other benefits.

 

Do You Really Need A SAN-Based Cluster? Ten Essential Questions to Ask Before Choosing a Cluster Solution by  SIOS Technology Corp


February 05, 2014 - Businesses today are deploying applications in physical, virtual, and cloud environments, and as such, clusters based on storage SANs are no longer the go-to choice for application security. SAN-less clusters offer increased flexibility and cost savings without sacrificing performance -- but will they work for your IT environment?

 

Do-It-Yourself Business Intelligence Done Right: The Secret Sauce is SaaS by  myDIALS Inc.


December 18, 2009 - This Presentation Transcript, featuring Forrester Research, explains how Software as a Service business intelligence can deliver a more cost-effective way to get relevant information to those who need it faster than traditional business intelligence can.

 

Docmosis V2.0 by  Docmosis


June 15, 2009 - Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool.

 

Document Capture Across the Health Care Enterprise: Onramp to Improved Business Processes and Health Care Quality by  Kofax, Inc.


March 10, 2011 - Health care organizations across the country are migrating toward automated systems in an effort to operate more efficiently and improve quality. The push to adopt electronic health records (EHRs) has grabbed significant attention from health care leaders as well as the media and government. Read this white paper now to learn more!

 

Document Management with Office SharePoint Server 2007 by  Microsoft


August 01, 2007 - The Office SharePoint Server 2007 document management solution is uniquely positioned to help your organization succeed with its document management goals. With Sharepoint you can extend document management capabilities to all employees, improving compliance with enterprise standards and delivering value to the business.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts