E Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
E Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15

Enable secure remote access to 3D data without sacrificing visual performance by  Citrix Systems, Inc.

October 14, 2013 - Design and manufacturing companies need to enable global collaboration while maintaining security and control. Read this white paper to learn how centralized 3D apps and data help them accelerate time-to-market.


Enable the Mobile Workforce by  SearchCIO.com

March 12, 2014 - In this SearchCIO handbook, expert contributor Harvey Koeppel explains that workforce mobility has existed since the word "peddler" was coined, but CIOs must embrace new strategies in order to aim these devices at business needs.


Enable Virtualization With Data Center Fabrics by  Avaya

November 08, 2011 - Discover why networking vendors are responding to virtualization by introducing data center fabrics and how they are replacing outdated networking architecture.


Enable Your Workforce with True Anytime, Anywhere Connectivity by  Dell, Inc. and Intel®

December 01, 2008 - In August 2008, Qualcomm commissioned Forrester Consulting to evaluate the benefits that North American businesses have experienced as a result of providing notebook users with mobile broadband connectivity. In this paper you'll hear what IT and telecom/network decision-makers had to say.


Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment by  Dell, Inc.

November 30, 2012 - Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.


Enabling a safer internet: The positive approach to web security by  Sophos, Inc.

April 08, 2009 - This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.


Enabling Advanced Analytics by Bloor Research by  Sybase, an SAP company

March 25, 2011 - There is a great deal of discussion right now about advanced analytics, predictive analytics and in-database analytics. What are these? Read this white paper to find out!


Enabling Agile and Intelligent Businesses by  Oracle Corporation

June 30, 2009 - Oracle SOA Suite 11g is a significant step forward toward empowering enterprises across the chasm to the next generation business applications that is powered by a platform delivering rapid composition, comprehensive lifecycle management, customizability, and easy upgrades.


Enabling and Protecting the Open Enterprise by  CA Technologies.

December 31, 2013 - View this informative resource for an overview of the challenges of securing the open enterprise, and learn the steps you can take to enable your business for growth, while protecting it from risk and attack.


Enabling Applications from Oracle to DB2 the Easy Way by  IBM

December 18, 2010 - New compatibility features in IBM DB2 make the move from Oracle to DB2 easier than ever before. Hear from customers and IBM experts about their porting  experiences.


Enabling business agility through real-time process visibility by  IBM

April 12, 2012 - Read this brief paper to learn about a platform that offers end-to-end visibility while transactions are in process. Learn how a customizable, operational dashboard enables real-time visibility into the overall state of operations and transactions across disparate systems and applications.


Enabling Carrier-class Communications with EX Switches by  Juniper Networks, Inc.

October 21, 2008 - This white paper explains why a high-performance, highly available and secure network is essential for supporting a wide array of traffic types and a diverse user community.


Enabling Compliance with the PCI Data Security Standards by  Vormetric

January 01, 2007 - Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.


Enabling Continuous Compliance Across the Enterprise by  IBM

June 30, 2011 - Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.


Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by  RSA, The Security Division of EMC

March 27, 2012 - This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.


Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by  RSA, The Security Division of EMC

December 02, 2010 - As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands.


Enabling Developer Access to Production Data by  Voltage Security, Inc.

December 15, 2008 - With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.


Enabling Device Independent Mobility with Dynamic Virtual Clients by  Intel

September 13, 2011 - To enable device-independent mobility (DIM) at Intel, Intel IT is considering implementing dynamic virtual client (DVC) technology, which uses containerized software appliances to abstract the OS; applications; corporate data and workspaces. In this model, users can access their applications and information from any device, anywhere, anytime.


Enabling End-To-End IT Management with Microsoft System Center and Quest Software by  Dell Software

March 15, 2008 - In this white paper, Enterprise Management Associates discuss how Quest can expand the power of Microsoft System Center for true end-to-end IT management.


Enabling Enterprise 2.0 by  Websense, Inc.

August 01, 2009 - Read this whitepaper to learn ways that organizations can create a strategy that embraces Web 2.0 technologies securely and enables a successful transition to Enterprise 2.0.


Enabling Enterprise Business Process Management by  Telelogic, An IBM Company

October 21, 2008 - Read this paper to learn how enterprise process modeling; analysis, architecture and implementation are at the core of business process management and optimization.


Enabling Enterprise Mobility: Transform the Mobile Computing Environment by  Hewlett-Packard Company

September 30, 2011 - Read this paper to uncover best practices for a three-step mobile management strategy that looks at: foundational enterprise-wide policies around security, privacy, and end-user computing; the collaboration infrastructure that  needs to be established; and the required end-to-end architectural decisions, application, and infrastructure models.


Enabling Enterprise Network for Cloud Computing by  Avaya

June 14, 2011 - The data center of the future can't be built upon the technology of the past. Learn from Gartner how a virtual network architecture from Avaya can reduce costs, and complexity, enabling an agile enterprise.


Enabling Enterprise Tape Library Support for Microsoft DPM 2007 Using FalconStor VTL by  FalconStor Software

February 10, 2009 - Microsoft System Center Data Protection Manager 2007 is designed to provide continuous data protection for Windows-based servers, with additional features for business-specific Microsoft workloads such as SQL Server and SharePoint.


Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming by  VMware, Inc.

January 11, 2012 - Learn how to maximize electronic medical records (EMR) user adoption by providing fast, convenient, secure access to EMR data across multiple clients, where and when the clinician requests it.


Enabling Growth for Midsize Companies by  SAP America, Inc.

September 17, 2008 - Gain insight into strategies to grow your business and learn what role IT plays in enabling your goals.


Enabling High Performance for Apple iPads in the Enterprise by  Aruba Networks

September 20, 2011 - Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.


Enabling High-Performance for Apple iPads in the Enterprise by  Aruba Networks

November 05, 2010 - Learn about the specific challenges of deploying iPads in the enterprise, how to configure an iPad for a wireless land area network (WLAN), and a specific WLAN solution that offers scalable performance in a high density network -- ideal for the mobile workplace.


Enabling High-Performance Video Encoding, Decoding, and Preprocessing by  Intel

August 03, 2009 - The version 1.0 release of the Intel® Media Software Development Kit (SDK) equips developers with a standard application programming interface (API) for creating video solutions that target consumer and professional uses. Read this article to learn more about this product as well as the benefits for developers.


Enabling infrastructure convergence without compromise with Dell Active Infrastructure by  Dell, Inc. and Intel®

October 18, 2012 - This video presents the key capabilities and features of Dell's Active Infrastructure portfolio.


Enabling Innovation and Surpassing the Competition with Visual Collaboration by  Vidyo, Inc.

May 28, 2014 - This exclusive paper discusses how visual collaboration can be utilized by small to midsized businesses in order to significantly improve productivity and drive innovation. Read on to find out more.


Enabling Manageability with Intel Active Management Technology by  Intel Corporation

November 21, 2008 - Learn how Intel IT is implementing Intel Active Management Technology across the enterprise.


Enabling NAS Clusters: The Silicon Storage Appliance by  DataDirect Networks

August 01, 2008 - Managing a high volume of servers is difficult and time consuming. Imagine scaling as fast as you need without expensive re-architecting. Discover a next-level solution that enables large-scale shared data clusters via an integrated SAN and...


Enabling Network Monitoring at 40Gbps and 100Gbps by  Gigamon

December 31, 2012 - This guide explores the evolution of network monitoring, its importance to your data center and how you can raise your monitoring speeds from 40Gbps to 100Gbps.


Enabling Next-Generation Mobile Broadband Services by  LSI Corporation

November 01, 2008 - This white paper explains the broadband services that mobile carriers are beginning to add to their product lineup fall into six different categories.


Enabling On-demand Content through Interactive Content Management by  EMC Corporation

May 01, 2008 - With end-users creating more rich content in the enterprise and the increased demand for interactivity, interactive content management is fast becoming a "must-have" for organizations big and small.


Enabling Organic Growth by  SAP America, Inc.

September 17, 2008 - Discover why organic growth is the means to achieving continuous, profitable growth, and find out how your company can address some of the most common challenges in the quest to achieve it.


Enabling Profitable Growth through Procurement: Transforming the Sourcing and Procurement Organization by  SAP AG

January 23, 2009 - Sourcing and procurement organizations have great potential to reduce costs, contribute to the bottom line, and deliver against enterprise strategic goals.


Enabling rapid and effective IT recovery by  ComputerWeekly.com

October 01, 2011 - This report from analyst, Freeform Dynamics, offers 7 key enablers of effective IT disaster recovery for IT department's in small and medium companies.


Enabling Safe and Secure BYOD in the Enterprise by  Dell Software

August 02, 2013 - This exclusive paper discusses a fully integrated solution for managing supported desktops, laptops servers, and mobile devices, making secure BYOD an achievable reality for your organization.


Enabling Self-Service and User Autonomy to Increase Business Agility by  Red Hat

December 02, 2013 - This whitepaper covers how creating a private cloud can help empower end users by giving them some degree of autonomy from IT.


Enabling Sustainable Compliance Management by  IBM

December 19, 2008 - Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.


Enabling the Enterprise Data Center with Next Generation, Dynamic Event Based Automation by  CA Technologies.

March 29, 2007 - Check out this podcast to hear more about the role workload and event-based automation should be playing in your data center management strategy.


Enabling the Future of Data Center Infrastructure Management by  IBM

November 07, 2012 - Explore this exclusive resource to find out how IBM PureFlex System and Flex System Manager are built specifically to help you tackle the recent explosion of data.


Enabling the Journey to-IT-as-a-Service by  Citrix

September 19, 2013 - This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.


Enabling the Pervasive Wireless Campus for K-12 Schools by  Brocade

December 13, 2011 - Brocade Mobility enterprise Wireless LAN (WLAN) solutions, featuring support for 802.11n-based wireless networking, can help K-12 districts efficiently contain costs and lay the foundation for future growth.


Enabling the Profitable Evolution of Mobile Transport to All-IP by  Alcatel-Lucent

June 09, 2009 - As demand for mobile multimedia services increase and average revenue per user declines, mobile service providers must transform their networks to profitably support legacy voice and advanced packet-based services. This paper outlines the challenges associated with transforming the mobile transport network.


Enabling the Profitable Evolution of Mobile Transport to All-IP by  Alcatel-Lucent

March 03, 2009 - The mobile transport network is one of the key considerations for mobile service providers planning a network transformation. This paper outlines the challenges associated with transforming the mobile transport network and presents the Alcatel-Lucent approach to effective transformation.


Enabling the Virtual Data Center: Simple, Affordable Virtualized ISCSI Storage for Microsoft Windows Server 2008 Hyper-V Environments by  Dell and Microsoft

November 03, 2008 - In this solution brief learn how the Dell EqualLogic™ PS Series can provide a fully virtualized storage infrastructure that delivers high availability, resiliency, flexibility, and scalability that is simple and cost-effective to deploy, manage and grow.


Enabling VDI by  Dell, Inc. and Intel®

June 14, 2013 - Companies look to virtual desktop infrastructures (VDIs) to consolidate desktop management and increase efficiency - however, some are turned off by scalability and cost concerns. Watch this video to learn about a storage area network (SAN) that enables your organization to deploy VDI at scale while reducing complexity.


Enabling VDI Success: Dell EqualLogic unified storage with Vmware View by  Dell, Inc. and Intel®

June 07, 2013 - This white paper presents a solution to the storage complexities of deploying VDI technologies.


EnCase® Cybersecurity by  Guidance Software, Inc.

February 23, 2010 - In this presentation, you’ll learn how EnCase® Cybersecurity helps safeguard your business by providing enterprise wide visibility and endpoint data.


Encouraging Greater SharePoint Adoption by  AvePoint, Inc.

February 21, 2011 - This paper discusses the progression of SharePoint usage, features available to encourage SharePoint adoption, focusing on the technology components required, scalability of the platform to accommodate growth, migration strategies, and how AvePoint’s DocAve Software Platform help ensure a scalable, reliable platform for bolstered adoption.


Encouraging SharePoint Collaboration by  AvePoint, Inc.

February 21, 2011 - This paper discusses how Microsoft SharePoint is the platform of choice for organizations to store enterprise-wide content. New features in SharePoint Server 2010 take the platform to the next level by improving the platform’s scalability and usability to further enhance collaboration among knowledge workers.


Encrypting Private Data 101 by  Iron Mountain

May 11, 2011 - Data protection is critical insurance against loss of data that could cripple a business. Creating a successful disaster recovery and data protection plan requires people, process and technology in the right recipe to be successful. It is not easy work, but it is essential work.


Encryption Buyer's Guide by  Sophos, Inc.

April 18, 2014 - This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.


Encryption in the cloud by  ComputerWeekly.com

April 10, 2014 - This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud.


Encryption Key Management: A Technical White Paper by  Quantum Corporation

October 01, 2007 - Securing data from unauthorized access is a critical issue for businesses in all industries. Regulatory compliance and customer loyalty all depend on keeping sensitive information safe and secure. Businesses must take steps to improve data confidentiality and integrity.


Encryption Key Management: A Technical White Paper by  Quantum Corporation

October 01, 2007 - Securing data from unauthorized access is a critical issue for businesses in all industries. Regulatory compliance and customer loyalty all depend on keeping sensitive information safe and secure. Businesses must take steps to improve data confidentiality and integrity.


Encryption Strategies: Decoded by  Iron Mountain

February 29, 2012 - Find out exactly how and why in this white paper. Discover best practices for determining what data is most important and should be encrypted, learn exactly how encryption works and receive a checklist of three critical aspects of any encryption plan. Read on to learn more.


End User Performance - Building and Maintaining ROI by  SAP America, Inc.

January 01, 2006 - In this white paper, explore how organizations are achieving strong returns on investment on their information technologie endeavors and investments by emphasizing user performance.


End-to-End Choices in Tiered Storage Solutions by  Oracle Corporation

October 01, 2010 - Oracle's tiered storage strategy lets you effectively manage and store data across multiple types of storage media while reducing your total cost of ownership up to 54 percent. Oracle is the only technology leader to provide a scalable, end-to-end storage solution that aligns data value with the right combination of cost, performance, and capacity.


End-to-End Choices in Tiered Storage Solutions by  Oracle Corporation UK Ltd

December 31, 2011 - This white paper analyzes an innovative tiered storage technology that provides end-to-end choices while allowing you to manage and store data across multiple types of storage media while reducing your total cost of ownership.


End-to-End Enterprise Compliance, Provisioning and Role Enforcement: With Sun Java™ System Identity Manager and SAP GRC Access Control by  Sun Microsystems, Inc.

July 01, 2008 - This white paper describes how a complete end-to-end IAM solution can be configured after exploiting the benefits of the integrated product stack.


End-to-End Mobile Device Management by  Zenprise

March 08, 2012 - Watch this brief video to learn how you can say yes to consumerization, letting your employees bring their beloved devices to the workplace, while also maintaining the vital security you need.


End-to-End Network Application Performance Monitoring by  Cisco Systems, Inc.

July 03, 2012 - This E-Guide from SearchNetworking.com explores how to manage and use multiple tools for network application performance monitoring.


End-to-End Network Application Performance Monitoring by  Ixia

December 14, 2012 - This quick E-Guide from SearchNetworking.com explores why multiple tools are necessary for true end-to-end monitoring and offers tips that will help you deal with multiple tools.


End-to-End Secure Client to Cloud Access by  Intel

March 01, 2011 - In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.


End-to-End Secure Client to Cloud Access Presentation Transcript by  Intel

May 06, 2011 - In this presentation transcript, gain helpful insight on the information security issues surrounding cloud computing, including: data confidentiality, identity and access management and more. Learn how you can protect your critical data in the cloud.


End-to-End Service Management in the Virtualized Environment: Delivering on the Promises of Virtualization by  Hewlett-Packard Company

October 30, 2008 - This paper proposes an approach for IT to manage virtualized environments and shows how HP Business Service Management software enables IT operations to link specialists and specialized tools into day-to-day operations while keeping promises to business users.


End-to-end Solutions to Enable Log Management Best Practices by  RSA, The Security Division of EMC

February 15, 2008 - This third paper in the series, describes end-to-end solutions that combine security information and event management (SIEM) and tiered storage technologies based on the RSA enVision platform and EMC networked storage solutions.


End-to-end Visibility for IBM Cloud Infrastructures by  IBM

July 01, 2013 - This whitepaper takes a look at ways that mainframes can provide reliability and high-performance support for a private cloud, and how the right management tools can help companies benefit fully from a cloud environment.


End-user Experience Monitoring by  Nimsoft, Inc.

February 13, 2012 - What exactly is End-user Monitoring (EUM) and why should businesses care? In this resource, discover why it's increasingly important to assess system performance from the end-user perspective in the age of IT as a service, and how you can effectively measure and quantify end-user experiences.


End-User Monitoring: Gaining Visibility into Hidden Business Risks by  CA Technologies.

August 01, 2008 - This white paper explores how to implement effective end-user transaction monitoring and management to attain greater visibility into the user experience.


End-User Service Assurance: The New IT Mandate by  ASG Software Solutions

May 07, 2010 - This report examines the challenges of and strategies for reconciling network management and operations with broader service management initiatives. Access the resource now to learn more.


Endpoint Management - IT handbook by  SearchDataCenter.com

September 13, 2012 - Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider.


Endpoint Protection Best Practices Manual: Combating issues, problems by  SearchSecurity.com

November 20, 2012 - Consult this expert E-Guide for an overview of the evolved threats that are putting your endpoints at risk. Discover the must-see strategies for ensuring endpoint defense by clicking through to read more today.


Endpoint Protection Cheat Sheet by  Webroot

August 28, 2012 - Consult this cheat sheet to discover a revolutionary approach to cloud security. Find out more about some of the key advantages and fast facts regarding, deployment and performance, threat detection and remediation and more.


Endpoint Protection Performance Benchmarks by  GFI Software

November 21, 2011 - View this endpoint protection performance benchmark report to explore the impact of GFI Software on system performance for its end users based on a set of objective metrics including: installation time, boot time, average CPU usage, memory usage and more.


Endpoint Protection Platforms for Enterprises by  Symantec Corporation

January 08, 2014 - This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.


Endpoint Protection Small Business Edition by  Symantec Corporation

September 05, 2012 - Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.


Endpoint Protection Solutions: Why the Traditional Model is Broken by  Webroot

November 10, 2011 - Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”


Endpoint Security and Control by  Sophos, Inc.

October 02, 2008 - Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.


Endpoint Security Best Practices by  Symantec Corporation

November 26, 2013 - In this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.


Endpoint Security IT Decision Center Handbook 1 by  SearchSecurity.com

November 22, 2013 - Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.


Endpoint Security IT Decision Center Handbook 2 by  SearchSecurity.com

November 25, 2013 - Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.


Endpoint Security IT Decision Center Handbook 3 by  SearchSecurity.com

November 26, 2013 - Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.


Endpoint Security Suites Take Center Stage in the Enterprise by  Symantec Corporation

January 04, 2013 - This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.


Endpoint Security Technology by  Symantec Corporation

November 04, 2013 - Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.


Endpoint Security Technology by  TechTarget

March 18, 2014 - With the increasing number of client devices-endpoints, IT is challenged with managing this sheer volume of endpoints as your organization is left with multiple vulnerabilities. This expert guide details how endpoint protection software can help block malicious network traffic while providing secure access to your sensitive business data.


Endpoint Security Value Calculator by  Lumension

August 12, 2009 - This flexible, easy to use tool enables you to rapidly evaluate a wide range of scenarios and gather compelling proof of the dramatic impact that Lumension Security’s effective application and device whitelisting can have on your bottom line.


Endpoint Security, Endpoint Management: The Cost-Cutter's Case for Convergence by  Lumension

March 18, 2009 - This analyst report is for any organization that relies on end-user computing platforms (personal computers, workstations, laptops, notebooks) - and their associated applications, data, and network connectivity - to carry out strategic business objectives. It describes how the companies with top results keep these endpoints "clean and ready."


Endpoint Security: Anti-Virus Alone is Not Enough by  Lumension

December 31, 2012 - Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.


Endpoint Security: Defining the Total Cost of Ownership by  Sophos, Inc.

March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.


Endpoint Security: Visible Coverage in a Single, Scalable Platform by  Trend Micro, Inc.

January 06, 2009 - Read this brief data sheet to learn how Trend Micro's Endpoint Security Platform delivers pervasive visibility and control, speeds time to protection, and increases management efficiency.


Endpoint Threat Management: The Benefits of Cloud-Based Security Services by  Trend Micro, Inc.

January 12, 2009 - Read this short paper to learn how your organization can use a hybrid approach to acquire an endpoint security solution that consumes less CPU time, memory, disk, and network bandwidth.


Endress + Hauser Success Story by  SUSE

June 19, 2012 - This white paper outlines how one organization successfully migrated to Linux and consolidated 14 physical servers to a single IBM System z mainframe. Inside, discover how your business can consolidate physical servers and realize other valuable benefits like rapid provisioning and easy management of virtualized Linux environments.


Endress+Hauser maximises availability and resiliency with Linux on System z by  IBM

August 08, 2012 - This case study explains how one company successfully navigated the disaster recovery planning process. Discover why they decided to implement Linux on System z and how virtualisation allowed them to cost-effectively scale their IT environment.


Endress+Hauser maximizes availability and resiliency with Linux on System z by  IBM

June 01, 2011 - Because downtime can have serious implications, it is critical that companies have an effective disaster recovery (DR) strategy in place. This case study compares several DR architectures and discusses how one organisation successfully navigated the selection process.


Energizing your return on data investment - SOA as architecture for integration and infrastructure (Presentation Transcript) by  MuleSoft

November 15, 2012 - Read this transcript of internationally recognized service-oriented architecture (SOA) expert and thought leader, best-selling author of Enterprise Application Integration, and CTO and founder of the cloud consulting firm Blue Mountain Labs, David Linthicum's presentation on SOA as the single most valuable architectural basis for the cloud.


Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data by  Quantum Corporation

August 26, 2009 - Data center power, cooling, and space requirements are becoming key IT challenges for organizations of all size; not to mention data protection demands, restore performance and longer retention times. Read this white paper to discover successful methods for meeting these IT challenges.


Energy Efficiency for the Enterprise by  Hewlett-Packard Company

June 01, 2008 - In data centers around the world, energy costs are rising rapidly and consuming an ever-greater portion of IT budgets. This paper highlights how to reduce energy costs, reduce your carbon footprint all while making the most of your IT investment.


Energy Efficiency in IBM Data Centers by  IBM

August 01, 2008 - This webcast details how IBM is implementing hardware, software and services to become more energy efficient within their own network and how it can work for you as well.


Energy Efficiency in the Data Center from the Channel Perspective by  Adaptec, Inc.

December 16, 2009 - Please read this presentation transcript featuring Greg Shulz and Jon Flower. Greg is the author of the book, The Green and Virtual Data Center, and is the founder of Server and Storage IO. Jon is Vice President of technology at Adaptec. Greg discusses with John various issues pertaining to energy efficiency.


Energy Efficiency, Public Policy, Utilities and Data Center by  Dell, Inc. and Intel®

July 28, 2010 - While CIOs are focusing on managing services offerings, managing data center risks and keeping total costs down, forces are at play that will require the CIO to pay significantly more attention to data center energy efficiency and resource consumption. Read this paper to learn more.


Energy Efficient Cooling for Data Centers: A Close-Coupled Row Solution by  Schneider Electric

October 01, 2010 - The trend of increasing heat densities in data centers has held consistent with advances in computing technology for many years. As power density increased, it became evident that the degree of difficulty in cooling these higher power demand loads was also increasing.


Energy Efficient Cooling Solutions for Data Centers: Introducing an Emerson Network Power Tool for Evaluating Cooling System Total Cost of Ownership by  Liebert Corporation

February 01, 2008 - The purpose of this paper is to discuss the energy savings potential of these technologies and to how an interactive tool developed by Emerson Network Power can help you evaluate that potential in the real-world space of your own data center.


Energy Efficient Cooling: IT Handbook by  APC by Schneider Electric

April 30, 2010 - In this e-book, you'll learn about setting up a cooling monitoring system, optimizing data center cooling efficiency, using hot aisle/ cold aisle containment systems, and economizer selection and implementation.


Energy Efficient Data Center Cabinet Systems for Cisco Switches by  Panduit

August 20, 2010 - This brochure focuses on Panduit's new Net-Serv and Net-Access Cabinets that enable improved thermal management and reduced power consumption in designs that optimize flexibility and space utilization around Cisco Nexus 7018, MD9500 Series, and 6500 Series Switches.


Energy Efficient IT E-Book - Chapter 2: The 21st Century Brings a Shift in Data Center Efficiency by  SearchDataCenter.com

January 25, 2010 - Data center efficiency has become increasingly important to IT departments. With IT departments now on the hook for reducing their energy use, technologists look to sources of inefficiency and see that commodity scale-out servers are clear culprits. In chapter 2 of this ebook, we'll discuss server efficiency tactics, fixes and other strategies.


Energy Efficient IT E-Book - Chapter 4: A Step-by-Step Guide to Data Center Energy Efficiency by  SearchDataCenter.com

March 30, 2010 - Chapter 4 of this e-book summarizes strategies for lessening the environmental impact of data centers and helps IT managers create a holistic four-phased approach to an energy-efficient data center project that includes persuading C-level executives to pursue energy efficiency, measuring data center energy consumption, and much more.


Energy Essentials: Rethinking Power and Cooling for the Modern Data Center by  TechTarget

February 19, 2014 - Energy consumption is a major concern when designing your IT infrastructure, so how do you improve server efficiency, facilitate cost-effective cooling, and satisfy power demands? Complete this short survey and receive exclusive access this guide, Energy Essentials: Rethinking Power and Cooling for the Modern Data Center.


Energy Impact of Increased Server Inlet Temperature by  APC by Schneider Electric

April 17, 2012 - Learn how your business can promote data center energy efficiency by finding the optimal temperature range where the combined IT and cooling load is minimized.


Energy Impact of Increased Server Inlet Temperature by  APC by Schneider Electric

July 09, 2009 - The quest for efficiency improvement raises questions regarding the optimal air temperature for data centers. The goal is to find the optimal temperature range where the combined IT and cooling load is minimized. Data presented is based upon actual sealed testing of different cooling systems when subjected to the simulated composite server...


Energy Impact of Increased Server Inlet Temperature by  Schneider Electric

October 06, 2011 - This white paper tests a commonly held idea about the optimal temperature of data center for a variety of infrastructure.


Energy Intelligence Driving Optimization with Visibility by  SAP America, Inc.

July 31, 2011 - <p>Aberdeen research report on how best in class companies utilize and leverage energy management technology while outpeforming their peers.</p>


Energy Logic for Telecommunications by  Emerson Network Power

November 14, 2008 - This white paper covers 12 strategies to improve the energy efficiency of telecomm organizations.


Energy Logic: Calculating and Prioritizing Your Data Center IT Efficiency Actions by  Emerson Network Power

July 07, 2009 - This paper reviews the challenges of measuring data center energy efficiency and proposes a solution: a new metric called CUPS, or Compute Units per Second, that allows data center managers to calculate data center efficiency.


Energy Logic: Reducing Data Center Energy Consumption by Creating Savings That Cascade Across Systems by  Emerson Network Power

July 07, 2009 - Learn how Emerson Network Power's Energy Logic, a vendor-neutral roadmap for optimizing data center energy efficiency, can deliver a 50% or greater reduction in energy consumption without compromising performance or availability.


Energy Logic: Reducing Data Center Energy Consumption by Creating Savings that Cascade Across Systems by  Emerson Network Power

January 21, 2010 - Energy Logic is a vendor-neutral roadmap for optimizing data center energy efficiency that starts with the IT equipment and progresses to the support infrastructure. This paper shows how it can deliver a 50 percent or greater reduction in data center energy consumption without compromising performance or availability.


Energy Logic: Reducing Data Center Energy Consumption by Creating Savings That Cascade across Systems by  Liebert Corporation

February 01, 2008 - This paper shows how Energy Logic can deliver a 50 percent or greater reduction in data center energy consumption without compromising performance or availability.


Energy Management Strategies and Data Center Complexities Require New Solutions by  IBM

January 13, 2009 - This white paper explores an approach to "going green" that enables you to address challenges like fiscal resource issues and align your IT shop with business goals and strategies.


Energy Savings of the Cloud Provide Financial Benefits by  XO Communications

December 20, 2013 - This informative resource discusses the energy-saving benefits of cloud computing and how reducing your physical environment for a cloud one can reduce costs, conserve resources and help increase your energy efficiency.


Energy Savings Performance Contracts for Federal Data Center Consolidation by  Schneider Electric

May 09, 2013 - Check out this resource that describes energy savings performance contracts (ESPCs), and how they are smart alternative financing option for consolidation projects.


Energy-efficient data centers by  IBM

November 25, 2013 - In this expert e-guide, provided by SearchDataCenter.com, learn how adopting an energy-efficient data center can not only position an organization as being green, but also decrease overall costs. Read on now to learn more.


Energy-Efficient Storage Technologies by  SearchDataCenter.com

August 01, 2008 - Green computing has become a national passion that is spreading globally. As a key element of the IT infrastructure, storage is expected to play its part by adopting green storage practices.


Enforcing Endpoint Security: Creating a Network Security Policy by  SearchSecurity.com

June 21, 2012 - As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them.


Enforcing IT Change Management Policy by  Tripwire, Inc.

March 18, 2009 - Read this white paper to learn how to enforce IT Control Management policies effectively by fostering a culture of change and enforcing change management processes resulting in greater auditability, improved quality, and IT infrastructure integrity.


Engage new employees in 10 simple steps by  Ultimate Software

June 08, 2012 - One of the most common reasons employees leave their jobs is because they are bored and are not engaged in what they’re doing. A number of factors influence the success of your new hires, but by implementing these 10 best practices, you can help turn your employees into passionate, productive team players


Engaging Customers: New Lessons Around Customer Behavior by  IBM

March 24, 2014 - This expert e-guide lays out five CEM lessons learned from AMC's hit TV show Breaking Bad that can help you cook up better customer experiences. Also inside, find a case study that describes the success that doughnut store Krispy Kreme found with the right mobile engagement strategy.


Engaging with the New eLearning by  Adobe Systems, Inc.

August 01, 2008 - Industry studies reveal evident increases in training and development delivered via eLearning. This white paper explores the advantages of eLearning and highlights 12 strategies with focus on virtual learning programs.


Engaging Your Subscribers Using Interactive Media in Email by  Bronto Software

October 01, 2008 - This paper reviews the best practices for integrating engaging interactive media elements into your current email marketing program. It will cover video in email, utilizing polls, flash presentations, RSS feeds and more.


Engineered High Performance Storage Solutions for Primary Storage by  Oracle Corporation

June 09, 2014 - This exclusive guide reveals database-aware, high-performance storage systems that provide an ideal platform for primary storage, test and development, and backup and recovery processes.


Engineered Solutions for Virtualization - IDC Analyst Video Describing the Future State of Virtualization Solutions by  HP and Intel

March 05, 2014 - Check out this concise webcast to uncover the key features in the latest virtualization solutions.


Engineering Platform Enables Smarter, Faster, and Safer Creation of Vehicle Components and Systems by  IBM

May 07, 2014 - In this brief news release, read about the collaboration between Robert Bosch GmbH -- a German engineering and electronics company -- and IBM that resulted in a data-driven systems engineering platform to help develop intelligent, interconnected automotive products.


Engineering the Wireless Hospital by  Aerohive Networks

November 15, 2010 - Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. However, there are security, infrastructure, and connectivity obstacles to overcome. Check out this e-book to learn more.


Engineering the Wireless Hospital by  CDW Healthcare

February 21, 2011 - Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this CDW Healthcare e-book to learn how these obstacles can be eliminated.


Enhance and secure critical business operations with end-to-end, business-driven security solutions by  IBM

June 16, 2010 - Securing IT assets is a top priority for organizations of all sizes, across all industries. Read this paper and learn how to help mitigate enterprise security risks by leveraging IBM solutions to drive business innovation and success, while reducing complexity and costs along the way.


Enhance Business Insight and Scalability of XML Data with New DB2 9.7 pureXML Features by  IBM

March 18, 2011 - This is a developerWorks article. This article summarizes the new pureXML capabilities, explains how they can be used, and discusses sample application scenarios.


Enhance Data Center Utilization by 95% with Enterprise Scale Workload Management by  Oracle Corporation

April 13, 2011 - Read this white paper to learn how organizations primarily adopt workload management software to increase value from their data centers and ease the pain of managing a million jobs simultaneously.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts