S Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
S Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14

Solving Scripting Problems with Technology by  Network Automation, Inc

November 23, 2010 - Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time.


Solving Scripting Problems with Technology: The Limitations of Scripting in a Complex Business Environment by  Network Automation, Inc

October 27, 2010 - This paper explains that as automation tools continue to evolve in a quest to deliver the most comprehensive set of automated capabilities, the notion of writing scripts will be rendered anachronistic. Continue reading to learn more about the shift from scriping to dynamic, intelligent process automation.


Solving Security Challenges for Government Cloud-Based IT Environments by  Red Hat

December 30, 2011 - Faced with tigher budgets, the federal government is also moving into cloud technology. Access this white paper to explore how new technologies are enabling the government to address unique security concerns while reaping cloud benefits.


Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center by  Citrix

January 06, 2014 - When it comes to the new demands of network infrastructure, it is critical to have an effective application device controller (ADC). This brief guide explores an effective ADC that can help improve your network performance and provide you with effective scalability solutions.


Solving the Challenges of BYOD by  SearchSecurity.com

May 01, 2013 - This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.


Solving the Distributed Data Problem by  IBM

July 07, 1967 - Companies need to reevaluate traditional methods of protecting branch office and PC data such as tape backups and other localized do-it-yourself solutions. Read this white paper to learn about remote on-demand services.


Solving the Mysteries of Subnetting by  Global Knowledge

October 11, 2008 - Subnetting is a complicated topic that has confused students for a very long time, however, subnetting is an important topic for many different certifications with various vendors, including Cisco.


Solving the Password Management Paradox: Defining the Problem and Reviewing the Four Best-Known Solutions by  LEGACY - DO NOT USE - Siber Systems

September 01, 2008 - This paper discusses the paradox of strong password policies, evaluates several possible solutions, and recommends a password management solution that is cost effective and easy to implement.


Solving the Problem of Persistent Data Retention by  SGI

December 17, 2010 - Read this paper to learn the techniques for ensuring that persistent data in the enterprise today will really be available when it is needed in the future.


Solving the SAN Storage / VMware Performance Puzzle by  Virtual Instruments

January 31, 2011 - Join Scott Lowe, VMware-Cisco Solutions Principal for EMC and Archie Hendryx, Senior Solutions Consultant for Virtual Instruments, as they provide insights as to how a comprehensive view, from the VM to the LUN, is imperative for further consolidation and safe Physical to Virtual migrations of your Tier 1 applications.


Solving the Scalability Problem with Big Data by  WANdisco

September 03, 2013 - A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.


Solving Urgent Enterprise-wide Integration Challenges while Focusing on the Future by  InterSystems Corporation

June 13, 2013 - Learn how healthcare organizations are leveraging their infrastructures to support their missions and transition through changes in healthcare IT.


SonicWALL PCI Compliance Solution Brief by  SonicWALL

February 14, 2011 - The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.


SonicWALL SuperMassive E10000 Series video by  SonicWALL

March 18, 2011 - This video talks about the various security threats that are threatening businesses today. With the increasing amount of worms, botnets, and malware the need to an advanced security solution that can scan for all of these things and eliminate potential harmful programs is essential for every business.


SonicWALL TZ Series by  SonicWALL

February 24, 2011 - Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls.


Sony Life Safeguards Data on More than 4.4 Million Customers with CA Access Control by  CA Technologies.

September 09, 2009 - Read this paper to learn how CA Access Control has allowed Sony Life to improve the level of security surrounding its servers.


Sophos Computer Security Scan by  Sophos, Inc.

April 07, 2010 - Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.


Sophos EndUser Protection Overview by  Sophos, Inc.

January 10, 2013 - This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.


Sophos Security Threat Report 2011 by  Sophos, Inc.

February 07, 2011 - Let our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.


Sophos Security Threat Report Mid-Year 2011 by  Sophos, Inc.

August 23, 2011 - Malware is complex, seemingly everywhere and is often difficult to stop. Targeting high-profile organizations, damaging data loss incidents and web threats continue to make headlines for malware attacks this year. Read the latest report to understand how the latest threats work and how to keep your business safe.


Sophos Virus Removal Tool: Free virus detection and removal by  Sophos, Inc.

May 09, 2013 - Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.


Sorting Out Hardware, Software and Hypervisor-Based Replication by  SearchDisasterRecovery.com

April 09, 2014 - One increasingly popular alternative to traditional data backup is to combine replication and snapshots to continuously protect data. This handbook compares hardware-based and software-based replication so you can decide which approach suits your organization's needs, and discusses the emergence of hypervisor-based replication.


Source vs. Target Deduplication: Individual and Integrated Benefits by  Essextec

June 17, 2013 - This expert e-guide explores source and target technologies in greater detail and describes how they can complement each other in multi-tenant and centralized backup environments.


Sourcing and integrating managed services by  ComputerWeekly.com

May 19, 2014 - Analysts Bob Tarzey and Clive Longbottom look at the issues business managers need to take into account when deciding how to deploy applications and when they should consider turning to managed service providers (MSP) for resources and advice.


Sourcing in a Time of Scarcity: The Evolution of Social Networking as an Aid to Hiring by  Taleo

December 31, 2008 - This paper explains the promise held by social networking by offering people with common interests a place to gather and share contacts, opinions, experiences, and increasingly, job opportunities.


South Windsor, Conn. Improves Efficiency and Optimizes Manpower with a Mobile GPS Solution by  BlackBerry

December 01, 2008 - South Windsor, Conn., is using smartphones to track the locations of public works crews in real time, enabling increased productivity and reduced operational costs. This is made possible by the combined use of BlackBerry smartphones, Freeance applications and existing GIS data. Read this case study to learn more!


Southeastern Orthopedic Center Cools Server Rooms and Keeps Systems Running with Tripp Lite by  Tripp Lite

June 22, 2011 - Access this exclusive case study to discover how one organization in the health industry used a portable air conditioning unit to cool small server rooms to protect network devices without risking electrical damage due to water.


SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by  Tripwire, Inc.

August 24, 2009 - SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.


Spam 2011: Protection Against Evolving Threats by  Proofpoint, Inc.

March 09, 2011 - The very best anti-spam solutions today de­liver 95% effectiveness. Unfortunately, that’s not good enough. Check out this white paper to see how enterprises can defend themselves with a comprehensive and adaptive anti-spam solution such as the Proofpoint Protection Suite.


Spam Is Annoying. Targeted Attacks Are Deadly by  Tripwire, Inc.

March 29, 2013 - Join renowned security author Mike Cobb in this podcast as he shares valuable information regarding targeted attacks, including how they work, who's vulnerable, and how to defend yourself properly.


Spam, Spammers, and Spam Control by  Trend Micro GmbH

March 06, 2009 - This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.


SPARC T4 Servers – Optimized for End-to-End Data Center Computing by  Oracle Corporation

April 11, 2012 - Read this white paper to learn how Oracle’s SPARC T4 servers deliver new levels of end-to-end data center performance never before seen in the T-Series line of servers.


Sparking a Plan: Offsite Tape Storage and Smarter Protection Against the Elements by  Iron Mountain

October 17, 2012 - There's always a chance your data can be destroyed or damaged if it's only stored in one place, so while it's important to secure your on-site storage against the elements, it can't hurt to look into partnering with an off-site tape storage and data restoration pro. This article explains why.


SparkPeople Eliminates Bottlenecks and Trims Four Hours per Week from Heavy Workload with Dell/EMC SAN Storage Solution by  Dell, Inc.

October 19, 2010 - In order to eliminate its storage I/O bottleneck, SparkPeople redeployed three databases on a new Dell/EMC storage array along with Dell PowerEdge servers to host Web applications. Access this case study now to learn more about this about transition and the benefits achieved.


Special Report on Adobe by  ComputerWeekly.com

February 24, 2014 - This special 7-page report from Computer Weekly, updated for 2014, analyses the challenges facing Adobe, its financial performance, the services and products it offers, its place in the IT market and its future strategy.


Special report on Dell by  ComputerWeekly.com

February 16, 2011 - It was the company that came from nowhere to revolutionise an entire industry. Dell, originally a provider of desktop PCs, was instrumental in changing the way that the IT business worked.


Special Report on Infosys by  ComputerWeekly.com

July 26, 2012 - This 6 page special report from Computer Weekly gives you the key facts on Infosys, its strategy, products and services and financial performance.


Special report on SAP by  ComputerWeekly.com

December 09, 2013 - This 9 page special report, independently written by Computer Weekly and updated for 2013, gives you the key facts on SAP, its strategy, products and services and financial performance.


Special Report on Cisco by  ComputerWeekly.com

January 17, 2014 - This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.


Special Report: Data Center Energy Efficiency Guide by  Schneider Electric

May 27, 2011 - This expert e-guide provides guidelines for reducing high energy costs and states the importance of investing in power and cooling technology.


Special Report: Tiered Data Storage Strategies for Your IT Shop by  Dell Compellent

August 08, 2011 - Check out this SearchStorage.com Special Report to learn everything storage tiering as it outlines four different options including dynamic storage tiering, sub-LUN tiering, data migration in tiering and auto-tiering.


Special Report: Top 10 Questions to Ask Before Purchasing Video Conferencing by  LifeSize

July 25, 2012 - Uncover the top ten questions you should ask any potential video conferencing vendor before investing in a collaboration solution.


Special Reports on Modernizing Messaging Infrastructure by  Sendmail, Inc.

November 07, 2008 - In this research note, Gartner outlines the top indicators of a potential IT train wreck in regards to messaging solutions.


Special Report on Steria by  ComputerWeekly.com

September 14, 2012 - This 5 page special report from Computer Weekly gives you the facts on Steria, its strategy, products and services and reviews its financial performance.


Specialty Analytics Servers by  Sybase, an SAP company

April 23, 2010 - Businesses are constantly producing complex that needs to be analyzed quickly for critical business needs and decisions. Watch this videocast to learn how Specialty Analytics Servers outperform traditional transaction processing systems in managing the deluge of data and information that is swamping businesses all around the world.


Special report on EMC by  ComputerWeekly.com

December 04, 2013 - This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.


Specific Solutions to Optimise Productivity, Maintain Security and Maximise Investment: Research and Test Labs by  Emerson Network Power

May 21, 2014 - This video talks about a high-performance remote access and control solution that delivers optimized productivity and security while also maximizing initial investment.


Specification of Modular Data Center Architecture by  APC by Schneider Electric

November 21, 2012 - This white paper gives a definition to the idea of the modular data center.


Spectra Libraries with BlueScale Encryption by  Spectra Logic Corporation

March 02, 2011 - Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.


Speech Analytics - The Power of Simplicity by  Calabrio, Inc.

June 23, 2011 - This overview examines the power of Speech Analytics technology to extend resources and expand knowledge.


Speech Analytics: Best Practices for Analytics-Enabled Quality Assurance by  Calabrio, Inc.

April 12, 2012 - This white paper provides tips and best practices for succeeding with speech analytics and using it to enhance your quality assurance (QA) process.


Speech Analytics: The Simple Definition by  Calabrio, Inc.

June 20, 2011 - What is "Speech Analytics," exactly, and why is it important? Find out how the latest wave of Speech Analytics offerings are used in call center communication today and what the benefits are.


Speech Enable the EHR by  Nuance

January 31, 2014 - This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.


Speech Recognition Allows for Better Patient Care by  Nuance

March 13, 2014 - This expert guide from SearchHealthITExchange.com examines the advantages of speech recognition and how it can aid the patients. Read on to find out more.


Speech Recognition for EHR Meaningful Use by  Nuance

March 10, 2014 - This brief video shows how one medical organization was able to utilize a solution that blends point-and-click together with a review of systems, physical exams, reason for visit, and more to get the most out of their electronic health records.


Speed Cloud Services with Pre-integrated Infrastructure Platforms by  VCE

December 31, 2011 - Read this brief case study to learn how business process outsourcing (BPO) and IT solution provider ACS rolled out cloud services to its clients in less than a month, allowing the company to streamline its security, compliance, and change management, free up resources to develop differentiated services, and create new business opportunities.


Speed Up Recovery and Avoid Costly Downtime with Acronis Backup & Recovery by  Acronis

December 11, 2013 - A complementary software demo of the 32-bit version of Acronis Backup & Recovery for Linux.


Speeding Business Innovation with HP Data Center Transformation Solutions by  Agilysys Technology Solutions Group

March 03, 2009 - HP Data Center Transformation solutions accelerate some of today's most important technology initiatives: enabling consolidation, improving energy and space efficiency, and enhancing business continuity and availability.


Speeding ETL Processing in Data Warehouses by  Syncsort

August 01, 2008 - This white paper discusses how two operations in particular -- joins and aggregations -- play an integral role during preprocessing as well in manipulating and consolidating data in a data warehouse.


Case Study from IDC: Speeding the Cure: Kalypsys Deploys Xerox DocuShare CPX to Accelerate Drug Development by  Xerox DocuShare

May 01, 2008 - Learn how Kalypsis, a clinical stage pharmaceutical company, is leveraging Xerox DocuShare Enterprise Content Management to control content for regulatory operations and clinical trials.


Speeding the Time to Intelligence: Effective Information Management through Business Intelligence Competency Centers and Performance Management by  SAS

May 01, 2008 - This article explains in detail about how to arrive at and implement an effective business intelligence strategy, using both a BICC and performance management technology.


Speeding the Way to Virtualization by  Dell, Inc. and Intel®

October 01, 2012 - Access this exclusive source to learn how to implement virtualization in your business to reap the maximum amount of benefits.


Spend Performance Management - Maximize Savings, Reduce Supplier Risks by  SAP America, Inc.

November 05, 2009 - The SAP BusinessObjects Spend Performance Management application provides full visibility into direct and indirect spend, and helps companies proactively identify cost savings opportunities and supply risks, reduce costs, maintain supply continuity, and increase spend under management.


SpigitEngage for Sharepoint by  Spigit

June 23, 2011 - This transcript of a Spigit webcast explains how you can leverage the existing investment and knowledge of Sharepoint to tap into powerful idea management using SpigitEngage for Sharepoint.


Spirit Incentives by  SunGard Availability Services

January 26, 2012 - In this case study, explore how Spirit Incentives chose a cloud service to help it meet evolving business needs. Discover how this move to the cloud was accomplished in 10 days and how it enabled the company to consolidate services, reduce costs and better utilize its staff and applications.


Splunk App for Citrix NetScaler with AppFlow by  Splunk

April 04, 2012 - In this brief resource, you will discover the possibilities of Splunk's flexible, visual application for Citrix NetScaler and learn how it can provide enhanced visibility and analytics within your organization.


Splunk App for VMware by  Splunk

April 04, 2012 - This paper covers features and benefits of the Splunk app for VMware and how it can add visibility to virtual environments within your organization.


Splunk for Application Management by  Splunk

April 03, 2012 - This paper examines features and benefits of a unified application management structure that can give you real-time data access, custom dashboards, performance metrics and more.


Splunk for Business Analytics by  Splunk

April 04, 2012 - This paper looks at one way of improving your analytics capabilities and gaining end-to-end visibility into the trends and behaviors of customers, services and systems.


Splunk for Business Intelligence by  Splunk

April 03, 2012 - This paper uncovers how Splunk can be applied to a variety of business intelligence (BI) activities to allow your company real-time insight.


Sportif USA Transparently Automates the Archiving and Protection of Large Outlook Mailboxes with Metalogix by  Metalogix

January 24, 2012 - In this case study, explore how Sportif, a leading outdoors clothing innovator, reduced email management costs and increased data protection for their users with Metalogix Archive Manager for Exchange.


Sports Broadcasting Company Scores Big With Vblock by  VCE

April 17, 2014 - This exclusive case study examines how a sports broadcasting company was able to utilize a converged infrastructure solution to handle their explosive increase in data, resulting in reduced support calls and decreased system implementation time, all while cutting costs.


Sportsbet enlists Concur for better accuracy in reporting on Expenses by  Concur Technologies

June 16, 2014 - While Sportsbet previously took about two days to report on expenses, it's now down to around 90 minutes with a far greater degree of accuracy--thanks to Concur. Check out the following video to see how!


Spotlight on ISVs: Why embedded BI and analytics supersede traditional data warehousing by  Birst

January 09, 2013 - Traditionally, data warehousing, BI, and analytics have all gone hand-in-hand. Mining data from one centralized location just made sense. But, as the need for real-time insight has grown, the process of analyzing data from DWs is too cumbersome. Read on to learn why leveraging embedded BI and analytics can help you gain intelligence faster.


Spotlight on IT - Sustained Growth through Operational Excellence by  SAP America, Inc.

July 07, 1967 - This paper-one of four function-specific papers-is based on the IT responses and follow-up interviews with technology executives who participated in the 2008 Economist Intelligence Unit operational excellence survey sponsored by SAP.


Spotlight on Oracle-- Rapidly Discover Oracle Performance Bottlenecks by  Dell Software

Spotlight on Oracle enables real-time diagnostics, providing the fastest way to find and fix performance bottlenecks in your Oracle database environment.


Sprint drives 45-times performance improvement by  IBM

June 30, 2013 - This white paper delves in to how Sprint-Nextel deployed nine non-disruptive flash storage technologies in order to not only meet customer service satisfaction but exceed all expectations. Find out how this approach improved performance, significantly cut latency, reduced energy consumption, and much more.


SPSS Statistics White Paper: The Risk of Using Spreadsheets for Statistical Analysis by  IBM

July 15, 2013 - Spreadsheets are widely used for statistical analysis, but only up to a certain point. This paper presents some points you should consider if you use, or plan to use, a spreadsheet to perform statistical analysis. It also describes an alternative that in many cases will be more suitable.


Spyware in the Enterprise: The Problem and the Solution by  Sunbelt Software

January 10, 2007 - Spyware is a serious threat to the enterprise network, and the threat is growing. Download this informative white paper to learn more about the costs, problems and solutions associated with counting spyware.


SQL Anywhere v11.0.1 Developer Edition by  Sybase, an SAP company

June 18, 2010 - Addresses need for high reliability and data sync to multiple device platforms. Avoids need for a DBA, and reduces development effort by simplifying performance optimisation and back end connectivity. Works with standard development tools and languages.


SQL Anywhere: Industry-leading database management and data movement technologies built for frontline environments by  Sybase, an SAP company

June 18, 2010 - SQL Anywhere® is a comprehensive package providing data management and data movement technologies that enable the rapid development and deployment of database-powered applications. SQL Anywhere offers enterprise caliber databases that scale from 64-bit servers with thousands of users down to small handheld devices.


SQL Compatibility in DB2 9.7-- From triggers to object enhancements: A demonstration of the new PL/SQL compatibility features by  IBM

September 01, 2010 - This article overviews the new PL/SQL compatibility features in IBM DB2 software version 9.7, making it easier to adopt and allowing you to take advantage of its autonomic and high-performance characteristics. 


SQL Server 2000 Security Best Practices by  Global Knowledge Network, Inc.

November 01, 2004 - The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours.


SQL Server 2005 - Data Management and Analysis Solution for Your Enterprise by  Microsoft

May 01, 2007 - Use SQL Server 2005 to better prepare for disasters, protect enterprise data, and make faster decisions during recovery periods. Read this white paper to learn how data visualization technology allows enterprise's to track assets during dis...


SQL Server 2005 Virtualization in the Dell Scalable Enterprise by  Dell, Inc.

September 01, 2006 - Learn how to manage SQL Server 2005 in a virtualized environment. This paper provides best practices for managing a virtualized server farm with usage scenarios for virtualization and SQL Server and the performance results you can expect.


SQL Server 2008: What to Expect by  Global Knowledge

December 10, 2008 - Microsoft SQL Server 2008 has many great new features that will allow you to develop higher performing, more scalable next-generation applications using more than just relational data.


SQL Server 2012 PolyBase for Parallel Data Warehouse by  HP

February 26, 2013 - This brief video introduces SQL Server 2012 PolyBase for parallel data warehouse, which combines the relational database world with the world of unstructured data and Hadoop – allowing you to improve data-fueled decision-making.


SQL Server 2012 Security by  Microsoft

January 03, 2012 - Check out this essential webcast to learn all about the security & compliance features for SQL Server from Il-Sung Lee, Senior Program Manager from SQL Server Engine Security team.


SQL Server 2012: New capabilities and benefits by  Dell and Microsoft

May 24, 2012 - If SQL Server 2008 R2's self-service business intelligence (BI) features made the release appealing to business users, then the data quality, analysis, and master data management capabilities that give IT more control over self-service BI in SQL Server 2012 will make this latest release attractive to DBAs. Read this expert e-guide to learn more.


SQL Server Data Tools CTP4 Download by  Microsoft

January 03, 2012 - Click below to gain access to Microsoft's Data Center, where you can gain insight on SQL Server Data Tools' benifits, install and download the tool pack, and get information to help you get started with developing today.


SQL Server HA and DR: A Simple Strategy for Realizing Dramatic Cost Savings by  SIOS Technology Corp

January 31, 2014 - Read this exclusive white paper to find out how you can tackle SQL Server downtime without busting your disaster recovery protection and high availability budget.


SQL Server in the Cloud by  SAVVIS

August 03, 2011 - This SearchSQLServer.com E-Guide explores several options for moving data on SQL Azure migration and synchronization.


SQL Server Insider E-Zine - Issue 3, Volume 1 by  SearchSQLServer.com

March 16, 2012 - Everyone knows SQL and NoSQL technologies don't co-exist well. But can they? Check out Issue 3 of SQL Server Insider E-Zine to find out about the mysterious Microsoft project that aims to wed these two database types. Then, delve into the business intelligence (BI) features in SQL Server 2012, including reporting, analytics and data quality.


SQL Server Insider E-Zine - Volume 1: Is Self-service BI the Answer? by  Dell, Inc. and Intel®

February 16, 2010 - Business intelligence is a hot topic in 2010, especially with the upcoming release of Microsoft's SQL Server 2008 R2 being dubbed as the "BI release." In this e-zine, one SQL Server expert breaks down exactly what goes into self-service BI, where it works and where it falls short.


SQL Server Insider E-zine - Volume 2: Selling a SQL Server 2008 R2 Upgrade by  SearchSQLServer.com

May 27, 2010 - When proposing an upgrade to SQL Server 2008 R2 to management, you need to focus more on ROI than its cool, new features. In the second volume of the SQL Server Insider e-zine, you’ll learn how to draft a presentation that will wow the higher ups and convince them that migrating to SQL Server 2008 R2 is worth it.


SQL Server Insider E-Zine – Volume 1: Is Self-service BI the Answer? by  Dell, Inc. and Intel®

November 16, 2010 - Business intelligence is a hot topic in 2010, especially with the upcoming release of Microsoft's SQL Server 2008 R2 being dubbed as the "BI release." In this e-zine, one SQL Server expert breaks down exactly what goes into self-service BI, where it works and where it falls short.


SQL Server Insider: Tips for the SQL Server Pro Vol. 8 by  Dell and Microsoft

May 01, 2012 - New products and trends in the technology industry change and evolve almost as quickly as the technology itself. In particular, SQL Server is a rapidly evolving market. This editorial e-zine features industry insight from leading companies and experts on the latest SQL Server trends.


Squeezing More Value out of Data Warehouses through the Power of Database Compression by  Vertica Systems

December 03, 2008 - Data compression features in data warehouse databases are the current trend, and this paper explains the benefits of compression in data warehousing and differentiates compression approaches taken by different databases.


SRI Ecuador Implements Red Hat Solutions: A Scalable , Reliable Platform to Provide Online Services to Taxpayers by  Red Hat and HP

April 10, 2013 - Access this informative case study to learn how Ecuador's tax management agency utilized a Linux solution to enable and promote internet-based tax return filing, reducing processing times and avoiding increased infrastructure complexity.


SSA Goes on the Offensive against Viruses by  Bytware, Inc.

February 01, 2005 - This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems.


SSD Architecture: Three Deployment Options by  Symantec Corporation

March 14, 2014 - This e-guide reveals 3 main ways to deploy SSDs and the pros and cons of each method.


SSD: Features, Functions and FAQ by  SearchStorage.com

March 07, 2013 - This expert E-Guide explores key considerations for integrating solid state storage into a server, and answers frequently asked questions about solid state. Read now to learn more.


SSG Report: Enterprise Use Cases for Solid State Storage/Flash Memory by  Dell and VMware

September 17, 2013 - This analyst report outlines enterprise solid state storage and why it matters to customers. It also highlights findings from a study of more than 550 IT professionals on their plans for SSD deployment. Read on to find out what your peers chose as the #1 vendor of choice to deploy flash and solid state storage technologies.


SSL Certificate Management: Avoiding Common Mistakes by  GeoTrust, Inc.

May 09, 2013 - This expert E-Guide from SearchSecurity.com explores the common mistakes inherent to SSL certificate management and provides advice on how to avoid them. View now to learn more!


SSL Certificate Management: Avoiding Common Mistakes by  Symantec Corporation

October 11, 2013 - This expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.


SSL Certificate Management: Common Mistakes and How to Avoid Them by  SearchSecurity.com

October 18, 2013 - Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.


SSL Certificate Management: Common Mistakes and How to Avoid Them by  Thawte Inc.

February 12, 2013 - This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now.


SSL Certificate Management: Common Mistakes and How to Avoid Them by  Thawte Inc.

February 04, 2013 - Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.


SSL VPN for Secure Wireless LAN Access by  F5 Networks

October 01, 2007 - For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell...


SSL: The Backbone of Doing Business over the Internet by  VeriSign, Inc

October 01, 2008 - Read this white paper to learn about technology in place today that helps online businesses protect sensitive customer data, authenticate themselves, and build consumer trust.


SSO Vendor Evaluator’s Guide by  Imprivata

February 28, 2014 - Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.


ST Focus on Better Data Protection with CDP and Deduplication by  Dell Software

August 05, 2011 - Continuous data protection and deduplication are chief among the technologies that data storage managers are investigating when it comes to improved data backup and storage efficiency. In this expert e-book, learn how CDP and deduplication have evolved, and determine the best implementation strategy for your shop.


STA Travel’s Increases Website Performance 50% with Riverbed by  Riverbed Technology, Inc.

November 07, 2011 - Global travel specialist STA Travel found that access to its website had slowed and that peaks in web traffic from promotional campaigns had become difficult to manage. The company turned to the Riverbed Stingray Traffic Manager to quickly improve the website’s performance and uptime, and provide a superior online experience for its customers.


STA Travel’s Website Performance Flys with Riverbed by  Riverbed Technology, Inc.

November 09, 2011 - The company turned to the Riverbed® Stingray™ Traffic Manager for support. This cost-effective solution deployed quickly, improved the website’s performance and uptime, and provided a superior online experience for its customers.


Stages of Transformation: The Demand-Driven Journey Begins with the End by  SAP America, Inc.

September 18, 2008 - This Report is intended to map the journey companies are making to build demand driven Value Chains. It includes a four-stage maturity model, and identifies the projects and appropriate technology components needed to transition through each stage.


Staging a Disaster Recovery VM by  CommVault Systems, Inc.

November 15, 2012 - Read this tip to find key considerations for planning a disaster recovery strategy for your virtualized machine (VM). Explore two viable approaches to DR -- one-to-many DR VM staging and one-to-one DR VM staging.


Stalking the Kill Chain by  EMC Corporation

October 31, 2012 - Access this exclusive resource to uncover the ins-and-outs of the "attacker kill chain", and kick potential security threats to the curb.


Stand and Be Heard by  Iron Mountain

September 19, 2013 - The purpose of this article is not to shed light on significant advancements in the field of records and information management, but rather help highlight some of the most common and not so common records concerns that should be considered when transferring or acquiring a large MSR portfolio.


Stand the Test of Time: Determining the Right Data Protection Strategy for Your Business by  Hitachi Data Systems

December 01, 2007 - Being able to efficiently protect your organization's critical data is a number one priority.


Stand-alone Data Reduction Technologies - A storage paradigm shift - Surviving the data explosion using data reduction techniques by  Hewlett-Packard Limited

November 10, 2010 - Data reduction technologies provide reliable and highly scalable storage solutions - with proven management and ease of use that enables higher capacity utilization with less budget, time and energy. Learn about these technologies and how HP solutions can improve storage capacity utilization.


Standardization and Modularity in Data Center Physical Infrastructure by  APC by Schneider Electric

January 26, 2011 - This paper examines how failure to adopt modular standardization as a design strategy for data center physical infrastructure (DCPI) is costly on all fronts, unnecessary expense, avoidable downtime, and lost business opportunity. Standardization and modularity, create wide-ranging benefits in DCPI that streamline and simplify every process.


Standardization and Modularity in Data Center Physical Infrastructure by  Schneider Electric

July 11, 2012 - This white paper outlines how standardization can have significant positive effects on all three major components of DCPI business value – availability, agility and total cost of ownership. Learn how your organization can adopt modular standardization to cut costs and prevent downtime


Standardization and Modularity in Network-Critical Physical Infrastructure by  APC by Schneider Electric

February 04, 2009 - Standardization and its close relative, modularity, create wide-ranging benefits in NCPI that streamline and simplify every process from initial planning to daily operation.


Standardizing IT Service Management - Best Practices Based on HP Experience in ITSM Consolidation by  Hewlett-Packard Company

February 04, 2011 - This paper explains how HP helps organizations implement effective, cost-efficient service desks and the IT processes that make them work.


Staples Case Study by  IBM

September 21, 2011 - Staples set the bar for the office superstore when it first opened its doors in 1986. It now has the second-largest Internet retail revenue in the world with $10.2 billion in 2010 sales, 43% of the company's total revenue. This paper details how Staples delivered a much more personalized shopping experience to its online customers.


Start Anywhere. Go Everywhere by  SAP America, Inc.

October 16, 2013 - Taking the first step with SuccessFactors' solutions begins a journey with a trusted partner sure to help you achieve your long-term goals. Learn more about the most complete HR suite in the cloud.


START small, grow tall: Why cloud now by  HP & Intel®

May 31, 2011 - Read this white paper to gain insights on how you can accelerate and streamline your cloud migration by taking advantage of an advanced set of technologies. Realize the benefits their extensive list of features can deliver to your organization and discover how they can help you overcome common cloud challenges.


Starters guide to VNA by  BridgeHead Software

December 18, 2012 - In this white paper, Sturdy Memorial's PACS administrator shares insight on their experience implementing a vendor neutral archiving (VNA) equipped with image protection capabilities. Learn what you should look for when choosing a VNA solution.


Startup Guide to Configure Your Dell PowerEdge VRTX System by  Dell and Microsoft

November 12, 2013 - Access this step-by-step, visually aided information guide for configuring a chassis solution with Microsoft® Windows Server® 2012 in a supported failover cluster environment.


Starz Entertainment Joins AT&T Mobile Barcode Charter Program as First TV/Network Member by  AT&T Corp

November 02, 2011 - This white paper examines a new mobile barcode solution for consumer engagement, which is helping to connect the offline world with the online world.


State Agency Boost Security and Reduces Costs with GoToMyPC Corporate by  Citrix Online

January 01, 2005 - The Texas Department of Family and Protective Services gives top priority to securing the information gathered for its investigations and cases.


State Agency Collaborates Securely with Outside Organizations by  Cisco Systems, Inc.

June 06, 2011 - This case study explains how one organization planned, designed, and implemented a flexible network architecture that enabled them to better collaborate between departments for improved business outcomes.


State of Agile Development Survey 2008 by  VersionOne Inc.

September 26, 2008 - This white paper highlights the results of a third annual industry survey regarding the state of agile development. Gain insight into the status of organizations currently implementing or practicing agile methods.


State of DNS Availability Report by  Verisign, Inc.

November 11, 2011 - This domain name system (DNS) availability report illustrates the risks and impact that site downtime can have on revenue generation, business continuity, customer loyalty and more.



September 26, 2012 - View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.


State of Internet Security, Q3 - Q4 2009 by  Websense, Inc.

February 16, 2010 - Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009.


State of Security Operations by  Hewlett-Packard Company

January 31, 2014 - With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.


State of Software Security Report by  Veracode, Inc.

February 28, 2011 - The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.


State of Software Security Report Volume 4 by  Veracode, Inc.

December 07, 2011 - Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.


State of the Business Process Management Market 2008 by  Oracle Corporation

August 01, 2008 - Over the last few years, BPM has seen rapid growth because it succeeds where earlier approaches have failed—uniting business strategists and technologists together with a shared set of tools to accomplish common goals. The future promises even more explosive growth as BPM products continue to mature. Continue reading this paper to learn more.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts