I Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
I Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
 

IPTV Test and Measurement Best Practices by  Alcatel-Lucent


January 01, 2007 - This whitepaper focuses on providing a pragmatic set of test and measurement guidelines that can be implemented on a live operational IPTV service. The recommendations given in this paper are generally applicable to any IPTV system.

 

IPv4-to-IPv6 Transition and Co-Existence Strategies by  BT Diamond IP


December 20, 2010 - This white paper presents an overview of the main migration technologies that can be used to transition from an IPv4 network to an IPv4-IPv6 network, and suggests several strategies to implement that transition. It will also touch on application migration and provide some example migration scenarios and corresponding impact considerations.

 

IPv6 Addressing Plan Basics by  Infoblox


April 26, 2013 - Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!

 

IPv6 Enabling Your Web Environment by  AT&T Corp


June 16, 2011 - This white paper guides you through the transition process from IPv4 to IPv6. Learn how to prepare Web servers, e-mail servers and supporting network, security and operations equipment, as well as which components you should IPv6-enable first.

 

IPv6 in the Data Center: Trends and Cisco Configurations by  Global Knowledge


December 30, 2013 - This white paper covers the latest trends within the data center for supporting IPv6, as well as the ways in which Cisco supports IPv6 in their data center product line.

 

IPv6 Timeline: The Road to a New Protocol by  Hewlett-Packard Company


January 02, 2013 - This IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today.

 

IPv6 Transition Planning and Strategies for DHCP and DNS by  Cisco Systems, Inc.


August 03, 2011 - IPv4 addresses are running out and service providers need to make immediate decisions regarding deployment of IPv6. This paper will outline strategic considerations and approaches to the transition to IPv6 in a service provider environment.

 

IPv6 Transition Planning and Techniques for DNS and DHCP by  Cisco Systems, Inc.


July 21, 2011 - Tune into this webcast which addresses common issues and concerns related to the transition to IPv6 and customers will learn about the following with respect to DNS and DHCP.

 

IPV6 Transition – Why the rush ? by  ComputerWeekly.com


December 01, 2011 - This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.

 

IPV6: Complete these 5 Steps to Prepare by  AT&T Corp


March 01, 2011 - This paper provides guidelines to help you take advantage of the strategic opportunities IPv6 will bring, while avoiding loss of business, marketing challenges, increased SPAM activity and other potential problems.

 

IPv6: The Next IP Standard by  AT&T Corp


October 13, 2010 - With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.

 

Irish Dairy Board Cuts Admin Costs and Optimizes Order-to-Cash Processes with IBM Sterling e-Invoicing Solution by  IBM


November 16, 2011 - Read this report and discover how the Irish Dairy Board achieved user productivity increase, cost reduction, significant improvements in order to cash and more.

 

Irish Life and Permanent plc: Using CA’s Next Generation Tools and Utilities to Simplify Mainframe Management by  CA Technologies.


January 01, 2010 - This success story provides insight into the current state of the mainframe and forecasts the future of these critical systems. Get advice on how to recruit the next generation of specialists and hear from one company that implemented a tool designed to simplify mainframe management.

 

IRMC Used VMware Virtual Desktop Infrastructure to Virtualize its Call Center Operations by  AMD and VMware, Inc


March 01, 2008 - IRMC used VMware Virtual Desktop Infrastructure to virtualize its call center operations and support multiple call centers from a central data center, reducing IT costs while improving flexibility and competitiveness.

 

Iron Mountain Customers Share Compliance, Litigation and Discovery Best Practices by  Iron Mountain


August 24, 2012 - This paper showcases how customers of the world's largest records management consulting practice address their own compliance and discovery requirements with the help of this company's intellectual property, practical advice and best practices. Read on to access short testimonials and descriptions of the services available.

 

Iron Mountain Data Backup & Recovery Benchmark Report by  Iron Mountain


October 04, 2011 - This data backup and recovery report explores the survey results of 1,200 participants from a variety of organizations, and the findings may surprise you. Check out this presentation to learn what you should be doing to ensure your company's storage and recovery needs are met.

 

Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage by  Iron Mountain


March 16, 2009 - To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery.

 

Iron Mountain EMR Scanning Survey Report by  Iron Mountain


September 14, 2011 - 70% of hospitals expect to meet EHR meaningful use guidelines this year. Yet, 78% expect to continue to treat patients using paper records for up to 5 more years despite the financial incentive for meeting these requirements. Inside this white paper, learn how your peers are transitioning to an EHR system.

 

Is a Data Warehouse the Only Option for Business Intelligence? by  Information Builders Inc.


October 01, 2007 - While data warehouses are important for many types of analytical systems, they aren’t always necessary. Building a data warehouse can dramatically increase the cost of a BI project. This paper describes data warehouses, along with many other options for placing relevant, timely information in the hands of business users.

 

Is an Open Source BPM Solution Right for You? by  Red Hat


July 31, 2013 - Consult this white paper to find out if open source BPM is right for your organization. You'll get an in-depth look at the benefits of open source software and BPM tools, and learn how using a single platform for BPM and business rules management (BRM) can benefit you.

 

Is an Open Source Business Process and Rules Management Solution Right for You? by  Red Hat


May 31, 2013 - Not all businesses can afford proprietary business rules management systems (BRMS) and business process management (BPM) tools. Access this resource to find out if open-source BRMS or BPM is right for your organization, and discover the benefits of an open-source strategy by reading now.

 

Is an Open Source Business Process Management Solution Right for You? by  Red Hat


July 31, 2013 - Not all companies can afford proprietary business process management (BPM) tools. Fortunately, open-source BPM can change that, making the benefits of BPM accessible to more businesses than ever before. View this informative resource to learn if an open-source BPM strategy is right for your organization.

 

Is an Open Source Business Process Management Solution Right for You? by  Red Hat


October 14, 2013 - In this informative white paper, learn about how increased availability of highly functional enterprise open source business process management (BPM) technology is bringing the benefits of BPM solutions within reach of more companies and projects, and discover how you can reap these benefits as well.

 

Is an Open Source Business Process Management Solution Right For You? by  Red Hat


August 13, 2013 - Open source options are taking the pain out of business process management (BPM), and putting the value of BPM within reach of more companies and projects. But is open source BPM the right move for you? Read on now to find out.

 

Is automated testing replacing the software tester? by  IBM


November 07, 2011 - With increased use of automation in application lifecycle management (ALM), the role of the tester is changing. In this tip guide managers will get advice on what to look for when selecting automated test tools and will learn more about how they may best want to invest their testing dollars in automation.

 

Is becoming a mobile enterprise the right move for you? Find out here by  IBM


April 30, 2013 - Explore this exclusive white paper to find out if becoming a mobile enterprise is the right move for your organization.

 

Is BYOD worth the risk? BYOD Benefits Model for Global Companies by  Cisco Systems, Inc.


November 12, 2013 - This informative resource examines the financial impact of BYOD in organizations in six different countries, analyzing what kind of value BYOD is delivering and how your organization can increase this value.

 

Is cloud storage the right move for health care information? by  EMC Isilon


December 07, 2012 - This e-guide explores the most important considerations for health care organizations thinking about cloud data backup. Inside, uncover the steps you'll need to take when venturing into a cloud data backup plan, as well as how to prioritize your data.

 

Is Data Storage Holding Your Business Back? by  Xiotech Corporation


June 02, 2010 - Applications are central to business, and the performance of those applications can mean the difference between market success and lost revenues. In order to keep pace with these applications, speed time to value and improve availability, IT has adopted technology innovations like virtualization and cloud.

 

Is Deduplication Right For You? by  Spectra Logic Corporation


May 01, 2008 - Is deduplication right for you? With all the industry excitement about data deduplication, this is a question you need to ask. This paper reviews the specific benefits of deduplication and how you can evaluate your organization's data in terms of deduplication's potential advantages.

 

Is EMC Greenplum the real Hadoop company? by  ComputerWeekly.com


April 02, 2013 - EMC Greenplum launched two new Hadoop-related technologies to support Big Data deployments. Analyst Group, Nucleus Research  assesses their importance.

 

Is GMO Product Information on Your Radar? by  LANSA


February 19, 2014 - This brief resource explores the need for food manufacturers to disclose GMO information before the upcoming Global Data Synchronization Network (GDSN) is introduced, and describes how the right product information management and data aggregation systems can help you get there.

 

Is it possible to have too many tools? by  Nimsoft, Inc.


July 01, 2012 - Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more.

 

Is It Time for Automated Classification? by  OpenText


May 16, 2014 - This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.

 

Is it time to reevaluate your workforce management tools? by  ClickSoftware


February 20, 2013 - Workforce management (WFM) tools are no longer a nice-to-have. In order to be successful in today's mobile, global market you need WFM practices that keep your business running smoothly. Access this e-guide to discover why legacy WFM tools are falling short and learn key factors to consider when upgrading your WFM system.

 

Is JD Edwards EnterpriseOne Right for Your Business? by  Oracle Corporation


December 03, 2008 - View this Webcast to learn why the new transformation of JD Edwards applications can integrate your manufacturing strategies to improve your competitiveness and overall performance.

 

Is Parallel Programming Hard? by  Intel


October 28, 2009 - This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.

 

Is proving short-term unified communications ROI really necessary? by  SearchSecurity.com


July 05, 2011 - This expert E-Guide takes a close look at the different ways ROI can be determined. Uncover how UC is being justified in organizations, how to take full advantage of its benefits and what you can expect from UC in the future.

 

Is SAP HANA a Good Bet? by  HP


August 27, 2013 - Ever since SAP first introduced its new in-memory appliance at the company's annual SapphireNow conference last year, it has sought to convince users of the technology's ability to simplify IT landscapes and process massive amounts of data in seconds. In this E-guide, learn more about the pros and cons of SAP HANA.

 

Is security a concern of your mobile users? by  Cisco


March 26, 2014 - This brief resource highlights the top 3 mobile user expectations of network connectivity.

 

Is Social Media Transforming Your Business? by  Oracle Corporation


March 01, 2012 - It's no secret that social media has changed consumer behaviors – but most companies are struggling to capitalize on the unique opportunities it has to offer. Review this resource to learn how incorporating social media into knowledge management, contact centers, and the Web can substantially enhance your customer's experience.  

 

Is the Back Office Ready for a Technology Refresh by  Transverse


May 28, 2009 - In order to remain competitive and grow, service providers must increase revenue through value-added services and build innovative new business models, while reducing capital and operating expenses. Read this presentation transcript, taken from the mediacast of the same name, to learn more.

 

Is the cloud safe? Breaking down the barriers to cloud computing by  ComputerWeekly.com


September 12, 2010 - Research by Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services. In this report, we examine how to overcome these top five concerns to help IT managers put in place a strategy for cloud computing with confidence

 

Is the cloud safe? Breaking down the barriers to cloud computing by  ComputerWeekly.com


December 09, 2010 - Research by cloud provider Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services.

 

Is the mobile gambling market still a safe bet for business? by  ComputerWeekly.com


November 30, 2010 - This whitepaper is based on Juniper Research’s August 2010 report entitled “Mobile Gambling Markets: Casinos, Lotteries and Betting 2010-2015.”

 

Is Time to Market King? by  IBM


November 10, 2011 - The common thread of successful software development is enabling collaboration in context - making the process transparent so stakeholders remain informed and empowered to contribute. Once this thread is established, technology can be implemented that provides the glue for stakeholders to collaborate and meet their time to market or goals.

 

Is traditional project and portfolio management dead? by  TechTarget


February 19, 2014 - Prioritizing your organizational initiatives to analyze and manage your current and future IT projects can be a daunting task, especially without relevant PPM processes in place. Complete this short survey to gain access to expert advice, case studies and tips in our expert guide, Is traditional project and portfolio management dead?

 

Is Utility Hosting Right For Your Business? by  AT&T Corp


August 04, 2010 - Compared to dedicated hosting, utility hosting is easily scalable and standardized as a turnkey package. Its chief advantage is that you pay only for the computing capacity that you use. A good time to adopt this solution is when change is taking place.

 

Is Virtual Networking the Link to End-to-End Management? by  SearchNetworking.com


December 19, 2013 - As virtual networking takes hold, network professionals hope it will provide the long-awaited single-pane-of-glass management and monitoring capabilities that have remained elusive.

 

Is virtualization a black hole in your security? 5 ways to ensure it isn't by  Sophos UK


March 16, 2009 - The ease with which virtual computer image files can now be downloaded means there is a much higher risk of end users running unauthorized applications in a virtual environment. This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization and gives five effective ways to secure yourself against them.

 

Is virtualization a black hole in your security? 5 ways to ensure it isn't by  Sophos, Inc.


December 01, 2008 - This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization, and gives five effective ways to secure yourself against them.

 

Is Your Acceptable Use Policy Social Media-proof? by  M86 Security


February 11, 2011 - This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.

 

Is Your Back Office Behind the Times? Evaluate Three Key Areas by  Concur Technologies


June 06, 2014 - The following white paper provides readers with the practical knowledge on how to evaluate the 3 most common slowdown areas in the office back end. Learn what technology is available to help and more.

 

Is Your Complete Restoration Plan on Track? by  Iron Mountain


March 01, 2012 - Check out this white paper to learn how finding the right storage partner can help you ensure your data is protected and accessible and put your mind at ease. Read on to discover what to look for in an offsite partner, explore key DR concerns to determine how your existing strategy holds up and more.

 

Is Your CRM Solution Keeping Up with the Times? by  Oracle Corporation


December 01, 2011 - In this white paper, IT Business Edge explains the key business and technology factors to consider in deciding whether and when to upgrade your CRM system, including the Software-as-a-Service (SaaS) factor.

 

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers by  Sophos, Inc.


June 01, 2009 - Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption.

 

Is your data center holding you back? by  HP


October 10, 2011 - Access this essential resource to discover five crucial steps to jump-start business and IT agility by becoming an instant-on enterprise, including planning, standardizing, virtualizing, and more.

 

Is Your Data Center Ready for Today’s DDoS Threats? by  Fortinet, Inc.


April 23, 2014 - This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.

 

Is your database ready for the big data era? by  IBM


April 30, 2013 - This resource examines how big data is impacting the modern database, and offers advice to help you take full advantage of the big data opportunity.

 

Is your email system slowing you down? by  Google


February 18, 2014 - This exclusive case study discusses the set of solutions that a global consulting organization was able to use to revamp their IT environment and take full advantage of their mobile workforce.

 

Is Your Enterprise Application on the Road to Nowhere? by  IFS


February 01, 2008 - After recent software product consolidation, how can you tell which products have a future and which will be phased out or orphaned?

 

Is Your IT Infrastructure Keeping Up? by  VCE


September 25, 2013 - In order to meet fast-evolving business needs, many IT managers are turning to converged infrastructure systems. Access this white paper now to explore this issue in depth and discover the many challenges converged infrastructures can solve.

 

Is Your IT Infrastructure Keeping Up? by  VCE


April 14, 2014 - Check out this concise resource to discover how converged infrastructures are helping organizations keep up with the rapidly evolving business needs.

 

Is your load balancer cloud ready? by  Citrix


August 14, 2013 - A major key to cloud success is having an IT infrastructure that is cloud-ready. This informative white paper outlines the core cloud challenges and discusses how application delivery controllers can help you embrace the cloud.

 

Is Your Load Balancer Cloud-Ready? by  Citrix


October 14, 2010 - Build a Cloud computing infrastructure with maximum availability, performance and security. This white paper shows how you can support public, private or hybrid Cloud configurations, scale app delivery, and support multi-tenant environments with the best load balancing technology.

 

Is your network ready for BYOD? by  Hewlett-Packard Company


June 04, 2013 - This webcast explores the importance of mobility solutions for your network and why it is essential that you can control which devices are accessing what data.

 

Is Your Network Ready for Cloud Computing - Presentation Transcript by  Cisco Systems, Inc.


February 08, 2012 - This presentation transcript will look at areas to cover with the cloud provider, including possible adjustments to firewalls and other perimeter defenses such as IPS, and how to ensure the changes don’t violate security policy.

 

Is Your Network Ready for the Cloud?  Six Things You Must Consider by  Hewlett-Packard Company


June 30, 2011 - To lessen the impact the cloud will have on your network, be sure to read this checklist of key points and questions to consider prior to cloud adoption. Because preparation is vital to your success, this checklist can help you make your move to the cloud as seamless and easy as possible.

 

Is Your Network Ready for VoIP? by  BlueCoat


October 07, 2010 - This paper summarizes in question and answer format the many critical factors pertaining to VoIP’s viability, regardless of which vendor’s IP-PBX system is deployed across the distributed enterprise.

 

Is Your Network Ready for VoIP? by  BlueCoat


December 02, 2008 - This paper summarizes in question and answer format the many critical factors pertaining to VoIP's viability, regardless of which vendor's IP-PBX system is deployed across the distributed enterprise.

 

Is Your Network Traffic Invisible? by  GlobalScape


May 09, 2014 - This brief guide explores the importance of network monitoring and outlines the benefits of increased visibility.

 

Is Your Outsourcing Strategy Under Your Control? by  SearchDataCenter.com


October 09, 2013 - Proactive planning and evaluation can prevent common problems with IT outsourcing providers, keeping your data safe and ensuring your outsourcing venture is cost-effective.

 

Is Your Platform Secure? Really? by  IBM


July 17, 2013 - This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.

 

Is your security as good as the cloud’s? by  Trend Micro, Inc.


October 04, 2011 - This paper examines the relative merits of Software-as-a-Service and Infrastructure-as-a-Service, as well as issues and risks to consider. View now to determine whether these models are likely to provide better or worse security than your current in-house security.

 

Is your storage "junk drawer" making DR inefficient? by  Dell, Inc.


March 20, 2013 - In this presentation transcript, Jon Toigo points out the drawbacks to a "back up everything approach" and explains how better storage resource management can improve the efficiency and effectiveness of DR plans.

 

Is Your Strategy as Smart as Your Customers? by  IBM


August 07, 2012 - In this white paper learn the Smart Commerce strategy developed by IBM, designed around customer needs, aspirations, and behavior. This paper goes in depth on each of the four key components of the strategy, demonstrating the work they've done with some of the top names in sports to deliver the Smarter Commerce experience.

 

Is your user management process getting you down? Improving efficiency and security through automation by  NetIQ Europe


May 02, 2011 - Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access.

 

ISACA PCI Compliance Symposium by  Intel


January 25, 2011 - As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.

 

ISC Corp. Case Study by  Emerson Network Power


July 07, 2009 - ISC Corp. needed a new data center that could efficiently meet current and future needs. Learn how Emerson Network Power and its Liebert power and cooling technologies helped to realize that goal.

 

iSCSI for TL-Series Tape Libraries by  Dell, Inc.


September 30, 2008 - To supplement the growth in iSCSI SANs, Dell has introduced an iSCSI-to-SAS bridge card for the TL-series of tape libraries. This allows a customer to directly attach a tape backup target to their iSCSI 1Gb Ethernet SAN with little to no degradation in transfer speed. This white paper explores this setup and configuration.

 

ISCSI SAN Boot - Simplifying Server Operations On SANS by  Dell, Inc.


March 25, 2009 - Storage area networks (SAN) deliver consolidated storage and advanced storage management features. This paper explains the benefits of three different server boot operations provided by one advanced SAN configuration. It counsels that you should weigh the benefits and drawbacks of each before committing your organization's storage system to one.

 

ISCSI SAN BOOT - Simplifying Server Operations on SANS by  Dell, Inc.


July 01, 2008 - Storage area networks (SAN) deliver consolidated storage and advanced storage management features.

 

iSCSI SAN eGuide by  Dell | EMC


January 25, 2007 - For many businesses, iSCSI is becoming an attractive SAN option because of its lower cost, easier maintenance and simpler management over Fibre Channel. This guide from SearchStorage.com provides a detailed overview of iSCSI, tips for deplo...

 

iSCSI SAN Remains Strong After a Decade by  Dell, Inc. and Intel®


June 04, 2012 - This year marks the 10th anniversary of iSCSI SANs! Check out this expert E-Guide to learn why iSCSI SAN performance remains strong after 10 years, and why iSCSI SAN is cheaper and less complicated than Fibre Channel.

 

iSCSI vs. Fibre Channel: Three Reasons Not To Choose Either by  Coraid


April 29, 2011 - Fibre Channel and iSCSI storage systems are not delivering the price-performance and agility at the storage layer required to keep up with the new virtualized compute layer. This paper explores a third storage networking technology, Ethernet SAN, and why you don’t have to choose between iSCSI and Fibre Channel.

 

iSCSI: Superior Storage for Virtualization by  Dell, Inc. and Intel®


March 31, 2007 - iSCSI technology provides superior manageability to Fibre Channel for virtualized environments. Specifically, iSCSI lets users in virtualized environments utilize all the functionality available to non-virtualized systems.

 

iSensor specifications by  Dell, Inc.


May 18, 2011 - Organizations need advanced security technology, strong security expertise and 24x7 vigilance to safeguard their networks and IT systems. This data sheet offers an overview and specifications of Dell SecureWorks’ proprietary network intrusion prevention appliance, iSensor. Learn about its key features and how it can protect your networks.

 

ISG Outsourcing Index (EMEA) by  ComputerWeekly.com


April 22, 2013 - The ISG Outsourcing Index provides a quarterly review of the latest sourcing industry data and trends.

 

ISILON AT VMWORLD 2010 by  Isilon Systems


August 06, 2010 - Please join us at VMworld to learn how Isilon can simplify your storage environment and maximize your investment in virtualization.

 

Isilon Scale-out NAS for Virtualisation by  Isilon Systems UK


December 01, 2009 - Simplicity at Scale: In the same way that virtualisation has eliminated server sprawl, Isilon Scale-out NAS eliminates storage sprawl and provides a superior solution for virtualised environments. Read this solution brief to learn more.

 

ISM Essentials Guide on Cloud and Virtualization Security by  SearchSecurity.com


October 07, 2011 - Moving applications, development and data to the cloud means a new paradigm of IT and security management. You’ll need clear visibility into how data moves outside your organization, where it’s stored and who has access to it. This essential guide from ISM offers expert advice on security around your organization’s cloud computing efforts.

 

ISM Essentials Guide – Threat Management by  SearchSecurity.com


December 18, 2012 - In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.

 

ISM December 2012 by  SearchSecurity.com


December 07, 2012 - In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.

 

ISP Selectel Competes Internationally with Optimized Cloud Hosting by  Intel


March 31, 2013 - In this one page success brief, you will learn how Russia's largest provider of data center services speeds up its cloud hosting with solid state drives.

 

ISSU: A Planned Upgrade Tool by  Juniper Networks, Inc.


November 25, 2008 - This paper describes the selection of an ISSU design, which requires a comprehensive approach that considers various permutations of redundant and non-redundant router architectures.

 

Issue Tracking in an Agile Development Environment by  CollabNet


October 04, 2010 - The term "issue tracking software" is often associated with bug trackers. Yet in software development, the definition of an "issue" is much broader. As more organizations embrace Agile methods for development, they’re turning to agile project management tools to help manage the many issues that arise during the course of a software release cycle.

 

ISVs, "This One's for You" by  AppZero


March 04, 2009 - Virtual machines and virtual appliances have successfully transformed data center operations. AppZero Virtual Application Appliances extend that transformation to server applications- Linux, Unix, and Windows. This paper explains Instant POCs, simplified implementations, and a cloud friendly slide to the SaaS model.

 

IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection by  Webroot


December 31, 2012 - In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.

 

IT Administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot Secure Anywhere by  Webroot


August 06, 2012 - The antivirus protection Doris network was using created problems and slowed the productivity of employees. Fortunately, Webroot offered an efficient and effective solution. Learn how Webroot remedied the inaccurate and difficult to manage reports by reading this informative resource.

 

IT and Analyst Testimonials: TCO Considerations for PC Refresh and Intel vPro Technology by  Intel Corporation


May 27, 2009 - In this video IT professionals from the Symantec ManageFusion Conference discuss how PC refresh and Intel vPro technology helps minimize total cost of ownership.

 

IT as a Competitive Weapon: Gain Speed, Agility and Cost Efficiency with Your IT Infrastructure by  SAVVIS


December 30, 2011 - Uncover the many pressures on the IT infrastructures of financial services organizations today and learn why ridding your organization of the burden may be your key to achieving the agility, speed, and reliability you need from an IT infrastructure.

 

IT as a driver of M&A success by  ComputerWeekly.com


March 09, 2012 - IT considerations are not given adequate attention or rigour in the due diligence prior to mergers and acquisitions, this report from Ernst & Young reveals.

 

IT as a Service is the IT of the Future by  Citrix


November 08, 2013 - This engaging webinar looks at how, with the cloud, IT is transitioning from basic support to a more integral and user-facing service with a catalog of applications that users can select for themselves from one simple user interface.

 

IT as a service provider: Accelerating business results by  Dell Software


October 23, 2013 - In this resource, learn how you can increase collaboration between business and IT, with a multi-cloud management technology. Read on to discover how it enables IT to take and maintain control over cloud operations, while seamlessly meeting all the needs of business users.

 

IT as a Weapon: Performance, Value, and Protection for VMware View Deployments by  FalconStor Software


October 25, 2010 - In the past few years, there has been a huge acceleration in the interest in and demand for Virtual Desktops, and for very good reasons. Despite the many benefits, however, there are also many challenges associated with Virtual Desktops. Watch this webcast to hear David Shyu discuss the benefits and challenges of Virtual Desktop Infrastructure.

 

IT at the Speed of Business: Why Spreadsheets No Longer Cut it for Strategic Executives by  Innotas


June 30, 2011 - In today’s competitive market, businesses need their IT departments to make the best use of limited budgets to meet the most critical business needs. Learn how project and portfolio management (PPM) can effectively align IT and business goals for long-term success.

 

IT Audit Report - EMC IT: Leading the Transformation by  EMC Corporation


March 01, 2013 - A case study of EMCs adoption of cloud computing over the last ten years, this whitepaper documents EMC's advances in cloud computing and the resulting dramatic benefits in company-wide productivity.

 

IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions by  Cisco Systems, Inc.


July 28, 2010 - A job scheduler is responsible for routinely managing thousands—and in many cases, tens of thousands—of individual mission-critical business processes every day. This evaluation guide provides an in-depth overview of job scheduling capabilities that companies rely on to operate their businesses successfully.

 

IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions by  Cisco Systems, Inc.


November 19, 2010 - Businesses increasingly use IT automation tools to meet the challenge of managing their data centers. This document describes two types of IT automation software: enterprise job scheduling and run book automation (RBA). It explains how each solution helps to improve efficiency and reduce risks and when to use each solution and when to combine them.

 

IT Automation: Support and Improve Business Innovation by  Cisco Systems, Inc.


July 28, 2011 - This white paper provides a deeper understanding of IT automation. Obtain a detailed definition of this concept and gain insight into the areas it comprises and its successful elements.

 

IT Benefits of an Integrated Solution by  Centennial-Software


July 01, 2008 - View this webinar to find out how Enteo Client Lifecycle is being added to HEAT, Remedy, and Footprints as well as other Service Desk Platforms.

 

IT Best Practices: To Support or Not Support Consumer-Owned Smartphones by  Zenprise


October 20, 2011 - This white paper outlines current and future implications of consumer and enterprise mobile devices (especially when it comes to messaging), and how they can and will impact your organization. In addition, learn what you can do to prepare your business to ensure high service levels for smartphone users.

 

IT Best Practices: To Support or Not Support Consumer-Owned Smartphones by  Zenprise


March 31, 2009 - Discover why mobile service is vital to your overall messaging infrastructure and mobile management strategy as you uncover how to better support consumer-owned smartphones in your organisation.

 

IT Briefing - Desktop and Application Virtualization: Getting Started by  Citrix


January 30, 2009 - In this document Barb Goldworm, President, Founder and Chief Analyst of Focus, explains the benefits for desktop and application virtualization.

 

IT Briefing: Breakthrough economics for your business: DB2 pureScale & Smart Analytics Systems on IBM servers powered by Intel Xeon processors by  IBM and Intel


October 27, 2010 - IT needs tools that deliver real-time information that informs the interactions of people, processes and applications throughout the enterprise. In this IT Briefing, Intel and IBM systems experts Mitch Shults, Jim Lawrie, and Paul Awad discuss analytical and transactional solutions that drive faster and smarter business decisions.

 

IT Briefing: Desktop Virtualization for Mobile Users by  Citrix


August 31, 2010 - In this IT Briefing, learn how to extend the benefits of desktop virtualization to mobile users. Discover a tool that enables users to achieve the benefits of virtual desktops through laptops. Learn about the advantages to this approach, including improved security and flexibility.

 

IT Briefing: Efficient SAN-Based Tape Encryption by  Cisco Systems, Inc.


December 16, 2008 - This document discusses the protection of stored data, particularly the data that resides on backup tapes.

 

IT Briefing: How to Optimize ETL for Demanding Data Environments by  Syncsort


October 01, 2008 - This document is based on a Syncsort/TechTarget Webcast entitled "How to Optimize ETL for Demanding Data Environments."

 

IT Briefing: Is JD Edwards EnterpriseOne Right for Your Business? by  Oracle Corporation


January 07, 2009 - JD Edwards EnterpriseOne is a comprehensive and highly integrated suite of core business applications including things like financials, manufacturing, distribution, supply chain management, human capital management and so forth.

 

IT Briefing: MDM Challenges: Driving Change in People, Process, and Politics by  Pitney Bowes Group 1 Software


September 01, 2008 - This document first establishes what master data and Master Data Management (MDM) mean and then discusses the nontechnical organizational and operational challenges associated with introducing an MDM program.

 

IT Briefing: SIEM 3.0: The Next Generation of Security and Compliance Monitoring by  ArcSight, an HP Company


October 15, 2008 - Read this IT briefing to learn more about interesting trends in the security information and event monitoring (SIEM) industry.

 

IT Budget Strategy in a Down Economy: Stop Buying Storage! by  Symantec Corporation


January 15, 2009 - With the current downturn in today's economy, organizations are reluctant to spend any more money than absolutely necessary. Read this paper to learn how Symantec is uniquely able to deliver products and solutions with the immediate ROI that the current financial situation demands.

 

IT Checklist: 5 tips to achieve cloud, virtualization nirvana by  VMware, Inc.


April 19, 2013 - This e-book presents 5 essential tech tips for IT leaders preparing to take their first step toward a virtualized infrastructure.

 

IT Connects Customers to Brands by  Cisco Systems, Inc.


August 16, 2010 - Paul Gillin, author of three social media marketing books, reveals how CIOs are becoming the designated guardians of intellectual property. As the use of social media tools grows, Gillen recommends how a CIO can stay in front of the widespread access and create enhanced customer experiences.

 

IT Consolidation with VMware and Dell EqualLogic iSCSI SANs by  Dell and VMware


May 14, 2009 - Dell EqualLogic™ PS Series iSCSI SANs help to reduce the cost and complexity of IT Consolidation and uniquely integrate with VMware® Infrastructure to enable the fully virtualized IT environment.

 

IT Consolidation with VMware and Dell Equallogic ISCSI SANS by  Dell, Inc.


April 03, 2009 - Read this paper to learn how Dell EqualLogic™ PS Series iSCSI SANs can help to reduce the cost and complexity of IT Consolidation and uniquely integrate with VMware® Infrastructure to enable the fully virtualized IT environment.

 

IT Courseware by  SkillSoft Corporation


SkillSoft's IT Skills instruction is designed to encourage and prompt frequent learner interaction with the course content. SkillSoft maintains courseware integrity and effectiveness by offering a balance of thorough instruction, challenging practice exercises and quizzes.

 

IT Decision Checklist: Antimalware by  ESET


October 27, 2011 - Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.

 

IT Decision Checklist: Antimalware by  ESET


June 14, 2010 - Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

 

IT Decision Checklist: Messaging Security by  SearchSecurity.com


March 03, 2010 - Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

 

IT Decision Checklist: Remote Access by  VirtualArmor


March 19, 2010 - The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.

 

IT Decision Checklist: SIMs and Log Management by  LogLogic, Inc.


January 05, 2010 - In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.

 

IT Decision Checklist: Virtual Desktop Infrastructure Security by  Astaro


February 15, 2011 - VDI presents enterprises with dynamic opportunities to improve security. Check out this e-guide to learn what those are and receive guidance on evaluating VDI security products.

 

IT Decision Checklist: Virtual Desktop Infrastructure Security by  Trend Micro


November 02, 2010 - Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.

 

IT Download - Orion Network Configuration Manager (NCM) by  SolarWinds, Inc.


February 25, 2009 - Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies.

 

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4 by  Symantec Corporation


March 13, 2009 - With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.

 

IT education in Scandavia by  ComputerWeekly.com


March 15, 2013 - Learn how Scandanvian educators are capitalising on IT advances to help children learn in this Computer Weekly report.

 

IT Excellence: Achieving Optimised Business Outcomes by  SAP AG


February 01, 2007 - Information technology is ubiquitous in organizations, but what distinguishes top-notch IT from merely adequate IT? Read this article written by the Economist, to learn how leading companies enable IT to perform optimally.

 

IT Executive Guide to Security Intelligence by  IBM


February 24, 2011 - In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security.

 

IT Governance in an IBM Lotus Software Environment by  Sherpa Software


January 16, 2009 - This document describes concepts and definitions for governance, elements of governance, distinguishing myth from reality, approaches that go beyond "just good enough", control frameworks etc.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts