M Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
M Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
 

Midrange Unified Storage Array Buyer's Guide by  NetApp


October 17, 2013 - This buyer's guide equips you in two key ways – helping you evaluate midrange unified storage arrays – and providing a set of scores and rankings across the multiple features on each product as well as data sheet for each midrange unified storage array.

 

Midsize businesses enhance performance and reduce costs by  IBM and Intel


June 06, 2011 - Read this white paper to see how IBM® System x® and IBM BladeCenter® servers can offer an outstanding platform for virtualization and consolidation.

 

Midway Independent School District Case Study: Power to the Teachers by  Dell, Inc.


February 01, 2010 - Midway Independent School District sought to gain control over server sprawl and implement a consolidated solution for growth. Read this case study to learn how Dell servers, storage and Intel technology provided a firm foundation for education applications, growth and 50% power and cooling savings.

 

Migrate from AIX confidently with Linux by  Red Hat


April 02, 2014 - This whitepaper explains more about the reasons to migrate to Linux, including increasing hardware choices and moving commodity platforms, as well as why Red Hat Enterprise Linux could be exactly the platform you need.

 

Migrate from HP-UX and Standardize with Confidence by  Red Hat


April 02, 2014 - This whitepaper explains more about the reasons to migrate to Linux, including increasing hardware choices and moving commodity platforms, as well as why Red Hat Enterprise Linux could be exactly the platform you need.

 

Migrate From Unix To Linux In Six Steps by  Red Hat and JBoss


August 10, 2009 - CIOs are increasingly aware that the Linux® platform offers a low-risk, robust, and value-for-money alternative to traditional UNIX® platforms. This whitepaper will list and describe a simple, six-step process for migrating from UNIX to Linux.

 

Migrate from ws2003 to ws2012 in one step by  AppZero


May 24, 2013 - This demonstration video details the latest features of an application migration tool that enables simplified, streamlined app migration from the data center to the cloud. See how this platform enables a one-step migration from ws2003 to ws2012.

 

Migrate Oracle Database Lite to Sybase SQL Anywhere by  Sybase, an SAP company


March 31, 2011 - Oracle Database Lite Client, Branch Office and Web-to-Go have been removed from Oracle's technology price list and are no longer being actively developed.  Now you are faced with a migration project.

 

Migrate Oracle Forms to the Web: Making the Business Case by  CipherSoft, Inc., A subsidiary of Unify Corp.


July 20, 2009 - There are many reasons organizations are currently migrating their Oracle Forms applications to the Web. This white paper will discuss those issues and review the challenges that can occur during a conversion project. As well, it will discuss the options for migrating Oracle Forms, including moving to Forms 10g and migrating to Java.

 

Migrate your Legacy IBM Database Environment to the latest Oracle Technologies by  Oracle Corporation


June 25, 2012 - Even the most effective servers will eventually have to be replaced once they reach the end of their lifecycles. This white paper explores key factors to consider when evaluating new servers for your business and offers exclusive advice for executing a seamless Linux migration.

 

Migrating Apps to the Cloud by  SearchCloudComputing.com


June 13, 2013 - This handbook considers best practices for the migration of applications to be sure that an organization can take advantage of the benefits of the cloud without undermining server and application performance and  also addresses legacy apps and when it might make sense to rebuild or replace such highly customized applications rather than move them.

 

Migrating Away From Windows XP: A Survey Of IT Professionals by  Dell and Microsoft


March 25, 2014 - This whitepaper examines a survey of over 450 IT professionals dealing with XP end-of-support, providing a good overview of migration statuses and the challenges of migration.

 

Migrating Data for a CRM Technology Upgrade by  SearchCRM


July 15, 2013 - In this handbook, get tips to ensure CRM data migrations go smoothly, and explore how proper planning, data profiling, and data quality checks can help you achieve a cost efficient, effective CRM upgrade.

 

Migrating from IBM POWER Server Silos to HP BladeSystem and Converged Infrastructure by  HP & Intel®


February 09, 2011 - This paper looks at the options IT managers have for hosting enterprise applications when replacing end-of-life POWER 4 or 5 servers. It compares an HP Converged Infrastructure, based on HP Integrity and Proliant server blades, to approaches based on IBM POWER. It also addresses customer options for business-critical application migration.

 

Migrating from Netware to Active Directory by  Dell Software


July 01, 2010 - In this new Quest Software white paper, get the facts on a safe and secure migration from NetWare. Learn the reasons why now really is the best time to put a migration plan together, and discover how automated migration tools make the job easy, accurate and fast. Read this valuable white paper today.

 

Migrating from Solaris to SUSE® Linux Enterprise Server by  SUSE


May 04, 2012 - Access this white paper to discover real-world examples of top businesses that have benefitted from Linux migration. Learn more about this ever-growing migration trend.

 

Migrating from UNIX*/RISC* to Red Hat Enterprise Linux®on Intel® processor-based Servers by  Red Hat and HP


December 31, 2009 - This white paper provides high-level guidelines for assessing cost and complexity of a Linux migration and provides tips for planning a smooth, successful and strategic transition. Discover how your organization can add value to its IT infrastructure with the use of open source software.

 

Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers by  Red Hat and Intel


August 10, 2009 - Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition.

 

Migrating from Windows XP: Understanding the Challenges and How to Mitigate Them by  Dell and Microsoft


October 01, 2013 - This paper describes how effective Windows migration projects can be broken down into four manageable phases, and how industry best practices and products can reduce the time and disruptions caused by a migration from XP to Windows 7 or 8, as well as provide IT more time and resources to focus on more strategic initiatives.

 

Migrating JEE Applications to SpringSource tc Server by  VMware, Inc.


March 02, 2011 - This white paper focuses on the migration decision processes for determining whether to migrate your applications or portions of your applications from commercial JEE servers to SpringSource tc Server.

 

Migrating Millions to IP: A Mission Impossible? Not with a Migration Control Center by  Alcatel-Lucent


January 01, 2007 - This paper describes the key business drivers for the creation and operation of the MCC, the critical functions of the MCC, and the basic principles for establishing an effective MCC organization.

 

Migrating Mission-Critical Environments to Intel Architecture by  Intel


August 09, 2011 - Without the most up-to-date technology infrastructure, your organization will struggle to meet the changing demands of its internal and external users. Take a look at this exclusive resource to learn how Intel migrated its entire internal infrastructure to the Intel Architecture for a revitalized computing experience.

 

Migrating Oracle Application Setups – The Stat Way by  Dell Software


May 31, 2012 - Changes to your Oracle E-Business Suite applications directly affect your company. Therefore, having an effective change management and version control process is critical. In this paper, see how an impossible task – versioning and managing Oracle setup object with third-party tools – is now a reality.

 

Migrating SQL 2000 to SQL 2008- a Dell Deployment Guide by  Dell, Inc.


April 27, 2009 - This Deployment Guide reviews the approach that Dell and Principled Technologies recommend for a tested and validated migration of SQL Server 2000 databases to SQL Server 2008 on the Dell PowerEdge R900 server and Microsoft Windows Server 2008 Enterprise.

 

Migrating Tier 1 Application Workloads to AWS by  F5 Networks


April 24, 2013 - This whitepaper covers the hesitation many organizations feel about putting Tier-1 applications in the cloud and offers up some solutions.

 

Migrating to 40 Gigabit Ethernet and Beyond: A well planned migration by  SearchNetworking.com


December 07, 2012 - This edition of "Network Evolution" focuses on this progression, talking about the transition by organizations to 10 and 40 GbE switches, as well as the prospect of 100 and even 400 GbE switches. Read on to learn where this technology is going - and what it means for your business.

 

Migrating to Microsoft from Lotus Notes®? Not so Fast! by  Teamstudio, Inc.


April 01, 2008 - There is some good information presented in this document and no doubt you would like to get this information for your existing applications, even if you are not planning a migration.

 

Migrating to SharePoint 2010? - Ten Things I’ve Learned the Hard Way (So You Don’t Have To) by  Idera


June 20, 2011 - While SharePoint 2010 offers your enterprise a fabulous tool for document sharing and collaboration, the migration process can bring some difficult challenges. Read this exclusive resource to learn the top 10 challenges surrounding an upgrade to SharePoint 2010.

 

Migrating to the Cloud - Step 1: Outsource Exchange by  Dell Software


July 13, 2011 - The cloud can provide flexibility, value and time and cost savings to businesses of any size. Which cloud scenario is the best fit for your business? In this Quest white paper, discover the easiest way to get your cloud migration rolling, and how to prepare and simplify your migration. Read the paper today.

 

Migrating to the New Dell Management Console by  Dell, Inc. and Intel®


May 19, 2009 - Read this white paper to learn how the Dell™ Management Console Powered by Altiris™ from SymantecTM centralizes multiple aspects of systems management into a single easy-to-use tool.

 

Migrating to Windows 7: How to Select a Provider for PC Online Backup and Recovery by  Iron Mountain


January 26, 2011 - In addition to implementing strategic initiatives, IT has the basic function of keeping workers productive. With many enterprises migrating to Microsoft Windows 7, it is important to consider a backup provider that supports Microsoft’s latest platform. Read this white paper to learn more.

 

Migrating to Windows 7? Technology Points to Consider by  Novell, Inc.


September 22, 2010 - This white paper examines how endpoint management and related technologies can be used to streamline the migration process and discusses the role that Novell plays in this increasingly important market.

 

Migrating Users from Physical Workstations to XenDesktop by  Citrix


October 05, 2009 - This document provides recommendations and best practices for moving a user’s data from their physical corporate workstations into the virtual Citrix XenDesktop environment.

 

Migrating enterprise apps to the Cloud by  AppZero


May 30, 2013 - Download this white paper to explore the top strategies and options when migrating your enterprise applications from the data center to the cloud along with the core benefits and challenges.

 

Migration and Security in SOA by  Torry Harris Business Solutions


March 03, 2009 - It is estimated that 90% of most external attacks take advantage of known vulnerabilities and misconfigured systems. This white paper provides comprehensive guidance on integrating security and access-control best practices into your SOA and WSOA initiatives. It includes such topics as access control and SOA security implementation models.

 

Migration Considerations for Windows Server 2012 by  Dell and Microsoft


October 10, 2013 - This whitepaper will describe the support available for Server 2012 and explain other important considerations to keep in mind while upgrading your server from previous iterations of Microsoft Operating System to the 2012 version.

 

Migration Considerations for Windows Server 2012 by  Dell and Microsoft


November 16, 2012 - Access this white paper to learn more about Dell's support for Microsoft Windows Server 2012 and other essential things to consider when upgrading your servers from a previous Microsoft operating system. Also discover the advanced networking, storage and security features offered.

 

Migration to DOCSIS 3.0 by  Motorola, Inc.


December 23, 2008 - Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.

 

Migration to Windows 7 with Immidio Flex Profiles by  Immidio


January 15, 2011 - This white paper discusses how to use Immidio Flex Profiles for making user profiles cross-platform compatible to Windows XP and Windows 7, both for migration projects and side-by-side scenarios using multiple versions of Windows simultaneously.

 

Million Dollar HIPAA Penalties for Healthcare by  Absolute Software


November 11, 2013 - The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.

 

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud by  Mimecast


August 17, 2010 - The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.

 

Mimosa NearPoint for Microsoft Exchange Server by  Mimosa Systems


October 01, 2008 - This white paper describes how NearPoint complements and extends Exchange 2007 and how it adds important benefits for compliance, storage management, and recovery.

 

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security by  Tripwire, Inc.


February 08, 2011 - Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.

 

Mine valuable data and achieve new levels of productivity by  CommVault Systems, Inc.


March 31, 2014 - This case study talks about the challenges one organization faced when they were attempting to keep up with growing storage demands while also growing as a business. The solution they implemented provided efficient storage capabilities with a powerful search functionality to provide easy access to valuable information.

 

Minimize customer churn with analytics by  IBM


February 07, 2014 - Access the following white paper to uncover how predictive analytics can effectively minimize customer churn through analyzing predictive patterns. Learn how with this technology you can stand to gain better overall insights to market patterns, areas of focus, and much more.

 

Minimize LAN Switch Tiers to Reduce Cost and Increase Efficiency by  Juniper Networks, Inc.


November 17, 2009 - Established LAN design practices were created for an environment of limited switch performance. Today's high-capacity switches allow new design approaches, thus reducing cost and complexity in campus and data center LANs. Read this Gartner report to learn about maximizing LAN performance by minimizing LAN switch Tiers.

 

Minimize the Impact of Patch Tuesday by  Shavlik Technologies


December 12, 2007 - Register for this webcast held monthly on the Wednesday after Patch Tuesday starting at 12:00 PM, ET. Get information on the latest Microsoft Patches and how they could affect you and your network environment.

 

Minimize the Impact of Patch Tuesday by  Shavlik Technologies


October 10, 2007 - Attend this monthly webcast to learn about Microsoft Patches and which are the most relevant to protecting your network environment.

 

Minimize the Impact of Patch Tuesday by  Shavlik Technologies


November 14, 2007 - Register for this webcast held monthly on the Wednesday after Patch Tuesday starting at 12:00 PM EDT. Get information on the latest Microsoft Patches and how they could affect you and your network environment.

 

Minimize the Impact of Patch Tuesday by  Shavlik Technologies


November 14, 2007 - Get information on the latest Microsoft Patches and how they could affect you and your network environment.

 

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications by  Paymetric, Inc.


January 01, 2008 - Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.

 

Minimize the Risk of Your Cloud-Based Services by  Hewlett-Packard Limited


April 30, 2012 - This guide dives into how you can minimize the risk of your cloud-based services and reap the benefits of a fully protected cloud.

 

Minimize your financial institution’s risk with solutions from IBM by  IBM


August 04, 2011 - Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.

 

Minimizing Code Defects to Improve Software Quality and Lower Development Costs by  IBM


March 13, 2009 - This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code.

 

Minimizing Distressed Shipments by  IBM


December 18, 2010 - Read this case study to learn how Lombardi Teamworks® helped a major computer manufacturer gain a complete understanding of the distressed shipment process and orchestrate efficient responses to returns. Read on to learn to learn how this large computer manufacturer saved 2 million dollars per quarter with Lombardi Teamworks®.

 

Minimizing Downtime in SAP Environments by  Sun Microsystems, Inc.


October 01, 2008 - Learn how to use standard features of Solaris 10, Containers and Zones and ZFS to optimize your SAP data centre, virtualize your infrastructure and drive down cost and raise flexibility.

 

Minimizing the Risks of Data Loss: Why Centralized, Automated Protection is Critical by  IBM


February 28, 2011 - In this white paper, you will gain insight into a comprehensive, highly scalable software solution that gives you centralized, automated data protection to help reduce the risks associated with data loss.

 

Minnesota Wild Names Dell Compellent SAN "Most Valuable Player" by  Dell Compellent


September 09, 2011 - The Minnesota Wild’s six-month old iSCSI storage solution could no longer keep up with the growing data needs of concession vendors. Read this white paper to learn how the Wild successfully implemented Fluid Data technology to solve the problem.

 

Minority Report: How science fiction is becoming reality by  ComputerWeekly.com


March 02, 2011 - Customers are urgently looking for the WOW Effect to create awareness and transfer an innovative image. Most digital signage to date has been a video feed or a slide-show, where it is almost like a poster replacement.

 

MIPS Core PSP by  CriticalBlue


June 17, 2010 - This application note provides a detailed tutorial of how to use the features of the MIPS Core PSP within Prism. End users who are either considering migrating existing software applications onto the 34K or 1004K core, or who already use those cores but wish to optimize their operation are the target audience for this paper.

 

Mirapoint RazorSafe™ by  Mirapoint Software, Inc.


September 18, 2009 - RazorSafe operates in a low-risk, passive mode and archives all emails, while ensuring minimal impact on your email infrastructure. RazorSafe uses open, standard protocols (POP, IMAP, SMTP) to archive all emails sent or received from the email server.

 

MIS Saves Bank 30 Percent Man Hours and Substantial Operational Cost in First Year by  Microsoft Corporation India Pvt Ltd


August 01, 2009 - Read this case study to learn how Microsoft SQL Server 2008 gave Lakshmi Vilas Bank a competitive edge by speeding up the rate at which the bank provides information to internal stakeholders, customers and government departments.

 

Missing PDF Fonts: How Metadata Affects Text Optimization by  Amyuni Technologies


September 18, 2009 - This document is the second in a series of white papers that will explore the problem of missing font information in PDFs. Since its inception, the PDF has revolutionized the way individuals and businesses communicate and exchange information. The promise to maintain informational integrity and display content consistently across many platforms.

 

Mission Cloud: Jumpstart IT as a Service by  CSC


January 12, 2012 - This webcast is designed to help companies design and execute a successful cloud deployment plan. Obtain cloud survey results from your peers and discover key questions to consider as you get started.

 

Mission Critical Converged Infrastructure Resource Center by  HP & Intel®


June 08, 2010 - This interactive resource center examines the benefits of a centralized management approach.  Discover why a platform that integrates facilities and key infrastructure components is more cost-effective than traditional data silos.

 

Mission Critical Java by  Oracle Corporation


November 04, 2008 - Read this white paper to learn how you can achieve extreme and predictable performance with Java and real-time, real-world memory leak detection and application performance analysis.

 

Mission Critical Services by  Hewlett-Packard Company


December 01, 2008 - In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.

 

Mission impossible? Data governance process takes on ‘big data’ by  SAP America, Inc.


December 10, 2012 - The importance of governing big data environments is just starting to take hold, and there are few prescriptions for how to do it right, let alone cost-effectively. This e-guide sheds light on the data governance process for big data and offers new insights from leading data management experts.

 

Mission Possible -- How HP conquers the demon of explosive structured data growth by  Hewlett-Packard Company


April 24, 2013 - How does your business contain the explosive data growth that is draining all financial and human resources? Application availability is critical to daily business operations, but they must also have a backup plan in place. Consult this white paper to learn more about how to manage structured data growth effectively.

 

Mission-Critical Converged Infrastructure Podcast Series by  HP & Intel®


May 09, 2011 - This podcast discusses the challenges that come with a mission-critical environment and the four characteristics of a converged infrastructure to meet the ever-changing demands of business.

 

Mistakes in Cloud Application Deployment by  SearchBusinessAnalytics


January 25, 2013 - This expert E-Guide explores the mistakes many organizations make when deploying apps in the cloud and describes how you can avoid making the same issues. In addition, learn why cloud integration is so complicated for today's testers.

 

Mistakes Made When Backup Up VMs & How to Prevent Them by  Symantec Corporation


September 07, 2012 - This expert E-Guide can help by outlining the 5 most common mistakes made when backing up VMs and how to avoid them.

 

Mitchells and Butlers: The boardroom view of IT by  ComputerWeekly.com


September 07, 2012 - Robin Young, COO Mitchells and Butlers and former CIO gives a candid appraisal of the boardroom's view of IT and offers tips to CIOs on building credibility with board members.

 

Mitigate Slow MySQL Queries and Accelerate Overall Query Performance to Gain New Competitive Platform Capabilities by  Akiban


May 30, 2012 - Read this white paper to learn about a new relational database from Akiban, a unified document and relational architecture that accelerates MySQL applications to ensure consistent and compelling performance for end users with no change to code, architecture or infrastructure.

 

Mitigate the Risks of File Sharing and BYOD with Private Clouds by  Accellion, Inc.


June 28, 2013 - This informative white paper examines private cloud solutions for file sharing and synchronization, discussing how a private cloud can help you realize the benefits that BYOD provides without having to expose your sensitive information to potential risks.

 

Mitigating DDoS Attacks with F5 Technology by  F5 Networks


July 19, 2013 - This exclusive white paper examines a set of solutions that can securely deliver applications while protecting the network, the session and the user, with mitigation technologies that map directly to individual DDoS attacks.

 

Mitigating Email Virus Attacks by  Cisco


June 30, 2013 - Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.

 

Mitigating Email Virus Attacks by  Cisco Systems, Inc.


April 21, 2014 - This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.

 

Mitigating Insider Threats by  IBM


August 14, 2013 - This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.

 

Mitigating Risk and Ensuring Compliance with EMC Documentum ApplicationXtender Retention Manager by  EMC Corporation


August 04, 2010 - Read this white paper to learn how to easily configure document retention and disposition policies in the background to mitigate risk and meet compliance goals.

 

Mitigating Risk in a Mobile World by  Symantec Corporation


September 05, 2012 - Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.

 

Mitigating Supply Chain Risk Using Collaborative Technology by  Infinity QS


May 01, 2007 - This whitepaper addresses the trends surrounding Supply Chain Risk Management (SCRM) and the strategies that manufacturers are using to mitigate risk from their supply network. It contains a case study about how one manufacturer is viewing real-tim...

 

Mitigating the Risks of IT Change by  Riverbed Technology, Inc.


December 30, 2011 - Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. Cascade quickly provides a complete and accurate inventory of the IT environment, including an understanding of how services and their underlying infrastructure impact the business.

 

Mitigating the Risks of Outsourcing by  Hewlett-Packard Company


November 06, 2013 - When opting for an outsourcing program, CIOs should check the reliability, financial stability and reputation of service providers, advices Shailesh Joshi, head of corporate IT at Godrej Industries. Get further outsourcing insights in this resource.

 

Mitigations for Mobile Phishing Problems on the iOS Platform by  SearchSecurity.com


May 03, 2013 - Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.

 

Mixed All-Flash Array Delivers Safer High Performance by  Dell India


August 08, 2013 - Access this lab report to uncover the key features of Dell Compellent which separates it from similar technologies, implementation recommendations and much more.

 

Mixed All-Flash Array Delivers Safer High Performance by  Dell, Inc.


August 08, 2013 - This resource details how automated tiering technologies have been enabled to move data between different types of flash based storage using a flash-optimized storage solution.

 

Mixed All-Flash Array Delivers Safer High Performance by  Dell, Inc.


August 08, 2013 - This white paper showcases a sale-out all-flash storage array that redefines the economics of enterprise storage by deploying a single platform for block and file with built-in efficiency, resiliency and intelligence to optimize your IT budget.

 

Mixed Company: Integrating SAP, Third-Party Software by  SearchSAP


March 28, 2013 - In this expert handbook, discover the latest challenges and responses to SAP and non-SAP integration as well as data integration between applications. Learn how software development is making projects such as these both more and less difficult.

 

Mixing Gigabit Ethernet and 10 Gigabit Ethernet in a Dedicated SAN Infrastructure by  Dell India


September 01, 2009 - The reference architecture illustrated in this article shows how enterprises may make the transition to 10GbE for storage using Dell™ EqualLogic™ PS Series arrays and Dell PowerConnect™ switches.

 

Mizuho information and research speeds up system development by automating test processes by  Hewlett-Packard Company


April 30, 2012 - Mizuho Information needed to improve the efficiency of financial system deployments and shorten development cycle times. To do this, they knew they needed to rethink their testing processes. In this case study, discover how Mizuho utilized a test automation tool to enhance their testing procedures without having to make drastic process changes.

 

Mobile "systems of interactions" driving business process innovation by  IBM


May 31, 2013 - In this white paper, get an overview of mobile systems, or "systems of interaction", including the business and technological challenges, as well as how these systems impact the application lifecycle.

 

Mobile Analytics for On-the-Go Decisions by  SAP America, Inc.


October 15, 2013 - In this brief video, explore how you can make intelligent decisions on the go with mobile applications and devices. Learn from a variety of use cases how you implement mobile applications in your enterprise.

 

Mobile Analytics Leader Bango Moves From SQL Server to Infobright for Faster Query Response, Lower Cost, and Reduced Administration by  Infobright, Inc.


November 18, 2010 - This informative case study from Bango takes a look at the implementation of Infobright into a large enterprise, and how this change has affected the cost effectiveness of this corporation.

 

Mobile app development made simple by  IBM


February 21, 2014 - Access this exclusive resource to learn about an application development program designed specifically for developing mobile applications. Read on to find out how easy the program is to install and use.

 

Mobile app development, JavaScript everywhere and “the three amigos” by  IBM


October 31, 2013 - Today's enterprise application developer must master a range of technologies, APIs and techniques that can be quite overwhelming. However, savvy developers can reduce their "concept count" for building mobile applications with the help of three tools.

 

Mobile Application Delivery: The Next Frontier by  SearchSecurity.com


February 03, 2014 - BYOD, plus virtualization and cloud computing, offer IT new ways to address mobile application delivery and mobile device security. A good mobile app plan includes all of them.

 

Mobile Application Development Center by  Microsoft


April 24, 2013 - Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.

 

Mobile Application Development for Enterprise Organizations by  Salesforce.com


May 31, 2012 - As more people become attached to their mobile devices, mobile application development should be high on your list of priorities as it may be the best way to reach your target audience. Read this expertly-compiled e-to learn how you can best develop your mobile applications to optimize their speed and reliability to surpass user expectations.

 

Mobile Application Development: Making It Easier For Developers by  SearchSOA.com


September 01, 2009 - Mobile applications have not only piqued the interest of developers, but also of the average cell phone user. Download this ebook and learn why.

 

Mobile Application Keeps KART Vans on a Roll by  AT&T Corp


October 03, 2011 - This case study shows how The Kings County Area Public Transit Agency uses mobile applications to increase the effeciency of their rural transit vanpool program.

 

Mobile Application Management in the BYOD Era by  SearchSecurity.com


March 29, 2013 - This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.

 

Mobile Application Security Best Practices to Protect Corporate Data by  SearchSecurity.com


July 11, 2013 - This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks.

 

Mobile Application Security from HP - Build security into your mobile applications by  Hewlett-Packard Limited


January 04, 2012 - Watch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment.

 

Mobile applications - Making anywhere access a reality by  Cisco Systems, Inc.


February 13, 2012 - Uncover how you can make anytime, anywhere access a reality for your mobile workforce. Also analyze costs of mobilizing applications and how to get those applications to your mobile devices.

 

Mobile Applications Before and After by  AT&T Corp


October 04, 2011 - This white paper takes a look at business processes before and after the use of mobile applications.

 

Mobile Applications That Fit by  BlackBerry


February 18, 2010 - The more employees rely on their BlackBerry® smartphones, the greater the need for enterprise applications that fit their, and the company's, specific needs. But IT organizations can't always do it on their own. This white paper covers some best practices and resources for creating mobile enterprise applications.

 

Mobile apps reach the busy customer by  SearchCRM


March 19, 2013 - In this expert e-zine, discover two key areas of app development in today's mobile climate: delivering quality mobile customer service, and uniting front-end and back-end functionality. Also included is a case study of a mobile app that delivered user-oriented, ultra-simple service with outstanding results.

 

Mobile Apps Stores by  ComputerWeekly.com


March 09, 2012 - Juniper Research analyses the growing market for mobile apps in this report extract.

 

Mobile as a Platform for Business Service Innovation by  CA Technologies.


February 14, 2014 - This informative paper examines a mobile services management solution that can help your organization build a strategy to support and drive business service innovation.

 

Mobile Augmented Reality by  ComputerWeekly.com


February 02, 2011 - It is fair to say that AR (Augmented Reality) applications and services on the mobile remain in their infancy. Given that the first AR mobile browsers did not become available until June 2009, this is hardly surprising.

 

Mobile augmented reality opportunities for business by  ComputerWeekly.com


December 01, 2010 - The phrase “augmented reality” was coined by Boeing researcher Tom Caudell in the early 1990s to describe a digital display viewed through a headset  which guided workers through electrical wires in aircraft. The term has since gained currency and is now taken to describe digital information overlaid on the physical world.

 

Mobile Backup: Of Course There's an App for That by  CommVault Systems, Inc.


February 21, 2012 - Read this E-Guide today to learn how to utilize the PC as the center of your mobile universe, discover what mobile backup solutions are currently available today and learn about device-specific ultraportable backup technologies. Read on for more.

 

Mobile banking strategies - maximise your revenues by  ComputerWeekly.com


December 06, 2010 - Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”.

 

Mobile BI RTE Topic page by  IBM


January 21, 2014 - Access the following download page to uncover several downloadable applications that will enable your business to deliver your current BI and analytics solutions to your mobile device network.

 

Mobile BI: A Must Have in the New Mobile-First World by  MicroStrategy Incorporated


April 02, 2014 - "Anyone that uses BI has the need for mobile BI," said BI analyst Howard Dresner, president at Dresner Advisory Services. In this exclusive e-guide, learn more from Dresner and other mobile experts about why mobile BI is a must-have for forward-thinking businesses, and get advice on best practices for developing a mobile plan.

 

Mobile BI: Actionable Intelligence for the Agile Enterprise by  SAS


June 28, 2011 - This report describes how mobile devices can drive better BI. Find out how top performing companies have made mobile devices the primary platform for BI deployments.

 

Mobile BI: Empowering users at every level by  BeyeNETWORK


November 28, 2012 - In this expert resource, join tech guru Wayne Eckerson and he examines best practices for implementing mobile BI and the technologies and architectural approaches for building mobile BI systems. Read on for insights on many aspects of BI and recommendations for implementing BI applications.

 

Mobile Business Intelligence 101: Proven Strategies and Use Cases by  Information Builders


May 22, 2014 - The following white paper explores mobile business intelligence—what it is, how it's evolving, what applications exist, and how to address security concerns. Also gain access to real-world use cases, technology recommendations, and much more.

 

Mobile Business Intelligence: When Mobility Matters by  MicroStrategy Incorporated


January 24, 2011 - Mobile business intelligence is a process, not a project, and a journey rather than a destination. The case studies included represent two forms that mobile BI can take to empower the mobile worker and port existing applications. This paper discusses two different companies, their environments, reasons for going mobile and key success factors.

 

Mobile cloud computing vs. cloud computing in building or hosting mobile apps by  SAP America, Inc.


December 06, 2012 - Read this expert e-guide for explanations of some of the key differences between mobile and regular cloud computing, including the need for additional testing capabilities, the need to allow for disconnected operation, the need to be mindful of limited energy available on mobile devices, and more.

 

Mobile Collaboration from IBM - Support for Fast-Moving Businesses by  IBM


December 05, 2008 - Mobile business solutions & services keep employees on the go and in the loop.

 

Mobile Collaboration: Strategies and Challenges by  SearchSecurity.com


January 25, 2013 - This E-Guide from SearchUnifiedCommunications.com explores the challenges small screens present to mobile collaboration and unveils how UC strategies and vendors are responding to these issues.

 

Mobile computing strategies in manufacturing by  IQMS


January 08, 2013 - Understanding the challenges you'll face and finding the right role within your operations for mobile devices or applications will be crucial to the success of a manufacturing mobility initiative.Read this expert e-guide to understand the current state of the market for mobility in manufacturingand how it stands to shape up in the coming months.

 

Mobile Computing: Reshaping Application Modernization by  CSC


December 02, 2013 - As users continue to move to using mobile devices, businesses are being put under pressure to update their older applications.  This e-guide provides expert tips and best practices to approach mobile computing-driven application modernization.

 

Mobile Configuration Management Functions for Successful MDM by  Citrix Systems, Inc.


March 12, 2013 - This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.

 

Mobile Configuration Management Functions for Successful MDM by  SearchSecurity.com


July 02, 2013 - Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.

 

Mobile Connect by  Dell Software


March 11, 2014 - Find out how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Android™ and Windows 8.1) while protecting your network from mobile security threats.

 

Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users by  Dell Software


February 12, 2014 - Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

 

Mobile Content and Document Management Best Practices and Decision Checklist by  SAP AG


July 18, 2013 - This crucial paper discusses some of the most common threats to your mobile devices and provides key best practices for mobile content management so that you can ensure that your mobile data is secure wherever you go.

 

Mobile coupon technology by  ComputerWeekly.com


November 11, 2010 - Juniper Research defines a mobile coupon as “a coupon sent to and stored on a mobile phone that can be exchanged for a rebate, a financial discount etc. at a retailer or merchant when the consumer purchases a product.”

 

Mobile Data Offload and Onload by  ComputerWeekly.com


October 12, 2012 - Consumer traffic demand continues to outstrip network planning capacity putting pressure on operator's networks. There are several solutions to this problem says analysts Juniper Research.

 

Mobile data protection best practices by  SearchSecurity.com


November 28, 2011 - Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

 

Mobile Data Security and Compliance Challenges in the Enterprises by  SearchSecurity.com


September 19, 2012 - The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.

 

Mobile Data Security Finding the Balance by  IBM


April 30, 2013 - Access this white paper to learn how to develop a secure mobile strategy that not only protects business data, but keeps the user experience simple and efficient.

 

Mobile Design Patterns: Push, Don't Pull by  IBM


December 05, 2013 - Is it better to wait for users to request, or "pull," the content they need, or to "push" content updates when you think users need them? This resource weighs in on the "push vs. pull" design model debate, describing key advantages of the push model in the mobile space.

 

Mobile device controls: MDM security features vs. mobile native security by  SearchSecurity.com


March 20, 2013 - When it comes to implementing mobile device management (MDM), not all organizations are the same. Read on to learn how to choose the right approach to MDM for your organization.

 

Mobile Device Data Protection: Key Findings and Players in the Market by  SearchSecurity.com


June 14, 2013 - This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.

 

Mobile Device Management (MDM) Policies Best Practices Guide by  IBM


May 15, 2014 - This informative resource discusses how to create the most effective MDM policies by providing helpful best practices that have worked for numerous other successful organizations.

 

Mobile Device Management Buyers Guide by  Sophos, Inc.


February 25, 2014 - This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts