D Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
D Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

Dimensional Research - Uncovering the Business Value of IT Service Management by  Hewlett-Packard Company

December 31, 2011 - The rapidly changing world of IT can be tough to adapt to, especially with further decentralization via the cloud. This white paper highlights IT service management and how it can increase your business efficiency.


Dimensional Research: Uncovering the Business Value of IT Service Management: Five Ways HP Service Manager Can Make You a Hero by  Hewlett-Packard Company

February 28, 2013 - Access this research report that discusses how 11 different customers deployed HP service manager to improve their ITSM strategy. Discover the results they achieved and how your organization could similarly benefit.


Directory Services Integration with Database Enterprise User Security by  Oracle Corporation

April 01, 2008 - This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment.


Dirk Hohndel on Intel and the Linux Foundation by  Intel

November 01, 2010 - In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.


Dirty Little Secrets: Mobile Apps Invading Your Privacy by  Veracode, Inc.

July 27, 2011 - Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.


Disable Lost PCs and Data Remotely by  Intel

January 22, 2010 - Learn how the all new 2010 Intel® Core™ vPro™ processor family can help by disabling lost or stolen PCs via a poison pill, and how they can be easily reactivated via server-generated passwords thanks to Intel® Anti-Theft Technology and WinMagic.


Disaster Got You Down? by  CDW Corporation

September 08, 2009 - While trying to predict an outage is impossible, being prepared for one is not. Having the right tools in place to respond to a "disaster" is essential to sustaining a successful organization. A business-continuity / disaster-recovery plan can help you cut costs by avoiding downtime, lost revenue and dissatisfied customers.


Disaster Got You Down? by  CDW Corporation

January 27, 2010 - The risks attached to not having a BC or DR plan are neither small nor cheap. Every good plan employs certain technologies and methodologies to limit the disruptiveness of an outage. CDW offers storage, power and networking specialists to assist with disaster recovery needs.


Disaster Preparedness for Core Network Services by  Infoblox

January 31, 2013 - This in-depth white paper details the potential of network failure and how building a more resilient network infrastructure can cut back on time lost during disaster recovery.


Disaster Preparedness for Core Network Services by  Infoblox

January 31, 2013 - This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.


Disaster Preparedness: Is there a hole in your disaster recovery plan? by  Iron Mountain

January 04, 2012 - Access this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan.


Disaster Recovery 101: Assessing Risk & Preventing Human-made Disasters by  QuorumLabs

December 29, 2011 - This SearchDisasterRecovery.com E-Guide will provide you with the necessary steps for evaluating risk in you DR plan, and offer insight into the high-level threats you need to watch out for today. Read on for a deep dive into the risk evaluation process, information on preventing human-made disasters and more.


Disaster Recovery and the Cloud: Are you prepared? by  Symmetry Corporation

October 17, 2011 - Check out this E-Guide for key considerations when drawing up a DR plan and to learn how the cloud can work into such a strategy. You'll also learn what types of organizations can most benefit from DR in the cloud. Read on to learn more.


Disaster Recovery and the Cloud: New solutions for offsite data protection by  Nasuni Corporation

April 20, 2011 - offers an unlimited supply of reliable storage at a very low cost. Traditionally slow access speeds prevented the real use of the cloud in disaster recovery planning. However, modern cloud storage gateways accelerate the speed of access and can provide immediate access to data stored in the cloud. Read on to learn more today!


Disaster Recovery Best Practices by  Hewlett-Packard Company

June 01, 2008 - Learn best practices for developing a disaster recovery plan for your organization, including disaster recovery strategies for companies that are using data de-duplication.


Disaster Recovery E-Brief by  QuorumLabs

January 16, 2012 - Featuring a detailed list of everything you need to establish an effective DR strategy, this resource featuring expert Paul Kirvan has all of the information you need to get started developing and managing a successful DR plan. Read on for today's best practices and newest DR strategies.


Disaster Recovery eZine - Covering All the Bases: A Concise Guide to Disaster Recovery Essentials, from Building a Plan to Putting It to the Test by  SearchDisasterRecovery.com

December 05, 2008 - Disaster recovery (DR) has quickly become the top priority for today's storage managers. However, the issue isn't whether or not you have a DR plan, but rather if you have one that will work when needed. This paper covers all the bases.


Disaster Recovery Planning 2012: Essential Steps for Building a Business-Savvy Business Continuity Capability by  EMC

March 20, 2013 - Access this exclusive disaster recovery/business continuity presentation by Jon Toigo, CEO and managing partner of Toigo Partners International, to explore expert insight into the steps to building a business-savvy business continuity strategy.


Disaster Recovery Planning 2012: Essential Steps for Building a Business-Savvy Business Continuity Capability by  EMC Corporation

March 14, 2013 - Access this expert Storage Decisions E-Book by Evaluator Group Senior Strategist Randy Kerns to learn what big data means for storage. Check it out to explore why storage pros need to care about big data and find out what big data demands of your storage infrastructure.


Disaster Recovery Planning 2012: Essential Steps for Building a Business-Savvy Business Continuity Capability by  EMC Corporation

March 20, 2013 - Access this exclusive disaster recovery/business continuity presentation by Jon Toigo, CEO and managing partner of Toigo Partners International, to explore expert insight into the steps to building a business-savvy business continuity strategy.


Disaster Recovery Planning and Network Services by  Dell Compellent

October 03, 2011 - In this FAQ, Carrie Higbie, global director for data center solutions at the Siemon Company, discusses the role of network services in DR planning.


Disaster Recovery Planning for BlackBerry Enterprise Server for Microsoft Exchange by  BlackBerry

March 18, 2009 - This document provides an overview of BlackBerry® Enterprise Server components and is intended to help administrators prepare for the design and delivery of disaster recovery procedures for the BlackBerry environment.


Disaster recovery planning for health care data by  Sirius and NetApp

June 15, 2012 - This E-Guide from SearchHealthIT.com demonstrates why disaster recovery and business continuity is particularly important for health care facilities. Within, learn how to formulate a successful disaster recovery plan to ensure the avoidance of compliance penalties or reputational damage due to data loss.


Disaster recovery planning for health care data and HIPAA compliance regulations by  Iron Mountain

July 27, 2012 - This E-Guide highlights the importance of disaster recovery to today's health care organizations. Read now to uncover essential steps for implementing a DRP in a health care setting, ensuring HIPAA compliance and the protection of electronic health records.


Disaster recovery planning for HIPAA compliance by  HP & Intel®

September 19, 2011 - The HIPAA Security Rule requires all HIPAA covered entities to create a plan for first protecting and then restoring confidential patient data in the event of a disaster. Unfortunately, HIPAA does not say much about what should go into such a disaster recovery plan. Inside this e-guide, find tips for a compliant disaster recovery plan.


Disaster Recovery Planning with Virtualization Technologies by  Vision Solutions

May 27, 2010 - Business continuity is not just a good business practice - it can mean success or failure if data and applications on a production server are lost. Read this white paper which examines Double-Take Software and their innovative approach to business continuity - one that goes beyond just recovery.


Disaster Recovery Plans Should Affect More Than Just IT by  Veeam Software

January 31, 2014 - Take a look at this expert e-guide to find out about the many disaster recovery options available, and how they would fit into your company's environment.


Disaster Recovery Seminar Presentation Download by  EMC Backup and Recovery Solutions

September 15, 2009 - This presentation is divided into three modules. In the first module, we will examine the three keys to successful disaster recovery planning. In modules two and three, we will analyse data protection techniques and testing techniques.


Disaster Recovery Services FAQ for Resellers by  IBM

June 21, 2011 - In this SearchStorageChannel.com FAQ Guide on disaster recovery services, ESG analyst Bob Laliberte discusses several important disaster recovery trends - including greater use of virtual tape libraries and disk-based backups - and the impact these trends will have on resellers and service providers.


Disaster Recovery Solutions from VMware: Transforming Disaster Recovery - VMware Infrastructure for Rapid, Reliable and Cost-Effective Disaster Recovery by  VMware, Inc.

October 01, 2008 - VMware Infrastructure is transforming the way disaster recovery is done today and in the future; it changes the disaster recovery paradigm to one that is cost effective, rapid and reliable.


Disaster Recovery Strategy Building by  Dell, Inc.

March 20, 2013 - In this transcript of a video by expert Jon Toigo, founder and CEO of Toigo Partners International outlines what should go into a disaster prevention strategy and why, above all, data must be protected. Also discussed - the importance of data restore time.


Disaster recovery strategy’s impact on patient care by  HP & Intel®

May 14, 2013 - How confident are you that your health care organization can recover from a disaster? This resource highlights the impact unplanned downtime can have on your hospital. Read now to learn about an effective disaster recovery strategy that will ensure the safety of your patient data.


Disaster Recovery Utilizing P2Vs by  AMD

November 01, 2011 - This presentation transcript follows the history of P2V and explains how companies can extend virtualization to the physical machines in their production environments. Find out when virtualization may not be recommended and discover key DR points to keep in mind. including RTO and RPO.


Disaster Recovery with ETERNUS DX – The Data Safe – and VMware SRM by  Fujitsu America, Inc.

December 06, 2010 - This paper shows the way to protect data and business, where hardware is only one factor. The other factor is the proof that in a worst case scenario the protection works well. The challenge is to test that protection in near real-life situations but without impact on business production.


Disaster Recovery with Sunbelt Exchange Archiver by  Sunbelt Software

January 01, 2008 - Sunbelt's Exchange Archiver simplifies disaster recovery by using its revolutionary designed Hierarchical Storage Management (HSM). The HSM store is integrated into the SEA server and redirects archived email into various storage media.


Disaster Recovery with the HP StorageWorks Enterprise File Services Clustered Gateway Linux Version and HP StorageWorks XP Continuous Access by  Hewlett-Packard Company

December 01, 2007 - This white paper reviews proof points and best practices for file sharing disaster recovery.


Disaster Recovery: A CIO’s First Line of Defense by  Dell and VMware

March 05, 2013 - Access this e-guide for an expert Q&A discussion with independent consultant and auditor, Paul Kirvan, on developing an effective disaster recovery and business continuity plan. In addition, compare the gains and losses for today's DR management.


Disaster Recovery: Identify Data Value for a Targeted DR Solution by  American Megatrends Inc.

April 01, 2008 - A disaster can strike at anytime and your organization is vulnerable. This white paper provides a complete outline - filled with tips and best practices - on creating the most effective disaster recovery plan for your company's needs.


Disaster Recovery: Identify Data Value for a Targeted DR Solution by  Excel Meridian Data, Inc.

June 01, 2008 - The StorTrends© line of storage products from American Megatrends offers a wide variety of DR solutions in its StorTrends storage server appliances including remote, real-time replication, and D2D2T Backup.


Disaster Recovery: The Game Has Changed by  SunGard Availability Services

January 29, 2014 - This expert resource covers the changes that have made disaster recovery that much more challenging and offers managed recovery service providers as a helpful solution.


Disaster Tolerant Solutions Using Continuous Access for HP StorageWorks Enterprise Virtual Array in a Vmware Infrastructure 3 Environment by  Hewlett-Packard Company

April 01, 2008 - This paper describes two deployment types of a VMware tolerant solution, based on coupling key VMware features with disaster tolerance functionality of HP StorageWorks Continuous Access EVA.


Disclosure Management for budgeting, planning and forecasting -- the next frontier? by  IBM

October 31, 2012 - This resource explains how disclosure management can lead to significant productivity gains when used for statutory reporting, and evaluates the viability of this strategy as an option for improving budgeting, planning, and forecasting (BPF) financial processes.


Disclosures 2012 - The Vulnerability of Publicly Traded Companies by  Veracode, Inc.

May 23, 2012 - In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.


Discount Tire Accelerates Its E-Commerce Business With Red Hat Satellite And IBM by  Red Hat and JBoss

July 28, 2009 - In 2000, Discount Tire Company decided to bring management of its e-commerce infrastructure in-house after having outsourced it for several years. Learn how they turned to the rock-solid reliability of Red Hat's Enterprise Linux platform to handle the task of supporting their new e-commerce environment.


Discover and Manage Your Network Perimeter by  Lumeta Corporation

February 12, 2014 - This exclusive paper discusses the importance of establishing a network perimeter, examining business trends that change network boundaries, and guiding the use of network perimeters to secure critical data and applications.


Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention by  Trend Micro, Inc.

July 15, 2010 - When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it.


Discover How Mail Express Solves 2 of Your Biggest IT Headaches by  GlobalScape

December 31, 2012 - Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.


Discover information integration and governance in your organization by  IBM

May 05, 2011 - In this presentation transcript, Ron Powell will provide an overview of the information integration and governance theme and discuss the importance of the five topics within that theme: information integration, MDM, data warehousing and analytics, database management and tools, and database security and privacy, and lifecycle management.


Discover the Key to a More Cost Effective Data Center by  Alcatel-Lucent

October 27, 2011 - It is difficult for data center pros to make full use of their resources if they do not have the right infrastructure in place. This exclusive webcast explains how virtualization can enable you to leverage your IT assets more effectively and offers advice to help you prepare for new IT models like the cloud.


Discover the Key to a More Cost-Effective Data Center by  Alcatel-Lucent

November 04, 2011 - Emerging technologies such as virtualization and cloud computing are driving the demand for a next generation data center. This essential resource explores how you can make your business operations more cost effective and how service providers can help you rationalize and optimize your infrastructure, and sustain rapid expansion.


Discover the power of big data to uncover innovation by  Hewlett-Packard Limited

October 29, 2013 - This brief video introduces a big data discovery strategy that puts the power of big data in your hands – allowing you to affordably justify and prove your big data innovations before you put them to work.


Discover The Power To Do More by  Dell, Inc. and Intel®

February 22, 2012 - This white paper explores the attributes of efficient IT and reveals five core elements that you should focus on to keep pace in the virtual era. Hear from your peers on how they are successfully leveraging virtualization, managing ever-growing data volumes, preparing for the cloud, and more.


Discover the Unique Benefits of Enterprise Search Technology for Your Organization by  Google Search Appliance

December 06, 2010 - Read this e-guide and uncover how enterprise search technology is helping knowledge workers find relevant information quickly and easily. Learn about how enterprise search has positively impacted the content management applications market.


Discover What’s New in Oracle Data Integrator and Oracle GoldenGate by  Oracle Corporation

August 18, 2011 - Join Oracle data integration experts as they discuss the new versions of Oracle Data Integrator and Oracle GoldenGate.


Discover Why Capacity Planning is Critical to Cloud Success by  SearchCloudComputing.com

January 29, 2014 - A successful cloud computing initiative balances costs with efficiency. Accomplishing that requires proper capacity planning.


Discover, deliver and set the right customer experience expectations by  Genesys

February 21, 2013 - This expert resource examines the ways businesses can make sure that their organizations are empowering agents with the right technology to resolve problems by providing the right information to the agent at the right time and proactively discovering and delivering on customer expectation.


Discover, Interact, and Optimize for Smarter Healthcare with BPM Powered by Smart SOA by  IBM

August 10, 2011 - Read this white paper to discover how leveraging business process management (BPM), powered by smart service-oriented architecture (SOA), can make critical information available in a fast, consistent way which improves the quality of health care organizations.


Discovering hidden costs in your data centre – a CFO perspective by  IBM

September 01, 2010 - This paper describes how CFOs can help ensure a healthier bottom line by taking proactive steps today.


Discovering Improved Data Protection Strategies for the Virtual World by  NetApp

January 01, 2010 - This report examines the impact that virtualization has on data protection and disaster recovery and the need for highly virtualized servers and storage within this context.


Discovering Novell ZENworks 11 by  Novell, Inc.

November 18, 2010 - Novell is taking its family of systems-management products to the next level with ZENworks 11—by integrating them all into a single policy-based platform; providing unified management for a wider range of Windows and Linux devices; and making it easy to extend automated device management across physical, virtual and cloud environ­ments.


Discovering the Hidden Treasures of Toad® for Oracle by  Dell Software

December 31, 2010 - Toad® software for Oracle has been around for over a decade, and yet many people are still amazed by the depth and breadth of this product. Are you aware of the full potential that Toad can offer your Oracle environment?


Discovering the Value of a Data Discovery Platform by  Teradata

January 31, 2014 - Access the following white IDC research paper to uncover the requirements and drivers for acquiring a data discovery platform. Also learn about the capabilities with deployment, recommendations to choose from, and more


Discovering Vulnerable Web Applications by  Qualys

August 31, 2012 - This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.


Discovery Communications Continues Global Expansion with Help from Savvis Managed Services by  SAVVIS

June 25, 2010 - Savvis delivers a complex, fully managed infrastructure for Discovery to support its real-time advertising deliverables, ad sales, scheduling, and programming for all its international operations. Savvis’ solution allows Discovery to take advantage of a broad portfolio of managed services.


Dish TV Virtualizes Storage to Boost Call Center Reliability by  HP India

June 30, 2013 - Access this concise case study to find out which HP storage and blade servers Dish TV adopted to accommodate business growth.


Disk Assisted Back-Up White Paper: Backup to Disk and How to Implement It with HP Data Protector by  Hewlett-Packard Company

September 01, 2006 - Advancements in technology and price reductions have recently made it possible to use disk together with tape to improve data protection. This white paper discusses the benefits of this technology.


Disk Backup Systems Continue to Evolve to Meet Growing Challenges by  Quantum Corporation

February 02, 2012 - Check out this SearchStorage.com E-Guide to learn about recent developments that allow disk to remain a viable backup solution in today's data-intensive environments. In this guide you'll learn about the top challenges associated with disk backup today, and learn about technologies that are evolving in order to overcome them. Read on for more.


Disk Backup with Deduplication by  ExaGrid Systems, Inc.

September 12, 2013 - This webcast discusses disk backup with data deduplication and the paradigm shift that's going on in data protection overall. Discover common mistakes and pitfalls you can make in your selection process when considering a data protection plan and key takeaways to prevent them.


Disk Backup: Sorting Through the Confusion of 5 Alternative Approaches by  ExaGrid Systems, Inc.

December 13, 2010 - Many IT organizations have grown dissatisfied with tape-based backups and are looking for alternatives. This white paper will discuss the factors to consider when evaluating any of these alternatives, including a framework for assessing the value to IT for each approach.


Disk Backup: Sorting Through the Confusion of 5 Alternative Approaches by  ExaGrid Systems, Inc.

December 13, 2010 - Many IT organizations have grown dissatisfied with tape-based backups and are looking for alternatives. This white paper will discuss the factors to consider when evaluating any of these alternatives, including a framework for assessing the value to IT for each approach.


Disk-based Data Protection Options: The Changing Data Protection Landscape by  ExaGrid Systems, Inc.

October 20, 2008 - This paper will compare and contrast the benefits of all new disk-based data protection options to allow you to select the best technology for each of the data types to be protected in your environment.


Disk-Based Backup & Recovery by  Datalink and NetApp

January 16, 2008 - Whether you're integrating disk into your existing tape-only environment or augmenting your current disk-based backup infrastructure, disk-based technologies should be utilized for the RIGHT reasons. This Webcast will explain what those reasons are.


Disk-Based Backup and Recovery: Making Sense of Your Options by  Datalink and NetApp

August 01, 2008 - This white paper details four enhanced data recovery (disk-based backup) architectures and provides guidance on how to determine whether or not those architectures would be an overall fit within the IT infrastructure.


Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker by  i365, makers of Evault

July 01, 2008 - In this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice.


Dismantling Barriers to EHR Adoption and Health Information Exchange by  Nuance

December 31, 2012 - Explore the challenges CIOs and CMIOs are facing when it comes to EHR and HIE adoption and explore how speech recognition and clinical language understanding technologies are helping forward-thinking organizations overcome these issues.


Dispelling Myths & Revealing Truths about Email Management with SharePoint by  Colligo Networks Inc.

May 18, 2011 - This white paper outlines five things you need to know before developing an email management solution. It also seeks to dispel myths about SharePoint and Exchange.


Dispelling the Myths of IBM i Data Access by  SEQUEL-Software

July 14, 2010 - Accessing data in a format that is usable for each type of user is often referred to as Business Intelligence, or BI. When done correctly, BI can be a powerful force in an organization. Unfortunately, that’s not often the case. Part of the problem is the many myths surrounding BI and its basic concepts.


Dispelling the Vapor Around Cloud Computing: Drivers, Barriers and Considerations for Public and Private Cloud Adoption by  IBM

December 03, 2010 - IBM conducted a survey in June and July of 2009 of 1,090 IT and line-of-business decision makers around the world. The purpose of this white paper is to share the survey findings, and to provide the IBM point of view regarding key steps and considerations for cloud adoption.


Dispelling Top Ten Wireless Security Myths by  AirTight Networks, Inc.

December 31, 2012 - Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.


Dispelling Top Ten Wireless Security Myths by  AirTight Networks, Inc.

August 01, 2008 - Myths about wireless security can be both dangerous and costly, this paper will revisit and debunk top ten wireless security myths.


Disrupt IT:  A new model for IT in the digital age by  ComputerWeekly.com

March 18, 2014 - Ian Cox, specialist in digital transformation and IT leadership, assesses the impact of digital technology on the role of the CIO.


Dissatisfied with Cost and Time You're Spending on IT Discovery? by  IBM

January 10, 2013 - This whitepaper covers methods for improving IT discovery and details analytics for logical dependency mapping.


Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy by  Trend Micro, Inc.

October 26, 2010 - This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.


Distribute Workload for Greater Efficiency and Power Using the HP StorageWorks EVA 4400 with HP Bladesystem and Vmware Solution by  Hewlett-Packard Company

April 01, 2008 - The HP StorageWorks EVA4400 with HP BladeSystem provides an ideal platform for virtualization, with hardware and software that have been certified for VMware ESX Server.


Distributed Caching: Why It Matters For Predictable Scalability on the Web, and Where It’s Proving Its Value by  Oracle Corporation

December 20, 2010 - This paper explains why it’s imperative for any Web-based organization to learn about the distributed caching technology and Oracle Coherence Data Grid technology to combat the increasing demand on the database.


Distributed Capture Platforms: Reducing Costs, Removing Bottlenecks and Mitigating Risks by  EMC Corporation

August 01, 2008 - Remote workforces are a growing trend that has documentation implications on your business processes. This paper explores that, placing special emphasis on a distributed capture strategy for resolving remote workforce-related issues.


Distributed Data Capture: Reducing the Cost of Remote Business Processes by  Kofax, Inc.

March 10, 2011 - In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process.


Distributed IT Infrastructures: Alternative Approaches by  VM6 Software

October 27, 2009 - This whitepaper outlines the benefits derived and the costs associated with virtualization in the Remote Offices/Branch Offices, in the classic model versus the proposed model.


Distributed Network Architecture for WiMAX: For a Digital, Converged, Mobile IP World by  Motorola, Inc.

June 01, 2007 - The world is moving to IP and service providers in all geographies are embracing the shift.


Distributed Object Store Principles of Operation: The Case for Intelligent Storage by  Hitachi Data Systems

February 16, 2012 - This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.


Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam by  MessageLabs Symantec Hosted Solutions

January 14, 2011 - Todays wireless work environment poses new challenges for IT departments who must monitor and secure the online interactions of highly distributed and roaming workers. Companies are calling on security experts who can help organizations more effectively manage and protect their distributed workforce via the cloud.


Distribution platform: Optimize performance in your supply chain - An Epicor Solution by  Epicor Software Corporation

August 31, 2013 - This guide introduces a distribution platform designed to drive better performance in the supply chain. Read on to learn more.


DLP Content Discovery: Best Practices for Stored Data Discovery and Protection by  Symantec Corporation

March 16, 2009 - According to author Rich Mogull, one of the most under-appreciated aspects of DLP solutions is content discovery. Read this paper on DLP and discover features, best practices for deployment, and example use cases to illustrate how it functions.


DLP for Health Care by  SearchHealthIT.com

August 17, 2011 - Data loss prevention (DLP) in healthcare entails preventing confidential patient records from falling into the wrong hands and requires thought out, well-enforced policies and the technology to back them up. Inside this resourceful e-book, learn how to achieve DLP through data encryption, monitoring tools, risk assessments and more.


DM Portfolio E-Book - 3 Ways to Boost Development Productivity by  IBM

July 22, 2009 - As IT budgets get tighter and skills get more expensive, companies are starting to think of ways to get more out of their existing workforce. This e-book proposes three solutions that can help your developers and architects realize the best possible value from their existing infrastructure.


DM Portfolio E-Book: (Top level) - Data Management for Smarter Business Outcomes by  IBM

July 16, 2009 - This e-book highlights ways in which you can drive more cost effective data management with less overall resources, in good times and in tough times.


DNS Attack Prevention: Inside DNS Components Vulnerable to Attack by  F5 Networks

January 29, 2014 - In this expert e-guide, industry leader Char Sample explains why the domain name system (DNS) is an attractive target for hackers, and which of its 4 components is most vulnerable. Click now to also unveil 3 mitigation tactics.


DNS Firewalls and Defense Tactics by  Infoblox

February 18, 2013 - Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.


DNS in the Cloud: Building a Secure DNS Architecture by  F5 Networks

January 29, 2014 - Access this expert e-guide about DNS in the cloud to unveil the suggested tactics to improve DNS architectures and security, including DNSSEC signed zones.


DNSSEC - Secure DNS For Government by  BlueCat

August 31, 2010 - This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines.


Do I Know You? Solid-state Vendors Need Brands or OEM Contracts by  The 451 Group

October 24, 2011 - Late last year, 451 Research evaluated two solid-state storage variants: Solid-sate drives and solid-state cache in networked storage. This paper breaks down the detailed examination, and you can access the key findings here. Read on to learn who the top-ranked vendors are, find 8 top SSD drive criteria and hear what your peers said about SSD!


Do I Need a Server? If you’re looking to grow your small business, make sure you have the right tools by  Dell, Inc. and Microsoft

December 15, 2009 - Whether they know it or not, many small businesses can benefit greatly from adding a centralized server to their network. In this article, you'll read about many of these benefits.


Do Mobile Users Need Full Desktop Access? by  VMware, Inc.

August 02, 2013 - In this expert guide from SearchVirtualDesktop.com, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future.


Do More with Less - How Red Hat Enterprise Linux Reduces TCO Compared to Microsoft Windows by  Red Hat

December 19, 2013 - This webinar examines how deploying your next application on Red Hat Enterprise Linux could save you up to one third of your IT budget compared with Windows.


Do More with Less: The Five Strategies used by Successful SMB Manufacturers by  Infor

September 04, 2008 - A common issue facing small and medium-sized business (SMB) manufacturers today is how to increase revenue and grow their business without significantly adding staff. Read this paper to learn five strategies used by successful SMBs.


Do You Know Where Your Assets Are? Maximizing ROI With Radio Frequency Identification (RFID) Asset Management by  Intermec

March 04, 2009 - This white paper examines asset tracking with RFID technology by providing a brief overview of technologies available, an explanation of how passive UHF RFID can be used for asset tracking, an exploration of who's using RFID, a discussion on deciding what to track and making a business case for RFID, and a guide to choosing the right RFID partners.


Do You Really Need A SAN-Based Cluster? Ten Essential Questions to Ask Before Choosing a Cluster Solution by  SIOS Technology Corp

February 05, 2014 - Businesses today are deploying applications in physical, virtual, and cloud environments, and as such, clusters based on storage SANs are no longer the go-to choice for application security. SAN-less clusters offer increased flexibility and cost savings without sacrificing performance -- but will they work for your IT environment?


Do you want to accelerate the speed of SAP deployments? Extend SAP ALM by  IBM

November 19, 2013 - Join James Hunter, IBM Segment Manager, SAP, and Steve Pitschke, IBM Rational Senior Software Engineer, in this webcast to learn how to accelerate the speed of SAP deployment.


Do-It-Yourself Business Intelligence Done Right: The Secret Sauce is SaaS by  myDIALS Inc.

December 18, 2009 - This Presentation Transcript, featuring Forrester Research, explains how Software as a Service business intelligence can deliver a more cost-effective way to get relevant information to those who need it faster than traditional business intelligence can.


Docmosis V2.0 by  Docmosis

June 15, 2009 - Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool.


Document Capture Across the Health Care Enterprise: Onramp to Improved Business Processes and Health Care Quality by  Kofax, Inc.

March 10, 2011 - Health care organizations across the country are migrating toward automated systems in an effort to operate more efficiently and improve quality. The push to adopt electronic health records (EHRs) has grabbed significant attention from health care leaders as well as the media and government. Read this white paper now to learn more!


Document Management with Office SharePoint Server 2007 by  Microsoft

August 01, 2007 - The Office SharePoint Server 2007 document management solution is uniquely positioned to help your organization succeed with its document management goals. With Sharepoint you can extend document management capabilities to all employees, improving compliance with enterprise standards and delivering value to the business.


Document Process Automation for customer orders by  Esker Inc.

January 01, 2008 - This white paper focuses on DPA of order management processes governing incoming documents, and more specifically on customer orders (incoming documents also include supplier invoices).


Document Solutions IP Faxing versus Conventional Faxing: A Critical Analysis by  Premiere Global Services

October 10, 2008 - This white paper uses examples in three industries with the heaviest fax usage - finance, healthcare, and insurance - to demonstrate costs and risks that are shared across all industries.


Document Workflow Automation and Secure Archiving by  Symtrax Corporation

December 04, 2013 - Join this free 45 minute live demo to learn about a solution for creating and managing automated document workflows. See how you can gain peace of mind with a secure and easily searchable archive that allows users to view, print, or email documents through one single Internet browser.


Documentum - Digital Asset Manager by  EMC Corporation

EMC Documentum Digital Asset Manager exposes a set of powerful transformations and enhanced content previews, enabling you to fully leverage the value of your digital assets.


Digital Asset Management by  EMC Corporation

March 01, 2008 - The EMC Documentum digital asset management solution provides a platform and Web interface that makes video accessible across the enterprise while supporting collaborative business processes.


Documentum xCelerated Composition Platform by  EMC Corporation

July 08, 2010 - Documentum xCP is the new standard in application and solution development. This interactive tour highlights how your organization can rapidly build and maintain case management applications and solutions at a lower cost, with fewer resources, and with less risk.


DocuSign - Electronic Signature Services by  DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs.


Does an ERP Implementation Make Sense for Your Organization? by  Sage Software

February 10, 2012 - How can you tell if your organization is ready for an enterprise resource planning (ERP) software implementation? Read this guide for advice on how to know if choosing ERP is the right strategy for you and get answers to the three most important questions you should address before you select an ERP vendor.


Does Application Security Pay? by  Hewlett-Packard Company

December 31, 2013 - This exclusive resource discusses how your organization can dramatically reduce application vulnerabilities, speed recovery time, and minimize delays. Read on to learn more.


Does Application Security Pay? Measuring the Business Impact of Software Security Assurance Solutions by  Hewlett-Packard Company

January 20, 2014 - This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.


Does Cloud Computing Reduce IT Staffing and Costs? by  IBM

December 20, 2012 - Access this expert e-guide to discover the real benefits and cost savings that cloud computing can bring to your enterprise.


Does the mobile M2M market herald the rise of the machines? by  ComputerWeekly.com

December 01, 2010 - Mobile operators are in a unique position to capitalise on the M2M (Machine to machine) opportunity with operators such as Vodafone, o2, Verizon and KPN already putting significant resources into developing M2M business units.


Does tiered pricing require more visibility into mobile data usage? by  Mu Dynamics

April 20, 2011 - This e-guide discusses the top factors driving the trend for tiered pricing. Uncover what key carriers are considering for the future and what it means for end users.


Doing More with Less: Next-Generation Strategies and Best Practices for Customer Service by  eGain Communications Corp.

December 01, 2003 - Download a complimentary white paper on how world-class companies sustain service excellence, improve contact center productivity and reduce costs to beat their competitors in today's tough business environment.


Domino Security Vulnerabilities to Watch For by  Symantec Corporation

December 04, 2012 - Access this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.


Domino’s Pizza:  Datacentre Transformation by  ComputerWeekly.com

May 29, 2012 - Colin Rees, IT Director at Domino’s Pizza explains how a project to move the company data centre into the cloud has transformed its online business.


Don't Be a Hostage to Your ERP System by  CSC

January 01, 2012 - ERP systems are essential to the functioning of your business, but when it comes to customizing ERP systems to fit changing needs, it can be a lengthy, costly, risky process. Wouldn't it be great if you could get the process agility you need from your ERP system, without the complexity or the high price tag? Access this resource to find out how.


Don't Get Lost in Multi-Vendor Support Chaos by  Hewlett-Packard Limited

January 08, 2014 - This video features a case study of one company that moved on from to a single vendor to end the chaos in their support environment.


Don't Let Automation Pass You By by  N-able Technologies

September 27, 2013 - This white paper provides essential information that every managed service provider (MSP) needs to know when it comes to remote monitoring and management (RMM) automation software.


Don't Let High Data Center Cooling Costs Burn Your Budget by  SearchDataCenter.com

March 07, 2013 - This expert resource presents key approaches to data center cooling to prevent serious failures and achieve substantial cost savings.


Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It by  Symantec Corporation

October 24, 2013 - Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid.


Don't sweat assets, liberate them! by  ComputerWeekly.com

October 05, 2012 - Analysts Clive Longbottom and Rob Bamforth look at the benefits of IT lifecycle management (ITLM)


Don't Wait Until It's Too Late: Backup to the Cloud to Protect Your Business from Disaster by  Symantec Corporation

September 30, 2011 - Access this white paper to learn how cloud-based backup is a compelling alternative to hardware solutions and on-premise software to protect data in case of severe computer or network outage.


Don’t Fire Your Firewall by  AT&T Corp

January 04, 2011 - Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.


Don’t Forget the “User” in User Data Management by  Copiun

May 07, 2010 - The end users' point of view is really important, because they are all about ease of use and productivity and their sheer number makes it hard to control their behavior. This article will take a look at the requirements end users expect from the data management or data backup solutions.


Don’t Get Stuck on Your Virtualization Journey: Where to Focus Next by  VMware, Inc.

July 25, 2013 - This white paper presents key insights into where you should focus your virtualization efforts on in order to achieve the anticipated benefits. Also learn about the three distinctive phases your virtualization journey should consist of.


Don’t Get Stuck on your Virtualization Journey: Where to Focus Next by  VMware, Inc.

July 25, 2013 - This white paper presents key insights into where you should focus your virtualization efforts on in order to achieve the anticipated benefits. Also learn about the three distinctive phases your virtualization journey should consist of.


Don’t Get Stuck on Your Virtualization Journey: Where to Focus Next by  VMware, Inc.

March 14, 2013 - This whitepaper details the three phase journey of virtualization and why it is crucial that you see it through to the end.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts