E Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
E Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14

Essential ITIL: What You Need to Succeed by  CA Technologies.

August 01, 2008 - ITIL starts with a commitment to the people of IT, because it consists of a series of individual IT practitioner certifications.


Essential power management for virtualized environments by  Dell, Inc. and Intel®

November 30, 0002 - Access this exclusive source to learn how your business can optimize power management in your virtual environments to boost your data center's efficiency.


Essential Rack System Requirements for Next Generation Data Centers by  APC by Schneider Electric

February 01, 2005 - This paper presents a categorized and prioritized collection of rack system challenges and requirements as obtained through systematic user interviews.


Essential Standby Generator System Requirements for Next Generation Data Centers by  APC by Schneider Electric

January 01, 2005 - Effective standby generator system installations must address the known problems and challenges relating to current and past designs to ensure high availability. This paper overviews generator system challenges and offers tips on solving them.


Essential Strategies for Ensuring IT Data Analysis by  VMware, Inc.

December 30, 2011 - This white paper discusses various types of IT data and are examined for how close (or far) they are from being "normally" distributed.


Essential strategies for mobile application testing and development by  Neotys

March 06, 2013 - Mobile application development creates a set of challenges for developers and testers. In this E-guide, you can find out some of the key challenges and strategies associated with mobile applications. It outlines insights into mobile texts, collaboration and other processes.


Essential tips for an enterprise desktop migration to Windows 7 by  RES Software

October 18, 2011 - A desktop migration project affects all users, so IT needs to communicate with users about the migration process, inform them about when they will be affected and how their data will be moved. This expert e-guide provides tips on how to plan and execute a desktop migration to Windows 7.


Essential Wi-Fi Services for Smartphones and Tablets by  Aruba Networks

March 07, 2014 - In this white paper, discover the essential Wi-Fi services you need for smartphones and tablets, including wireless screen mirroring, wireless printing, app sign-on and more. Also, learn about a modern Wi-Fi technology that enables all these services and more, so you can support a large number of mobile devices in the enterprise.


Essential Wi-Fi Services For Smartphones And Tablets by  Aruba Networks

March 31, 2014 - This informative paper examines a dependable, high performance Wi-Fi solution that provides mobile workers the services, accessibility and freedom they need to get the most value from their mobile devices.


EssentialEnterprise Mobile Device Security Controls and Policies by  BlackBerry

August 26, 2013 - In this expert guide from SearchSecurity.com, find out what mobile security controls you need to consider when formulating an enterprise mobility strategy, so that you can reap the benefits of increased productivity and efficiency without putting your sensitive data at risk.


Essentials of Secure Network Access for Remote Workers by  Global Knowledge

December 17, 2013 - In this white paper, you will discover two options that can maintain a company's network security while also meeting the ever-changing needs of today's constantly mobile workforce and consumer base.


Establish a Strategic Advantage in Managing Change by  IBM

August 17, 2010 - Join Sue Green, Market Manager for IBM Rational Systems at this webcast as she shows you a structured approach to seizing opportunity and managing change amid the fast pace world and complexity of smarter product development.


Establishing a Culture of Measurement - A Practical Guide to BI by  Information Builders

September 01, 2003 - Learn how Information Builders' philosophy of business intelligence will help you to establish a culture of measurement and begin a powerful cycle of continued improvement within your organization.


Establishing a Culture of Measurement - A Practical Guide to Business Intelligence by  Information Builders Inc.

March 01, 2006 - BI empowers companies with the ability to offer products and services at the lowest cost and with the greatest amount of efficiency and productivity possible- while returning the highest revenues and profits. Learn how BI can help you to establish a culture of measurement and begin a powerful cycle of continued improvement within your organization.


Establishing a Formal Cyber Intelligence Capability by  Verisign, Inc.

May 03, 2012 - <p>While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.</p>


Establishing a Logical Perimeter: The Evolution of Network Security by  Palo Alto Networks

March 19, 2014 - This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.


Establishing a Low Cost Disaster Recovery Site by  Intel Corporation

May 27, 2009 - Learn about Intel IT's cost-effective disaster recovery (DR) strategy for one of its data centers in Israel that has a potential business value of more than USD 3 million. The solution was designed to avoid idle compute servers, use a tiered storage system, and offload backup from the main data center.


Establishing a Private Cloud by  Hitachi Data Systems

November 13, 2013 - This informative paper explores a converged platform that enables you to deploy a private cloud to give you control over your data and the peace of mind that it's fully protected and readily available whenever you need it. Read on now to learn more.


Establishing an Effective Application Strategy for your Mobile Enterprise by  IBM

August 12, 2011 - The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.


Establishing Trust in Remote Access Transactions by  ActivIdentity Corporation

October 05, 2010 - Most organizations are adding exposure points with growing laptop and smart phone populations seeking remote access. Static passwords are easily stolen. Strong authentication is needed. Read this white paper to find out so much more.


Estimating a Data Center's Electrical Carbon Footprint by  APC by Schneider Electric

April 01, 2010 - Data Center carbon emissions are a growing global concern. The US Environmental Protection Agency (EPA) cites data centers as a major source of energy consumption in the United States. This paper introduces a simple approach, supported by free web-based tools, for estimating the carbon footprint of a data center anywhere in the world.


esXpress™ and DXi-Series Make Quantum A One-Stop Shop for VMware ESX Data Protection – A DCIG Analyst Report by  Quantum Corporation

February 25, 2010 - As organizations begin implementing server virtualization, it is critical that they consider the fact that backup and data protection processes will need to be done differently and may become more complicated. This DCIG analyst report discusses methods of effectively protecting data in virtual environments and the different solutions available.


Ethernet and VPN in the WAN by  AT&T Corp

January 10, 2012 - Network-based IP VPN and Ethernet WAN services are two of the most popular WAN connectivity options for enterprises and medium-sized businesses. Learn if one or the other – or both – is best for your enterprise.


Ethernet Fabric Primer: Helping You Meet Modern Data Center Demands by  TechTarget

March 26, 2014 - Increasingly complex infrastructure demands and evolving changes in application delivery are revealing the fragile state of legacy data center networks. This guide provides insight into how fabrics offer one alternative for meeting the demands of the modern data center.


Ethernet SAN or Fibre Channel SAN by  Coraid

January 07, 2011 - When it comes to choosing a storage area network (SAN) infrastructure, questions about performance, ease-of-use and cost are sure to come up. This technical brief reviews key differences to consider between Ethernet SAN and Fibre Channel SAN infrastructure when choosing a storage solution for your next virtual server or cloud storage project.


EtherScope Network Assistant -- Free Hardware Trial by  Fluke Networks

February 04, 2009 - First responders to network emergencies need to solve problems fast on 10, 100 and Gig copper, fiber and wireless LAN networks. This tool helps frontline network professionals quickly solve the wide range of problems they encounter.


EtherScope Series II Network Assistant by  Fluke Networks

January 01, 2008 - EtherScope Series II Network Assistant helps first responders solve network problems on both sides of the access point - fast. This virtual demo will show you an ideal portable platform for rogue hunting and troubleshooting.


EtherScope™ Series II: Network Assistant by  Fluke Networks

September 27, 2010 - Network professionals rely on the EtherScope Network Assistant to complete their daily tasks fast. The purpose-built EtherScope speeds and simplifies network installation, validation and troubleshooting by integrating essential tests, automated diagnostics and guided troubleshooting. Read on to learn more!


Ethical Hacking and Risk Assessments by  Global Knowledge

December 10, 2008 - Attend this webcast to learn about risk assessment process and tools used by ethical hackers.


ETL 2.0: Redefining Data Integration by  Syncsort

May 10, 2012 - Watch this webcast now to gain insight on a new strategic extract, transform and load (ETL) tools that assist with vital tasks including data services to applications and business users.


EU Regulation 1169/2011 and its Influence on US Manufacturers and Retailers by  LANSA

February 14, 2014 - EU Regulation 1169/2011 is working to combat product data mismanagement in Europe, but what does this regulation mean for US manufacturers and retailers? Find out by reading on now.


Euro crisis: Key questions CEOs and CIOs should ask each other by  ComputerWeekly.com

April 02, 2012 - With a potential economic crisis looming in the Eurozone, Gartner offers a checklist of questions that CIOs and CEOs should ask each other.


Europe's Largest Regional Airline Protects Reservations System and Company Data with Veeam by  Veeam Software

December 31, 2013 - Check out this resource to find out how a leading vendor's backup solution helped Europe's largest regional airline eliminate downtime.


European cross-border e-commerce by  ComputerWeekly.com

January 17, 2012 - European consumers' growing use digital channels as part of their shopping experience is driving retailers’ focus on delivering efficient online, cross-border operations in Europe, this research report from Accenture reveals.


European healthcare customer stories: The power of information-driven healthcare by  Dell, Inc.

March 21, 2014 - This resource contains a group of case studies on hospitals across Europe who leveraged technology to help improve clinician workflow and enhance overall care.


European IT Law Briefing: Monitoring employees' use of social media by  ComputerWeekly.com

May 20, 2013 - Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy.


European IT Law Briefing: Recruitment and social media by  ComputerWeekly.com

May 20, 2013 - Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.


European IT Law Briefing: Taking action on misuse of social media by employees by  ComputerWeekly.com

May 20, 2013 - Four leading European law firms help you navigate the legal maze when taking action against employees who misuse social media in France, Germany, UK and Italy.


European IT Law Briefing:  Practical steps for companies using social media by  ComputerWeekly.com

May 20, 2013 - Leading European law firms offer practical advice for companies using social media in France, Germany, UK and Italy.


Evaluate: IBM Endpoint Manager by  IBM

March 21, 2014 - This 30-day trial offers an endpoint manager that provides a single-agent, single-console approach to lifecycle management, security, and endpoint protection.


Evaluate: IBM Mashup Center by  IBM

June 09, 2011 - IBM Mashup Center is an enterprise mashup platform enabling the rapid creation, sharing, and discovery of reusable application building blocks (widgets, feeds, mashups). Discover how these tools can use these components to easily assemble new applications or improve existing ones by downloading this free software trial.


Evaluate: IBM Rational AppScan by  IBM

June 09, 2011 - With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle.


Evaluate: IBM Rational Software Architect V8 by  IBM

June 09, 2011 - Download the latest version of IBM Rational Software Architect V8 to experience the latest in design and modeling technologies, comprehensive support for emerging technologies around SOA and Java Enterprise Edition 5, and best of breed tools that integrate with IBM's product lifecycle management solutions.


Evaluate: IBM SmartCloud Provisioning by  IBM

November 01, 2012 - Download this free trial of IBM's next-generation tool that combines infrastructure and platform capabilities to simplify virtualization and cloud infrastructure management.


Evaluate: Lotus Notes and Domino Administrator clients by  IBM

June 09, 2011 - IBM Lotus Notes and Domino Administrator clients nurture communication and real-time connections to form the backbone of a simplified, security-rich, and real-time work environment designed to foster an increase in knowledge sharing, business insight and productivity.


Evaluate: WebSphere Application Server Community Edition by  IBM

June 09, 2011 - WebSphere Application Server Community Edition is a pre-integrated, lightweight Java platform application server built on Apache Geronimo technology. Download now to experience how it harnesses the latest innovations from the open source community to deliver a readily accessible and flexible foundation for developing and deploying Java apps.


Evaluating and Contracting for Cloud Financials Best Practice Considerations by  Intacct Corporation

March 17, 2010 - Choosing a cloud computing solution can seem like a daunting task. Where do you start? What questions do you ask? What do you specifically need to look out for? This paper answers these questions and more. Continue reading to learn the best practices for choosing a cloud computing solution.


Evaluating and Enhancing Green Practices with Cisco Catalyst Switching by  Cisco Systems, Inc.

March 01, 2009 - This document describes the Green Operations and Characteristics of the Cisco® Catalyst® Series Switches. These Cisco Catalyst switch families offer the latest technologies to enable organizations to meet the green requirements of today while providing flexible architectures to address the necessities of tomorrow.


Evaluating BI in the Cloud by  Indicee

March 28, 2014 - In this expert e-guide, explore the reasons many businesses are hesitant to put BI systems in the cloud, including security and compliance concerns, and why the time to start evaluating BI in the cloud is now. Read now to discover Wayne Eckerson's top six considerations before jumping into a cloud BI project.


Evaluating blade server power consumption by  Dell and Microsoft

September 30, 2010 - Explore the results of a study in which Dell compared analyses of power efficiency for its own enterprise-class blade server platform and solutions offered by HP and IBM.


Evaluating cloud-based file transfer services by  IBM

July 01, 2011 - If you are looking for smarter ways to approach file sharing in your commerce environment, you are probably thinking about outsourcing or moving to the cloud. This evaluation from IBM, supported by research from Vanson-Bourne, can help by showing you critical factors to consider.


Evaluating colocation, cloud computing and changing data center infrastructures by  SAVVIS

April 08, 2011 - In this expert e-guide from SearchDataCenter.com, get insight into successfully implementing these strategies at your organization. Learn best practices for choosing a colocation data center. Plus find out why even the U.S. government is now exploring cloud computing.


Evaluating CRM Solutions: Six Ways ‘The Oracle Advantage' Benefits Your Organization by  Oracle Corporation

September 19, 2008 - Deciding on the right CRM solution for your organization is no easy feat. This paper summarizes the key questions every organization should ask of a vendor and the ways "The Oracle Advantage" addresses each of these areas.


Evaluating Financial Management Software ...Is it time for a change? by  Microsoft

March 01, 2008 - Financial management software that becomes disjointed can impact the success and profitability of any business. Read this paper to learn how your business can streamline processes to manage accounting, project management, payroll and human resources.


Evaluating Mainframe System Monitoring Tools by  CA Technologies.

March 08, 2013 - This e-guide introduces various mainframe system monitoring tools, providing expert advice for purchasing and implementing those tools as well as explanations for how each functions.


Evaluating Mobile Device Management Products by  TechTarget

March 18, 2014 - With new mobile devices emerging in the marketplace, MDM also needs to evolve to keep pace. But with an excess of products to choose from, deploying the best MDM software to monitor your mobile workforce can be cumbersome. This guide examines the capabilities of modern MDM products and analyzes tools that help meet workforce requirements.


Evaluating Netsuit Suitecommerce by  ComputerWeekly.com

June 05, 2012 - NetSuite recently announced SuiteCommerce, a unified platform that enables businesses to centrally manage all aspects of their e-commerce and optimize interactions regardless of device or location, Nucleus Research reports.


Evaluating Payroll Options for Your Mid-sized Business: In-house, Outsourced, or a Blend of Both? by  Sage Abra

March 03, 2008 - When deciding between payroll software, a payroll service, or a blend of both, there are many factors to take into consideration, including choosing a vendor known for experience in the payroll industry.


Evaluating The Performance Of Shared WAN Links For Data Center Backup And Disaster Recovery by  Silver Peak

September 08, 2010 - Backup and disaster recovery are perennially among the top three IT challenges, and they’re rated by 62% of enterprises as a high or critical priority. What exactly are these enterprises doing? Building multiple data centers. Read this paper to find out so much more.


Evaluating the Total Costs of a Unified Communications Solution by  Cisco

July 17, 2013 - Discover the top recommendations for selecting a UC solution that fits the needs of your business. Learn how to weigh the most important factors and assess the TCO of your UC solution.


Evaluating Thin-Client Security in a Changing Threat Landscape by  Intel

April 01, 2010 - Intel IT's security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Continue reading to learn more about our analysis and conclusions in this paper.


Evaluating video conferencing solutions by  Cisco Systems, Inc.

December 20, 2011 - Integrating video and unified communications in your enterprise is not an easy task. Access this Technical Guide to view expert advice into creating a viable and effective integration strategy that will support interworking with your existing end points, as well as those to come.


Evaluating Virtual Applications and Their Impact on Your Infrastructure by  Compuware Corporation

December 07, 2010 - Learn how virtualizing your applications can improve resource usage and reduce hardware costs for your organization. Also, find out how using virtual appliances can make software deployment easier.


Evaluating Windows Server 2008 R2 by  Microsoft

November 03, 2010 - This resource center is home for evaluation software that will provide your CIO with a better understanding of how Windows Server 2008 R2 functions.


Evaluating Wireless Intrusion Prevention by  AirTight Networks, Inc.

April 15, 2013 - This resource will help you learn more about wireless intrusion prevention systems (WIPS) and how they can help your organization stay ahead of wireless attacks. Find out how these systems work, what they can do for your security posture, and what to look for in a WIPS solution.


Evaluation Guide for SharePoint Server 2010 by  Microsoft Corporation India Pvt Ltd

December 04, 2009 - This evaluation guide is designed to help IT pros gain sufficient knowledge and understanding to evaluate Microsoft SharePoint Server 2010. This guide describes some of the most compelling improvements and new additions to the SharePoint Server 2010 platform for IT pros.


Evaluation Guide: SharePoint 2010 for the Professional Developer by  Microsoft Corporation India Pvt Ltd

December 04, 2009 - The SharePoint 2010 developer evaluation guide describes the SharePoint 2010 developer platform, including walkthroughs of some of the new capabilities for developers.


Evaluation of managed print service suppilers by  ComputerWeekly.com

January 25, 2011 - In Quocirca’s evaluation of major providers of Managed Print Services (MPS) in Europe, Quocirca found that Xerox and HP  lead the pack, due to their  global scale and broad service capabilities. The analysis also showed that Ricoh and Lexmark  have gained considerable ground, demonstrating effective maturity and service delivery excellence.


Evaluator Group: Analysis of HP D2D Product Line by  HP and Intel

November 04, 2010 - This paper details an analysis of the HP D2D Product Line, which provides both disk to disk and VTL backup. In June 2010, the product line was updated to include StoreOnce, HP Labs developed inline data deduplication, along with a number of other enhancements.


EVault for Microsoft System Center Data Protection Manager by  i365, makers of Evault

June 03, 2010 - Access this paper now to learn more about EVault® for DPM; the only cross-platform backup and recovery solution that incorporates Microsoft DPM 2010—factory installed, with EVault Software, on top-quality hardware.


EVault for Microsoft System Center Data Protection Manager by  i365, makers of Evault

June 03, 2010 - This white paper examines the backup and recovery needs of today’s enterprises.  Discover a tool that provides secure, efficient cloud connectivity and can be leveraged to protect the infrastructures in your mixed environment.


EVault Remote Disaster Recovery by  i365, makers of Evault

November 16, 2009 - EVault Remote Disaster Recovery Service (RDR) is a hosted service to help you quickly recover your key servers and data after a site disaster, and remotely access them in a secure virtual environment.


Event Data Warehousing by  Hexis Cyber Solutions Inc

February 01, 2008 - This white paper describes that data warehousing should not necessarily be the basis upon which companies retain and query historic data for prolonged periods.


Event Stream Processing and Event Driven Architectures by  Progress

October 01, 2006 - This white paper describes the motivation for EDA, introduces ESP, and describes how ESP technology fits within the ESB/SOA model.


Evergreen Films by  NetApp

January 31, 2013 - Discover how an award winning production company deployed NetApp tiered storage used as a mobile "flight case" to help process on-set dailies.


Evernote Accelerates Company Growth by Enlisting ABBYY by  ABBYY

April 13, 2010 - Read this case study to learn how Evernote came to choose ABBYY and how it turned out to be very successful for them. Continue reading to learn more about the features and benefits of ABBYY FineReader Engine.


Every Man's Guide to Combat Threats Within Your Organization by  ISC2

June 03, 2009 - This eGuide highlights how mobile computing is more than just a trend, what cybersecurity experts have to say about information warfare, and what you can do to enhance team intelligence.


Everything You Need to Know About Business Social Collaboration by  Cisco

January 16, 2014 - This expert e-guide covers the convergence of unified communications and collaboration and social software to create collaborative communications.


Everything You Need to Know About Picking a Managed Services Provider by  IBM

November 06, 2013 - This white paper breaks down the top 10 criteria you should look for when selecting a managed services provider.


Everything you need to know about successful AIDC by  SearchManufacturingERP

March 07, 2013 - This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.


Everything You Need to Know About WebSphere Cast Iron by  IBM

March 11, 2014 - This webcast covers a cloud integration solution that will help maximize your cloud and also features a demonstration of the product.


Evolution of Hosted Server Computing: The emerging ‘cloud’ alternative by  ComputerWeekly.com

January 26, 2011 - In this short paper, we look at the current state of play with regard to hosted infrastructure server offerings and activity, and consider where the market is going as we look forward.


Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective by  Intel

March 25, 2011 - As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.


Evolution to the Cloud by  Ciena

May 29, 2012 - Learn – in less than six minutes – about a cloud approach that can be labelled a “data centre without walls,” enabling a virtual capacity that is both distance-independent and dynamically scalable. View now to learn the cost- and productivity benefits this approach can offer your organisation.


Evolution Vs. Revolution: Driving B2B Efficiencies Forward with People, Processes and Technology Tools by  SEEBURGER

October 01, 2008 - B2B integration technology, offers powerful and complementary tools and services for seamless business integration and meeting the challenges of global collaboration.


Evolution? Game Changer? Definitely. by  EMC Corporation

March 11, 2014 - This resource delves into the facts and ideas surrounding Big Data. It gives insight from industry professionals as to how Big Data can be implemented to service customers and become a game-changer.


Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud by  Webroot

October 18, 2013 - In this expert e-guide, you will gain insight into an endpoint security strategy that looks beyond antivirus and the key functions that are missing in many cloud-based endpoint security services. Read the e-guide and discover how to evolve your endpoint strategy.


Evolve Your Sitemider Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration by  Radiant Logic, Inc.

March 14, 2011 - Check out this blueprint for extending your existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents—in less time, with less hassle, and for less money.


Evolve: What you need to know about mobilizing manufacturing by  SearchManufacturingERP

January 30, 2013 - Mobile apps have everyone from the C-suite on down demanding real-time access to data and apps on any device. Manufacturers in particular are opening their eyes to the benefits mobile ERP apps have to offer. This guide outlines common mobile ERP deployment mistakes to avoid, strategies for selecting/using manufacturing mobile apps, and more.


Evolving and implementing new storage strategies that support virtualization by  Hewlett-Packard Limited

November 17, 2010 - The data center is rapidly evolving. As a result, most data protection and disaster recovery (DR) plans were developed for an IT environment that bears little resemblance to today's dynamic, highly distributed and increasingly virtualized data centers. Download this guide to learn 4 tips on how to better serve your storage needs.


Evolving APM: Big Data Approach, Integrated End-user Experience Monitoring Bring Deep End-to-end Application visibility by  Riverbed Technology, Inc.

January 24, 2014 - This whitepaper examines a solution that leverages existing big data capabilities, integrates end-user experience monitoring and uses integrated development environment tools to maintain deep end-to-end application visibility.


Evolving Data Center Architectures: HP Technology for Cloud Ready IT by  HP & Intel®

August 02, 2013 - This white paper takes an in-depth look at the requirements for successful cloud computing and crucial steps for moving beyond server virtualization to the cloud. In addition, learn about the features and benefits of next-gen storage options for your cloud landscape.


Evolving IT security threats: Inside Web-based, social engineering attacks by  Websense, Inc.

September 02, 2011 - In order to adequately defend IT infrastructure, organizations must have a solid understanding of the various attack methods that are effective today. This expert e-guide takes an in-depth look into the latest IT security threats and provides strategic recommendations on how to deal with them.


Evolving Security: 5 Reasons to Outsource Network Security Management in Today's Threat Environment by  XO Communications

April 30, 2012 - Discover five reasons why outsourcing your network security management can help you combat malware, hackers, and the evolving threat landscape.


Evolving SRM to Meet Enterprise; IT's Long-term Challenges by  IBM

October 31, 2012 - In this white paper, you will gain insight on how storage resource management (SRM) application has been evolving over the years to address the challenges expressed by IBMs storage productivity center administrators who are tasked with managing growth, complexity, and storage environments in the most cost effective way possible.


Evolving the SAP landscape with Business Intelligence improvements and the SAP Business Objects Platform by  CIBER, Inc.

October 06, 2013 - Read this case study today and discover how Megger was able to successfully implement a new SAP landscape with the help of an SAP implementation partner, focusing on the standardization and integration of five key elements: ERP (central), Business Warehouse, CMS, CRM and Web.


Evolving Threats Demand New Approaches To Security by  Akamai Technologies

November 28, 2012 - Consult this white paper for a profile of the evolving cast behind today's advanced threats and find out the key steps you can take to ensure enterprise security – click through to read on.


Evolving to Advanced Integration Technology: A business case for the transition from eGate to InterSystems Ensemble by  InterSystems Corporation

August 12, 2011 - Healthcare IT management faces many challenges, such as the ability to optimize workflow and conduct health information exchange. Learn how 6 leading hospitals Leveraged InterSystems Ensemble to automate business processes, develop composite applications and executive dashboards, while reducing the time-to-solution and costs.


EX Series Ethernet Switches by  Juniper Networks, Inc.

November 15, 2011 - High-performance businesses demand a high-performance network infrastructure that provides fast, secure and reliable delivery of the applications that drive the business. Switches deployed in regional offices, campuses and data centers enable these business processes by connecting users.


EXA Corporation Creates a Secure and Resilient Private Cloud by  IBM

June 30, 2012 - In this case study, see how one organization implemented a cloud solution that provides automation, security, and management tools to ensure their data on their hybrid cloud remained protected across multiple servers.


Exadata Hybrid Columnar Compression by  Oracle Corporation

December 07, 2009 - Exadata Hybrid Columnar Compression enables the highest levels of data compression and provides enterprises with tremendous cost-savings and performance improvements due to reduced I/O. Read this white paper to learn more.


Exadata is Still Oracle by  Teradata

April 11, 2011 - Sequels are usually never better.  How did Oracle try tackling their underlying performance and scalability problems with the release of their third-generation Exadata solution?  Read our white paper and discover how Oracle’s Exadata delivers far less improvement in data warehouse performance.


Exadata Smart Flash Cache and the Sun Oracle Database Machine by  Oracle Corporation

October 30, 2009 - Exadata Smart Flash Cache is the fundamental technology of the Sun Oracle Database Machine Full Rack that enables the processing of up to 1 million random I/O operations per second (IOPS), and the scanning of data within Exadata storage at up to 50 GB/second. Read this paper for more.


ExaGrid Appliance Product Line Configurations by  ExaGrid Systems, Inc.

February 07, 2012 - ExaGrid’s disk-based backup with deduplication product line provides the only architecture in the market with a post process whereby you’re able to keep a full backup. Check out this resource to learn how.


ExaGrid Cost-Effective Disk-based Backup by  ExaGrid Systems, Inc.

March 09, 2010 - ExaGrid is a cost-effective and scalable disk-based backup solution that works with your existing backup application. ExaGrid combines high quality SATA drives, compression and data deduplication for fast and reliable backups and restores. Read this data sheet for more.


ExaGrid Gets High Marks in Independent ESG Lab Evaluation by  ExaGrid Systems, Inc.

February 01, 2012 - ESG Lab believes that organizations struggling with the cost, complexity, and risk associated with tape backups would be wise to consider the bottom line savings that can be achieved with ExaGrid. Check out this lab validation report to learn more.


ExaGrid Helps U.S. Federal Government Agencies Reduce Backup Windows, Improve Data Protection by  ExaGrid Systems, Inc.

February 07, 2012 - Check out this study to learn how ExaGrid solutions enabled several U.S. government agencies to reduce backup windows and improve overall data protection practices. This resource provides an introduction to the specific solutions used as well as their benefits, and explores emerging deduplication and scalability concerns as well.


Exagrid Product Overview: High Performance, Scalable Disk Backup with Data Deduplication by  ExaGrid Systems, Inc.

September 10, 2013 - This informative data sheet outlines a disk-based backup and data deduplication appliance that's purpose-built for backup that leverages a unique architecture optimized for backup and restore performance, scalability and cost.


ExaGrid Scores Again by  ExaGrid Systems, Inc.

July 27, 2011 - "ExaGrid has been consistently adding customers to their rolls–just take a look at their website and read through the hundreds of published success stories and case studies...I think they have found the right formula and target for their solutions and are competing very well against even the biggest players in the competitive landscape."


ExaGrid Systems Awarded Best-in-Class Rating in DCIG 2011 Midrange Deduplication Appliance Buyer’s Guide by  ExaGrid Systems, Inc.

February 07, 2012 - The 2011 Midrange Deduplication Appliance Buyer’s Guide rated the ExaGrid EX13000E “Best-in-Class” out of 37 different deduplication solutions for its functionality and capability. All ExaGrid appliances rated as “Recommended” scoring a 9.8 in technical support. ExaGrid rated as “Excellent” for hardware across all products. Read on to learn more.


ExaGrid Systems Named Champion in Disk Backup Vendor Landscape by Info-Tech Research Group by  ExaGrid Systems, Inc.

February 07, 2012 - As a Disk Backup Champion, ExaGrid received the highest rating from Info-Tech Research Group for its exceptional product architecture and overall vendor score highlighting the company’s ‘exemplary’ strategy and strong viability, reach and channel. Read on to learn more.


Exagrid® Product Line by  ExaGrid Systems, Inc.

March 15, 2010 - ExaGrid offers a highly scalable disk-based backup system that works with your existing backup application and combines high quality SATA storage, compression and byte-level data de-duplication with a virtualized GRID architecture. Read this data sheet for me.


ExaGrid: A Scalable Approach to Disk-based Backup by  ExaGrid Systems, Inc.

October 20, 2008 - Looking for a new disk-based backup solution? Download this Taneja Group white paper to learn some key criteria to consider when evaluating disk-based data protection vendors and how one company matches up against these criteria.


ExaGrid: Cost-Effective Disk-Based Backup by  ExaGrid Systems, Inc.

April 19, 2011 - The ExaGrid system is a plug-and-play disk backup appliance that works with existing backup applications. ExaGrid’s patented zone-level deduplication technology minimizes the amount of data to be stored by storing only the unique bytes across backups instead of storing the redundant data. Read on to learn more today!


ExaGrid: Simply State-of-the-Art D2D by  ExaGrid Systems, Inc.

August 01, 2008 - Disk-based backup took the market by storm several years ago with a compelling proposition: replace tape with high-speed disk to speed up and simplify backup.


Exalogic & Exadata: The Optimal Platform for ATG by  Oracle Corporation

January 06, 2012 - Download this white paper to learn about the market-leading e-Commerce solution and how improved performance can lead to increased conversion rates and higher revenue.


Examining business resiliency management best practices: How to prepare today for future trends in business by  IBM

June 17, 2010 - Today, organizations that aren’t able to respond to IT disruptions or rapid market changes can find themselves left behind. Read this paper and learn how  to effectively manage people, process, and technology within a business resilience strategy.


Examining Control System Security and Compliance by  ArcSight, an HP Company

November 30, 2010 - This paper will provide an overview of cyber threats and regulations within critical infrastructure specific to control system environments. The paper will then present a general overview of control system architecture and identify common vulnerabilities within these environments.


Examining IBM Innovation at Both Ends of the Storage Spectrum- Part 1: Tape by  The 451 Group

October 08, 2012 - Find proof that tape isn't dead by checking out this research conducted by The 451 Group, a leading global analyst and data company. This October, 2012 white paper contains the findings of The 451 Group's recent visit to IBM's research facility in Zurich and presents 451 Research's opinion of IBM's innovations and activities in the tape space.


Examining SSL-encrypted Communications by  Netronome Systems

October 16, 2007 - SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.


Examining today's data protection solutions by  SearchDataBackup.com

April 16, 2014 - Data backups have evolved dramatically from the days of producing a nightly backup to tape. Modern data protection techniques start with backup targets such as tape libraries and virtual tape libraries to deduplicating disk arrays, integrated backup appliances and the cloud.


example by  TechTarget

December 13, 2011 - fjasj


Exception Management and Resolution in SOA-enabled Business Processes by  Vitria Technology, Inc.

March 01, 2008 - The heart of SOA is the loose coupling of services: this brings about the major benefits of SOA, including flexibility, agility and reuse.


Exceptional Customer Experience: The New Supply Chain Management Focus by  IBM

August 13, 2013 - Take a look at this white paper to assess your own customer experience delivery capabilities using a Supply Chain Maturity Model. Follow a three-stage roadmap to transform your supply chain into one that enables the delivery of exceptional customer experiences in an operationally efficient and cost effective manner.


Exceptional Experiences: The key to customer engagement by  IBM

December 14, 2010 - Frustrated customers, lower satisfaction, declining loyalty and plummeting sales are potential consequences of a poor online experience. Looking ahead, both analysts and industry leaders agree that an exceptional experience will be the key to dazzling, acquiring and retaining customers.


Excerpts from Virus Bulletin Comparative Reviews August-December 2010 by  ESET

March 16, 2011 - The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files.


Exchange 2007 SAN performance test: Comparing performance between Dell EqualLogic PS Series SAN and HP StorageWorks 4400 Enterprise Virtual Array by  Dell, Inc.

April 30, 2007 - Dell, Inc. commissioned Principle Technologies to compare the performance on a heavy Exchange 2007 workload of two mid-range Storage Area Network (SAN) solutions. Tested and compared were the Dell PowerVault MD3000i iSCSI SAN Array and HP StorageWorks 2000i Modular Smart Array. Read this paper for a detailed analysis of the results.


Exchange 2007: In-house vs. Hosted - 5 Myths Debunked by  Intermedia

December 16, 2008 - In this Webinar, we explore the details of an Exchange 2007 migration and some of its most common ecosystem components, and how that deployment differs between an on-premise and a hosted solution.


Exchange 2010 Data Protection and Disaster Recovery with Auto-Snapshot Manager by  Dell, Inc.

May 09, 2011 - With the Auto-Snapshot Manager/Microsoft Edition (ASM/ME) from Dell, significant improvements to the storage efficiency of Exchange will be made by reducing the amount of storage actually used in a SAN deployment.


Exchange 2010 migration: Legacy HP ProLiant DL385 to Dell PowerEdge R510 by  Dell, Inc. and Intel®

November 01, 2009 - This Principled Technologies report commissioned by Dell Inc. compares the benefits of migrating legacy Microsoft® Exchange 2003 infrastructure to Microsoft Exchange 2010.


Exchange 2010 Offers Compelling Reasons to Upgrade by  Sherpa Software

January 28, 2011 - This white paper discusses some of the new features revolving around archiving, retention and eDiscovery, as well as answers to several related questions.


Exchange 2010 on Dell: Two Architecture Models for Improving User Productivity on a More Cost-Efficient Infrastructure by  Dell, Inc. and Intel®

December 29, 2009 - Dell's approach to Exchange 2010 offers many potential benefits for organizations running enterprise class messaging systems. Microsoft introduced new features in Exchange 2010 that can enhance productivity as well as take advantage of Dell's innovative hardware portfolio to provide a more cost-effective infrastructure for enterprise messaging.


Exchange 2010 Roadmap Series: Backup and Recovery by  Dell, Inc. and Intel®

December 09, 2009 - In this expert mediacast, featuring Exchange pro, Lee Benjamin, learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls.


Exchange Deployment Planning Services by  Dimension Data.

September 01, 2009 - Dimension Data's Exchange Deployment Planning Services (EDPS) are designed to help guide your organisation through the initial deployment planning stages of a Microsoft Exchange implementation. Read this paper to learn more.


Exchange Insider E-Zine - Volume 2: Best and Worst Practices for Email Archiving by  SearchExchange.com

July 14, 2009 - Meeting regulatory requirements means that administrators must carve out a sound email-archiving policy; making the wrong move can be costly. In this issue, you'll learn what to do and what not to do when planning your email-archiving strategy.


Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email? by  SearchExchange.com

July 20, 2011 - With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.


Exchange Insider E-zine - Volume 3: Real-world Exchange 2007 Server Migrations by  SearchExchange.com

October 13, 2009 - In this issue of Exchange Insider e-zine, get an in-depth look at some real-world Exchange 2007 migration projects, what can go wrong and how to make the most of Exchange 2007's capabilities. This issue also highlights some must-have tools for securing mobile environments in Exchange as well as tips on keeping your servers running in peak condition


Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution by  Google

October 27, 2010 - Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.


Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010 by  Google

October 27, 2010 - Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.


Exchange Insider E-Zine - Volume 6: Evaluating Exchange Server in the Cloud by  SearchExchange.com

July 23, 2010 - Volume 6 of the Exchange Insider e-zine looks at the economics of running Exchange Server on-premise versus hosting it in the cloud.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts