I Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
I Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
 

Is GMO Product Information on Your Radar? by  LANSA


February 19, 2014 - This brief resource explores the need for food manufacturers to disclose GMO information before the upcoming Global Data Synchronization Network (GDSN) is introduced, and describes how the right product information management and data aggregation systems can help you get there.

 

Is IBM’s Netcool Poised to Grab a Large Share of the Enterprise Network Management Marketplace? by  IBM


November 30, 2012 - This research report explores IBM's Netcool management tool and outlines some of the key benefits.

 

Is it possible to have too many tools? by  Nimsoft, Inc.


July 01, 2012 - Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more.

 

Is it time to invest in a talent management software system? by  TechTarget


February 19, 2014 - Acquiring the right personnel for your organization can be daunting and cumbersome. Fortunately, with talent management at the heart of HCM, finding the right people for the job is simplified. By completing this brief survey you will gain access to an exclusive e-guide "Is it time to invest in a talent management software system?"

 

Is it Time to Purchase a new ERP? by  Epicor Software Corporation


February 29, 2012 - With careful selection, planning, and aggressive goal setting, you can operate pain-free and better than ever by implementing a new ERP. This whitepaper lays a solid foundation for those contemplating a purchase.

 

Is it time to reevaluate your workforce management tools? by  ClickSoftware


February 20, 2013 - Workforce management (WFM) tools are no longer a nice-to-have. In order to be successful in today's mobile, global market you need WFM practices that keep your business running smoothly. Access this e-guide to discover why legacy WFM tools are falling short and learn key factors to consider when upgrading your WFM system.

 

Is JD Edwards EnterpriseOne Right for Your Business? by  Oracle Corporation


December 03, 2008 - View this Webcast to learn why the new transformation of JD Edwards applications can integrate your manufacturing strategies to improve your competitiveness and overall performance.

 

Is Parallel Programming Hard? by  Intel


October 28, 2009 - This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.

 

Is proving short-term unified communications ROI really necessary? by  Plantronics


July 05, 2011 - This expert E-Guide takes a close look at the different ways ROI can be determined. Uncover how UC is being justified in organizations, how to take full advantage of its benefits and what you can expect from UC in the future.

 

Is SAP HANA a Good Bet? by  HP


August 27, 2013 - Ever since SAP first introduced its new in-memory appliance at the company's annual SapphireNow conference last year, it has sought to convince users of the technology's ability to simplify IT landscapes and process massive amounts of data in seconds. In this E-guide, learn more about the pros and cons of SAP HANA.

 

Is Social Media Transforming Your Business? by  Oracle Corporation


March 01, 2012 - It's no secret that social media has changed consumer behaviors – but most companies are struggling to capitalize on the unique opportunities it has to offer. Review this resource to learn how incorporating social media into knowledge management, contact centers, and the Web can substantially enhance your customer's experience.  

 

Is the Back Office Ready for a Technology Refresh by  Transverse


May 28, 2009 - In order to remain competitive and grow, service providers must increase revenue through value-added services and build innovative new business models, while reducing capital and operating expenses. Read this presentation transcript, taken from the mediacast of the same name, to learn more.

 

Is the cloud safe? Breaking down the barriers to cloud computing by  ComputerWeekly.com


September 12, 2010 - Research by Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services. In this report, we examine how to overcome these top five concerns to help IT managers put in place a strategy for cloud computing with confidence

 

Is the cloud safe? Breaking down the barriers to cloud computing by  ComputerWeekly.com


December 09, 2010 - Research by cloud provider Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services.

 

Is the mobile gambling market still a safe bet for business? by  ComputerWeekly.com


November 30, 2010 - This whitepaper is based on Juniper Research’s August 2010 report entitled “Mobile Gambling Markets: Casinos, Lotteries and Betting 2010-2015.”

 

Is Time to Market King? by  IBM


November 10, 2011 - The common thread of successful software development is enabling collaboration in context - making the process transparent so stakeholders remain informed and empowered to contribute. Once this thread is established, technology can be implemented that provides the glue for stakeholders to collaborate and meet their time to market or goals.

 

Is traditional project and portfolio management dead? by  TechTarget


February 19, 2014 - Prioritizing your organizational initiatives to analyze and manage your current and future IT projects can be a daunting task, especially without relevant PPM processes in place. Complete this short survey to gain access to expert advice, case studies and tips in our expert guide, Is traditional project and portfolio management dead?

 

Is Utility Hosting Right For Your Business? by  AT&T Corp


August 04, 2010 - Compared to dedicated hosting, utility hosting is easily scalable and standardized as a turnkey package. Its chief advantage is that you pay only for the computing capacity that you use. A good time to adopt this solution is when change is taking place.

 

Is virtualization a black hole in your security? 5 ways to ensure it isn't by  Sophos UK


March 16, 2009 - The ease with which virtual computer image files can now be downloaded means there is a much higher risk of end users running unauthorized applications in a virtual environment. This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization and gives five effective ways to secure yourself against them.

 

Is virtualization a black hole in your security? 5 ways to ensure it isn't by  Sophos, Inc.


December 01, 2008 - This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization, and gives five effective ways to secure yourself against them.

 

Is Your Acceptable Use Policy Social Media-proof? by  M86 Security


February 11, 2011 - This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.

 

Is Your AV Keeping Up? by  Lumension


April 16, 2014 - This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.

 

Is Your Complete Restoration Plan on Track? by  Iron Mountain


March 01, 2012 - Check out this white paper to learn how finding the right storage partner can help you ensure your data is protected and accessible and put your mind at ease. Read on to discover what to look for in an offsite partner, explore key DR concerns to determine how your existing strategy holds up and more.

 

Is Your CRM Solution Keeping Up with the Times? by  Oracle Corporation


December 01, 2011 - In this white paper, IT Business Edge explains the key business and technology factors to consider in deciding whether and when to upgrade your CRM system, including the Software-as-a-Service (SaaS) factor.

 

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers by  Sophos, Inc.


June 01, 2009 - Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption.

 

Is your data center holding you back? by  HP


October 10, 2011 - Access this essential resource to discover five crucial steps to jump-start business and IT agility by becoming an instant-on enterprise, including planning, standardizing, virtualizing, and more.

 

Is your database ready for the big data era? by  IBM


April 30, 2013 - This resource examines how big data is impacting the modern database, and offers advice to help you take full advantage of the big data opportunity.

 

Is Your Enterprise Application on the Road to Nowhere? by  IFS


February 01, 2008 - After recent software product consolidation, how can you tell which products have a future and which will be phased out or orphaned?

 

Is Your IT Infrastructure Keeping Up? by  VCE


September 25, 2013 - In order to meet fast-evolving business needs, many IT managers are turning to converged infrastructure systems. Access this white paper now to explore this issue in depth and discover the many challenges converged infrastructures can solve.

 

Is Your IT Infrastructure Keeping Up? by  VCE


April 14, 2014 - Check out this concise resource to discover how converged infrastructures are helping organizations keep up with the rapidly evolving business needs.

 

Is your load balancer cloud ready? by  Citrix


August 14, 2013 - A major key to cloud success is having an IT infrastructure that is cloud-ready. This informative white paper outlines the core cloud challenges and discusses how application delivery controllers can help you embrace the cloud.

 

Is Your Load Balancer Cloud-Ready? by  Citrix


October 14, 2010 - Build a Cloud computing infrastructure with maximum availability, performance and security. This white paper shows how you can support public, private or hybrid Cloud configurations, scale app delivery, and support multi-tenant environments with the best load balancing technology.

 

Is Your Network Ready for Cloud Computing - Presentation Transcript by  Cisco Systems, Inc.


February 08, 2012 - This presentation transcript will look at areas to cover with the cloud provider, including possible adjustments to firewalls and other perimeter defenses such as IPS, and how to ensure the changes don’t violate security policy.

 

Is Your Network Ready for the Cloud?  Six Things You Must Consider by  Hewlett-Packard Company


June 30, 2011 - To lessen the impact the cloud will have on your network, be sure to read this checklist of key points and questions to consider prior to cloud adoption. Because preparation is vital to your success, this checklist can help you make your move to the cloud as seamless and easy as possible.

 

Is Your Network Ready for VoIP? by  BlueCoat


December 02, 2008 - This paper summarizes in question and answer format the many critical factors pertaining to VoIP's viability, regardless of which vendor's IP-PBX system is deployed across the distributed enterprise.

 

Is Your Network Ready for VoIP? by  BlueCoat


October 07, 2010 - This paper summarizes in question and answer format the many critical factors pertaining to VoIP’s viability, regardless of which vendor’s IP-PBX system is deployed across the distributed enterprise.

 

Is Your Outsourcing Strategy Under Your Control? by  SearchDataCenter.com


October 09, 2013 - Proactive planning and evaluation can prevent common problems with IT outsourcing providers, keeping your data safe and ensuring your outsourcing venture is cost-effective.

 

Is Your Platform Secure? Really? by  IBM


July 17, 2013 - This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.

 

Is Your SAN Architecture Ready for Flash? by  Brocade


March 31, 2014 - This white paper looks at the performance gap caused by aging storage architectures, and the solutions that have brought both benefits and obstacles along the way.

 

Is your security as good as the cloud’s? by  Trend Micro, Inc.


October 04, 2011 - This paper examines the relative merits of Software-as-a-Service and Infrastructure-as-a-Service, as well as issues and risks to consider. View now to determine whether these models are likely to provide better or worse security than your current in-house security.

 

Is your storage "junk drawer" making DR inefficient? by  Dell, Inc.


March 20, 2013 - In this presentation transcript, Jon Toigo points out the drawbacks to a "back up everything approach" and explains how better storage resource management can improve the efficiency and effectiveness of DR plans.

 

Is Your Strategy as Smart as Your Customers? by  IBM


August 07, 2012 - In this white paper learn the Smart Commerce strategy developed by IBM, designed around customer needs, aspirations, and behavior. This paper goes in depth on each of the four key components of the strategy, demonstrating the work they've done with some of the top names in sports to deliver the Smarter Commerce experience.

 

Is your user management process getting you down? Improving efficiency and security through automation by  NetIQ Europe


May 02, 2011 - Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access.

 

ISACA PCI Compliance Symposium by  Intel


January 25, 2011 - As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.

 

ISC Corp. Case Study by  Emerson Network Power


July 07, 2009 - ISC Corp. needed a new data center that could efficiently meet current and future needs. Learn how Emerson Network Power and its Liebert power and cooling technologies helped to realize that goal.

 

iSCSI for TL-Series Tape Libraries by  Dell, Inc.


September 30, 2008 - To supplement the growth in iSCSI SANs, Dell has introduced an iSCSI-to-SAS bridge card for the TL-series of tape libraries. This allows a customer to directly attach a tape backup target to their iSCSI 1Gb Ethernet SAN with little to no degradation in transfer speed. This white paper explores this setup and configuration.

 

ISCSI SAN Boot - Simplifying Server Operations On SANS by  Dell, Inc.


March 25, 2009 - Storage area networks (SAN) deliver consolidated storage and advanced storage management features. This paper explains the benefits of three different server boot operations provided by one advanced SAN configuration. It counsels that you should weigh the benefits and drawbacks of each before committing your organization's storage system to one.

 

ISCSI SAN BOOT - Simplifying Server Operations on SANS by  Dell, Inc.


July 01, 2008 - Storage area networks (SAN) deliver consolidated storage and advanced storage management features.

 

iSCSI SAN eGuide by  Dell | EMC


January 25, 2007 - For many businesses, iSCSI is becoming an attractive SAN option because of its lower cost, easier maintenance and simpler management over Fibre Channel. This guide from SearchStorage.com provides a detailed overview of iSCSI, tips for deplo...

 

iSCSI SAN Remains Strong After a Decade by  Dell, Inc. and Intel®


June 04, 2012 - This year marks the 10th anniversary of iSCSI SANs! Check out this expert E-Guide to learn why iSCSI SAN performance remains strong after 10 years, and why iSCSI SAN is cheaper and less complicated than Fibre Channel.

 

iSCSI vs. Fibre Channel: Three Reasons Not To Choose Either by  Coraid


April 29, 2011 - Fibre Channel and iSCSI storage systems are not delivering the price-performance and agility at the storage layer required to keep up with the new virtualized compute layer. This paper explores a third storage networking technology, Ethernet SAN, and why you don’t have to choose between iSCSI and Fibre Channel.

 

iSCSI: Superior Storage for Virtualization by  Dell, Inc. and Intel®


March 31, 2007 - iSCSI technology provides superior manageability to Fibre Channel for virtualized environments. Specifically, iSCSI lets users in virtualized environments utilize all the functionality available to non-virtualized systems.

 

iSensor specifications by  Dell, Inc.


May 18, 2011 - Organizations need advanced security technology, strong security expertise and 24x7 vigilance to safeguard their networks and IT systems. This data sheet offers an overview and specifications of Dell SecureWorks’ proprietary network intrusion prevention appliance, iSensor. Learn about its key features and how it can protect your networks.

 

ISG Outsourcing Index (EMEA) by  ComputerWeekly.com


April 22, 2013 - The ISG Outsourcing Index provides a quarterly review of the latest sourcing industry data and trends.

 

ISILON AT VMWORLD 2010 by  Isilon Systems


August 06, 2010 - Please join us at VMworld to learn how Isilon can simplify your storage environment and maximize your investment in virtualization.

 

Isilon Scale-out NAS for Virtualisation by  Isilon Systems UK


December 01, 2009 - Simplicity at Scale: In the same way that virtualisation has eliminated server sprawl, Isilon Scale-out NAS eliminates storage sprawl and provides a superior solution for virtualised environments. Read this solution brief to learn more.

 

ISM Essentials Guide – Threat Management by  SecureWorks


December 18, 2012 - In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.

 

ISM December 2012 by  SearchSecurity.com


December 07, 2012 - In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.

 

ISP Selectel Competes Internationally with Optimized Cloud Hosting by  Intel


March 31, 2013 - In this one page success brief, you will learn how Russia's largest provider of data center services speeds up its cloud hosting with solid state drives.

 

ISSU: A Planned Upgrade Tool by  Juniper Networks, Inc.


November 25, 2008 - This paper describes the selection of an ISSU design, which requires a comprehensive approach that considers various permutations of redundant and non-redundant router architectures.

 

Issue Tracking in an Agile Development Environment by  CollabNet


October 04, 2010 - The term "issue tracking software" is often associated with bug trackers. Yet in software development, the definition of an "issue" is much broader. As more organizations embrace Agile methods for development, they’re turning to agile project management tools to help manage the many issues that arise during the course of a software release cycle.

 

ISVs, "This One's for You" by  AppZero


March 04, 2009 - Virtual machines and virtual appliances have successfully transformed data center operations. AppZero Virtual Application Appliances extend that transformation to server applications- Linux, Unix, and Windows. This paper explains Instant POCs, simplified implementations, and a cloud friendly slide to the SaaS model.

 

IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection by  Webroot


December 31, 2012 - In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.

 

IT Administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot Secure Anywhere by  Webroot


August 06, 2012 - The antivirus protection Doris network was using created problems and slowed the productivity of employees. Fortunately, Webroot offered an efficient and effective solution. Learn how Webroot remedied the inaccurate and difficult to manage reports by reading this informative resource.

 

IT and Analyst Testimonials: TCO Considerations for PC Refresh and Intel vPro Technology by  Intel Corporation


May 27, 2009 - In this video IT professionals from the Symantec ManageFusion Conference discuss how PC refresh and Intel vPro technology helps minimize total cost of ownership.

 

IT as a Competitive Weapon: Gain Speed, Agility and Cost Efficiency with Your IT Infrastructure by  SAVVIS


December 30, 2011 - Uncover the many pressures on the IT infrastructures of financial services organizations today and learn why ridding your organization of the burden may be your key to achieving the agility, speed, and reliability you need from an IT infrastructure.

 

IT as a driver of M&A success by  ComputerWeekly.com


March 09, 2012 - IT considerations are not given adequate attention or rigour in the due diligence prior to mergers and acquisitions, this report from Ernst & Young reveals.

 

IT as a Service is the IT of the Future by  Citrix


November 08, 2013 - This engaging webinar looks at how, with the cloud, IT is transitioning from basic support to a more integral and user-facing service with a catalog of applications that users can select for themselves from one simple user interface.

 

IT as a service provider: Accelerating business results by  Dell Software


October 23, 2013 - In this resource, learn how you can increase collaboration between business and IT, with a multi-cloud management technology. Read on to discover how it enables IT to take and maintain control over cloud operations, while seamlessly meeting all the needs of business users.

 

IT as a Weapon: Performance, Value, and Protection for VMware View Deployments by  FalconStor Software


October 25, 2010 - In the past few years, there has been a huge acceleration in the interest in and demand for Virtual Desktops, and for very good reasons. Despite the many benefits, however, there are also many challenges associated with Virtual Desktops. Watch this webcast to hear David Shyu discuss the benefits and challenges of Virtual Desktop Infrastructure.

 

IT at the Speed of Business: Why Spreadsheets No Longer Cut it for Strategic Executives by  Innotas


June 30, 2011 - In today’s competitive market, businesses need their IT departments to make the best use of limited budgets to meet the most critical business needs. Learn how project and portfolio management (PPM) can effectively align IT and business goals for long-term success.

 

IT Audit Report - EMC IT: Leading the Transformation by  EMC Corporation


March 01, 2013 - A case study of EMCs adoption of cloud computing over the last ten years, this whitepaper documents EMC's advances in cloud computing and the resulting dramatic benefits in company-wide productivity.

 

IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions by  Cisco Systems, Inc.


November 19, 2010 - Businesses increasingly use IT automation tools to meet the challenge of managing their data centers. This document describes two types of IT automation software: enterprise job scheduling and run book automation (RBA). It explains how each solution helps to improve efficiency and reduce risks and when to use each solution and when to combine them.

 

IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions by  Cisco Systems, Inc.


July 28, 2010 - A job scheduler is responsible for routinely managing thousands—and in many cases, tens of thousands—of individual mission-critical business processes every day. This evaluation guide provides an in-depth overview of job scheduling capabilities that companies rely on to operate their businesses successfully.

 

IT Automation: Support and Improve Business Innovation by  Cisco Systems, Inc.


July 28, 2011 - This white paper provides a deeper understanding of IT automation. Obtain a detailed definition of this concept and gain insight into the areas it comprises and its successful elements.

 

IT Benefits of an Integrated Solution by  Centennial-Software


July 01, 2008 - View this webinar to find out how Enteo Client Lifecycle is being added to HEAT, Remedy, and Footprints as well as other Service Desk Platforms.

 

IT Best Practices: To Support or Not Support Consumer-Owned Smartphones by  Zenprise


March 31, 2009 - Discover why mobile service is vital to your overall messaging infrastructure and mobile management strategy as you uncover how to better support consumer-owned smartphones in your organisation.

 

IT Best Practices: To Support or Not Support Consumer-Owned Smartphones by  Zenprise


October 20, 2011 - This white paper outlines current and future implications of consumer and enterprise mobile devices (especially when it comes to messaging), and how they can and will impact your organization. In addition, learn what you can do to prepare your business to ensure high service levels for smartphone users.

 

IT Briefing - Desktop and Application Virtualization: Getting Started by  Citrix


January 30, 2009 - In this document Barb Goldworm, President, Founder and Chief Analyst of Focus, explains the benefits for desktop and application virtualization.

 

IT Briefing: Breakthrough economics for your business: DB2 pureScale & Smart Analytics Systems on IBM servers powered by Intel Xeon processors by  IBM and Intel


October 27, 2010 - IT needs tools that deliver real-time information that informs the interactions of people, processes and applications throughout the enterprise. In this IT Briefing, Intel and IBM systems experts Mitch Shults, Jim Lawrie, and Paul Awad discuss analytical and transactional solutions that drive faster and smarter business decisions.

 

IT Briefing: Desktop Virtualization for Mobile Users by  Citrix


August 31, 2010 - In this IT Briefing, learn how to extend the benefits of desktop virtualization to mobile users. Discover a tool that enables users to achieve the benefits of virtual desktops through laptops. Learn about the advantages to this approach, including improved security and flexibility.

 

IT Briefing: Efficient SAN-Based Tape Encryption by  Cisco Systems, Inc.


December 16, 2008 - This document discusses the protection of stored data, particularly the data that resides on backup tapes.

 

IT Briefing: How to Optimize ETL for Demanding Data Environments by  Syncsort


October 01, 2008 - This document is based on a Syncsort/TechTarget Webcast entitled "How to Optimize ETL for Demanding Data Environments."

 

IT Briefing: Is JD Edwards EnterpriseOne Right for Your Business? by  Oracle Corporation


January 07, 2009 - JD Edwards EnterpriseOne is a comprehensive and highly integrated suite of core business applications including things like financials, manufacturing, distribution, supply chain management, human capital management and so forth.

 

IT Briefing: MDM Challenges: Driving Change in People, Process, and Politics by  Pitney Bowes Group 1 Software


September 01, 2008 - This document first establishes what master data and Master Data Management (MDM) mean and then discusses the nontechnical organizational and operational challenges associated with introducing an MDM program.

 

IT Briefing: SIEM 3.0: The Next Generation of Security and Compliance Monitoring by  ArcSight, an HP Company


October 15, 2008 - Read this IT briefing to learn more about interesting trends in the security information and event monitoring (SIEM) industry.

 

IT Budget Strategy in a Down Economy: Stop Buying Storage! by  Symantec Corporation


January 15, 2009 - With the current downturn in today's economy, organizations are reluctant to spend any more money than absolutely necessary. Read this paper to learn how Symantec is uniquely able to deliver products and solutions with the immediate ROI that the current financial situation demands.

 

IT Checklist: 5 tips to achieve cloud, virtualization nirvana by  VMware, Inc.


April 19, 2013 - This e-book presents 5 essential tech tips for IT leaders preparing to take their first step toward a virtualized infrastructure.

 

IT Connects Customers to Brands by  Cisco Systems, Inc.


August 16, 2010 - Paul Gillin, author of three social media marketing books, reveals how CIOs are becoming the designated guardians of intellectual property. As the use of social media tools grows, Gillen recommends how a CIO can stay in front of the widespread access and create enhanced customer experiences.

 

IT Consolidation with VMware and Dell EqualLogic iSCSI SANs by  Dell and VMware


May 14, 2009 - Dell EqualLogic™ PS Series iSCSI SANs help to reduce the cost and complexity of IT Consolidation and uniquely integrate with VMware® Infrastructure to enable the fully virtualized IT environment.

 

IT Consolidation with VMware and Dell Equallogic ISCSI SANS by  Dell, Inc.


April 03, 2009 - Read this paper to learn how Dell EqualLogic™ PS Series iSCSI SANs can help to reduce the cost and complexity of IT Consolidation and uniquely integrate with VMware® Infrastructure to enable the fully virtualized IT environment.

 

IT Consulting Company Harnesses Tool to Better Facilitate Client Migrations by  Vision Solutions


April 04, 2014 - This white paper dives into a case study of an IT consulting company that helps clients migrate servers, both physical-to-virtual and virtual-to-virtual migrations. Read on to find out how this company was able to harness a tool that automated and simplified the job, thus reducing the cost and eliminating the possibility of human error.

 

IT Convergence Made Easy by  HP and Intel


January 31, 2014 - Check out this exclusive resource to find out how you can make IT convergence easy with a little help from HP.

 

IT Cost Savings with Information Governance - Gartner Research by  IBM


April 17, 2012 - In this Gartner analysis, find out how Cisco transitioned from an underperforming records management system to an information governance strategy. Discover the benefits they experienced from this switch, and best practices to help you make your own move to information governance.

 

IT Courseware by  SkillSoft Corporation


SkillSoft's IT Skills instruction is designed to encourage and prompt frequent learner interaction with the course content. SkillSoft maintains courseware integrity and effectiveness by offering a balance of thorough instruction, challenging practice exercises and quizzes.

 

IT Decision Checklist: Antimalware by  ESET


October 27, 2011 - Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.

 

IT Decision Checklist: Antimalware by  ESET


June 14, 2010 - Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

 

IT Decision Checklist: Messaging Security by  Guidance Software, Inc.


March 03, 2010 - Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

 

IT Decision Checklist: Remote Access by  VirtualArmor


March 19, 2010 - The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.

 

IT Decision Checklist: SIMs and Log Management by  LogLogic, Inc.


January 05, 2010 - In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.

 

IT Decision Checklist: Virtual Desktop Infrastructure Security by  Astaro


February 15, 2011 - VDI presents enterprises with dynamic opportunities to improve security. Check out this e-guide to learn what those are and receive guidance on evaluating VDI security products.

 

IT Decision Checklist: Virtual Desktop Infrastructure Security by  Trend Micro


November 02, 2010 - Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.

 

IT Download - Orion Network Configuration Manager (NCM) by  SolarWinds, Inc.


February 25, 2009 - Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies.

 

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4 by  Symantec Corporation


March 13, 2009 - With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.

 

IT education in Scandavia by  ComputerWeekly.com


March 15, 2013 - Learn how Scandanvian educators are capitalising on IT advances to help children learn in this Computer Weekly report.

 

IT Excellence: Achieving Optimised Business Outcomes by  SAP AG


February 01, 2007 - Information technology is ubiquitous in organizations, but what distinguishes top-notch IT from merely adequate IT? Read this article written by the Economist, to learn how leading companies enable IT to perform optimally.

 

IT Executive Guide to Security Intelligence by  IBM


February 24, 2011 - In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security.

 

IT Governance in an IBM Lotus Software Environment by  Sherpa Software


January 16, 2009 - This document describes concepts and definitions for governance, elements of governance, distinguishing myth from reality, approaches that go beyond "just good enough", control frameworks etc.

 

IT governance: enabling high performance in turbulent times by  IBM


February 13, 2009 - This paper explains how CIOs can use governance best practices to mitigate the depth and duration of performance declines that often accompany periods of change and innovation. It will clarify what governance is - and isn't - and articulate how CIOs can begin to improve governance within their organizations.

 

IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs by  Lumension


May 11, 2009 - This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management.

 

IT Handbook : Smartphones & Tablets in the Enterprise by  BlackBerry


April 10, 2012 - This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.

 

IT Handbook: Beyond PC’s: Navigating the New End User Client Landscape by  SearchVirtualDesktop.com


March 15, 2013 - Access this expert guide to get an in-depth understanding of the various kinds of mobile devices that your environment needs to be able to support. Learn how trends such as consumerization and bring your own device (BYOD) can be utilized to boost productivity, mobility and efficiency.

 

IT Handbook: Cloud Computing Security Up Close by  Intel


July 05, 2011 - This IT handbook is designed to help organizations make practical and strategic decisions about their own cloud security. Follow these guidelines to make sure that you've established policies that define data classification categories, data labeling mechanisms and data handling requirements.

 

IT Handbook: Cloud Development Platforms - Platform as a Service by  OnX USA LLC


February 01, 2011 - With Platform as a Service, developers are not particularly concerned with underlying operating systems because they access everything through the browser. The range of today’s PaaS offerings makes it easy to start developing in the cloud.

 

IT Handbook: Efficient Data Center Designs by  Dell, Inc. and Intel®


October 04, 2013 - Discover steps for a more energy-efficient data center, including cooling strategies, in this guide.

 

IT Handbook: Exchange Virtualization for VMware by  Dell, Inc. and Intel®


August 07, 2012 - VMware has received a lot of attention for its flexibility and reliability, but that doesn't guarantee it's the best hypervisor for your Exchange environment. This IT handbook examines how VMware compares to Microsoft and Citrix and discusses tools and tips to help you navigate the Exchange virtualization process with ease.

 

IT Handbook: Getting a Handle on Virtual Machine Sprawl by  EMC Corporation


June 20, 2012 - Virtual machine sprawl can creep up on a data center and sap resources. You can learn to spot it, control it and prevent VM sprawl altogether with tips and tricks from this expert e-book.

 

IT Handbook: Getting Over the Cloud Adoption Hurdle by  SearchCloudComputing.com


March 14, 2013 - This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.

 

IT Handbook: How to Choose a Hybrid Cloud Approach by  SearchCloudComputing.com


March 25, 2013 - Explore this IT handbook to help you determine a best-suit hybrid cloud strategy. Gain expert advice for managing your hybrid cloud once you've deployed and review the top five security challenges to keep in mind when implementing this cloud model.

 

IT Handbook: Is Cloud Based Storage Right For Your Company? by  SearchCloudComputing.com


July 10, 2013 - This expert handbook explores cloud-based storage in terms of cost, manageability, scalability, flexibility, latency/availability and more. It also looks at cloud-based backup and disaster recovery options in the cloud.

 

IT Handbook: Migrating Internal Apps to the Cloud by  Dell and VMware


April 06, 2011 - Moving to the cloud can be a thorny process for organizations that don’t take the time to prepare. Follow this step-by-step approach from concept to implementation to ensure that your cloud-computing roadmap leads to success.

 

IT Handbook: Network Considerations for VDI by  Cisco Systems, Inc.


September 27, 2012 - This expert handbook provides essential insight into network infrastructure preparations for transitioning to a virtual desktop infrastructure. Discover additional information in the areas of network resilience and redundancy, bandwidth considerations, and network services and security.

 

IT Handbook: Offsite Messaging Decisions for the Exchange Admin by  Mimecast


November 11, 2011 - Hosting Exchange Server off-site may appeal to businesses getting comfortable with the idea of cloud computing and its various advantages, but is it really a good idea?

 

IT Handbook: Planning a Server Refresh by  Dell, Inc. and Intel®


March 04, 2011 - Server buyers should consider the implications of vendor roadmaps and consolidation and look to capacity planning and objective tools when updating data center hardware. In this IT handbook you will learn the importance of a server roadmap, factors to consider in server selection, tips on server consolidation and capacity planning, and much more.

 

IT Handbook: Security Best Practices for Server Virtualization by  Intel


August 09, 2011 - Without the right plan for managing security, much of your proprietary data and  information is at great risk. Access this expert resource, from the editors at SearchServerVirtualization.com, to learn the essential best practices for maintaining security in your virtualized data center.

 

IT Handbook: Server Consolidation by  Oracle Corporation UK Ltd


December 06, 2010 - Server consolidation can save your organization money by increasing utilization rates and reducing power and cooling costs. Learn how capacity planning and virtualization technologies can help you meet your server consolidation goals.

 

IT Handbook: The Microsoft Product Update Roundup by  Dell, Inc.


November 14, 2012 - Microsoft will release new versions of 12 of its products with an eye toward better integration of systems and applications that will brace environments for the cloud era. This special supplement covers the feature updates that could make a difference for your IT environment.

 

IT Handbook: The Promise and Perils of Open Source Clouds by  SearchCloudComputing.com


May 20, 2013 - In this handbook on open source and the cloud, we look at open source options, the benefits and liabilities, as well as the pros and cons of proprietary models. Explore some of the key issues shaping the market, the tools available and how data centers make use of and contend with open source issues.

 

IT Handbook: VM Automation in the Private Cloud - Enforcing Policies to Meet Compliance and Security by  OnX USA LLC


September 07, 2011 - To ensure your enterprise meets compliance and security standards for external audits, your security settings must be properly configured. This is even more important in the private cloud, which introduces a wealth of new security threats.

 

IT Handbook: Windows 8 Migration Station by  Dell, Inc. and Intel®


October 25, 2012 - This handbook presents best practices for moving to Microsoft's latest operating system, including assessing your organization's needs to determine whether Windows 8 is a good fit, which applications should move over, and what help is out there for your migration project and licensing.

 

IT Handbook: Windows 8 Migration Station by  Dell, Inc. and Microsoft


October 25, 2012 - This handbook presents best practices for moving to Microsoft's latest operating system, including assessing your organization's needs to determine whether Windows 8 is a good fit, which applications should move over, and what help is out there for your migration project and licensing.

 

IT hiring activity and salary changes for 2010 by  ComputerWeekly.com


February 15, 2011 - Our IT division recruits permanent and contract professionals into financial servicesfirms, including investment banks, hedgefunds and asset managers, and companies inthe commerce and industry and professional services sectors. We recruit business technologists from support to CTO level.

 

IT Hosting Perspectives in the Midmarket by  Vision Solutions


December 31, 2013 - This white paper summarizes a discussion had between a leading migration solutions provider, a leading hosting provider, and major customers of the hosting provider.

 

IT in Europe - May 2012 by  SearchNetworking.co.UK


June 15, 2012 - While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.

 

IT in Europe Virtual Data Centre Vol. 1, No. 3 Server Hardware and Refresh Cycle Options by  SearchVirtualDataCentre.co.UK


September 27, 2011 - Virtualization has come a long way, and now IT pros are tasked with keeping their virtual machines secure. This expert e-zine follows the evolution of virtualization and offers advice for developing an effective security strategy. Plus, find out what took place at VMworld 2011 within the virtualization and cloud arenas.

 

IT in Europe Virtual Data Centre Vol.1, No. 2 Virtual Infrastructure: Don’t Skip the Small Stuff by  SearchVirtualDataCentre.co.UK


July 18, 2011 - This expert e-zine, brought to you by SearchVirtualDataCentre.co.uk, offers advice for developing a successful virtualisation strategy. Discover key points to keep in mind and tips to help you avoid stumbling blocks along the way.

 

IT in Europe: Adopting an Application-Centric Architecture by  SearchNetworking.co.UK


November 03, 2011 - Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view.

 

IT in Europe: Breaking the Code: Are passwords destined for obscurity? by  SearchSecurity.co.UK


November 10, 2011 - This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.

 

IT in Europe: Network Evolution E-Zine: How Networks are Adapting to Virtualisation by  SearchNetworking.co.UK


September 07, 2011 - This Network Evolution E-Zine examines new tools for managing networks that support virtualisation and automating change and configuration management, network core services, and daily administrative tasks.

 

IT in Europe: Networking Edition: Wired and Wireless: Can you achieve an integrated network? by  SearchNetworking.co.UK


June 01, 2011 - This European edition of Network Evolution E-Zine discusses the myths surrounding integrated wired and wireless LANs, security considerations, and wireless and mobile technology trends the UK should be on the lookout for.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts