T Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
T Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16
 

Tape vs. Archive for Long-term Data Retention by  Iron Mountain


October 06, 2011 - While there is still some talk predicting the death of tape, the reality is quite the opposite. More significant than tape’s survival in the backup environment is its emergence as the preferred medium in archiving and large-file processing. Check out this presentation to learn more about tape and why it isn't going anywhere anytime soon.

 

Tape's New Niche: Long-Term Data Retention by  Iron Mountain


March 13, 2013 - This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery.

 

Tape's New Niche: Long-Term Data Retention by  Iron Mountain


March 13, 2013 - This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery.

 

Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats by  LogRhythm, Inc.


December 11, 2012 - This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.

 

Tapping Cloud-Based ERP Solutions to Capture Global Business Opportunities by  NetSuite


July 31, 2013 - This resource examines the challenges of launching international operations, and describes what you should look for when selecting a global financial reporting and consolidation tool. Also inside, discover whether cloud-based ERP is the right move for you.

 

Targetbase Enhances its Client Services with Oracle Exadata by  Oracle Corporation


August 08, 2011 - Learn how Targetbase choose Oracle Exadata to deliver their real-time data warehousing.

 

Targeted attacks and how to defend against them by  ComputerWeekly.com


August 16, 2013 - Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.

 

Targeted attacks: Preparation and Mitigation by  Symantec Corporation


May 17, 2013 - This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.

 

Targeted Customer Experiences Across All Channels by  Hewlett-Packard Company


April 04, 2013 - Access this valuable to uncover emerging technology channels you can leverage to further develop customer relationships and increase sales. Click now to explore a solution that uses analytics, social media, and web content to deduce and improve user experiences.

 

Targeted Cyber Attacks by  GFI Software


March 18, 2008 - Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.

 

TCO Analysis of a Traditional Data Center vs. a Scalable, Containerized Data Center by  Schneider Electric


May 10, 2013 - Access this resource that presents a quantitative TCO analysis of traditional data center power and cooling infrastructures versus scalable, containerized data center power and cooling modules.

 

TCO Comparison: Dell PowerEdge R815 vs. Two HP ProLiant DL380 G7s by  Dell, Inc. and AMD


August 01, 2010 - The Dell PowerEdge R815 server with AMD Opteron processors Model 6174 can provide an estimated lower total cost of ownership (TCO) over 3 years than two HP ProLiant DL380 G7 servers each with Intel Xeon Processor X5670s. Read this test report to learn more.

 

TCO of Unified Communications (Mason Analysis) by  Cisco Systems, Inc.


January 28, 2014 - This informative paper discusses how your organization can adopt a feature-rich, future-proof unified communications (UC) solution for significantly less cost than similar solutions on the market, and compares the TCO of some of the leading UC tools.

 

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox by  Global Knowledge


July 01, 2006 - Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.

 

TDWI Best Practices Report - Customer Analytics in the Age of Social Media by  IBM


December 31, 2012 - This TDWI Best Practices Report examines organizations' current practices and future plans for customer analytics technology strategies, with a special focus on how organizations are adapting to challenges- and potential- of social media.

 

TDWI Checklist Report: Cost Justification for Metadata Management by  ASG Software Solutions


September 07, 2010 - This TDWI Checklist Report explains how to provide justification for time and money invested in metadata management solutions. The report points out a few ways to quantify metadata’s contribution to IT projects and business initiatives.

 

TDWI Checklist Report: Data Requirements for Advanced Analytics by  SAS


April 07, 2010 - This checklist lists and explains data requirements that are unique to advanced analytics. This report focuses on the data requirements of advanced analytics so organizations may become better equipped to populate a data warehouse or analytic database with data and data models that ensure the success of advanced analytic applications.

 

TDWI Checklist Report: Satisfying New Requirements for Data Integration by  Oracle Corporation


June 30, 2012 - This checklist report explores the changing requirements of data integration in the age of big data, and counts down seven steps you need to take in order to fuel integration success.

 

Team Forge by  CollabNet


July 07, 2011 - CollabNet TeamForge can enable you to accelerate software delivery, from idea to code, build and test, to application release. Download now to start experiencing these benfits today.

 

Teamstudio Build Manager by  Teamstudio, Inc.


August 01, 2006 - Teamstudio has developed Build Manager, a flexible and sophisticated build tool that helps automate your application build process, providing you with error-free builds, internal control and audit compliance.

 

Teamstudio Usage Monitor by  Teamstudio, Inc.


August 01, 2006 - A Domino Application Usage Audit pinpoints issues with your application inventories, empowering you with the information you need to confidently select and remove all unused applications.

 

Tearing Down the Fortress to Better Protect the Enterprise by  BlueCoat


October 01, 2008 - Check out this webcast and learn about the 5 key layers of malware defense that can provide multi-layered protection for your company.

 

TEC Product Spotlight by  IBM


January 03, 2014 - Access the following white paper to uncover how BI and predictive analytics offers a way into undiscovered data gems and business critical insights that are not available through standard BI and analytics practices. Find out the best practices to use as well as the tools and techniques to use to get the most out of your solution.

 

Tech Brief (FAQ): Windows Server 2012 Recycle Bin by  Dell Software


November 04, 2013 - Among the functionality upgrades in Windows Server 2012 are improvements to Active Directory's Recycle Bin. While this addresses many previous problems, it's not the solution to all AD recovery concerns. Read the White Paper

 

Tech Brief - Ensuring High Availability for Critical Systems & Applications with Shareplex for Oracle by  Dell Software


July 10, 2013 - This technical brief explains how SharePlex can help organizations ensure high availability of their Oracle databases to improve overall system availability.

 

Tech Brief SmartStack for Business Critical Apps with VMware and Nimble Storage by  Nimble Storage


August 31, 2013 - This short solution brief showcases pre-validated reference architectures for VDI, private cloud, and data protection designed to deliver the ideal platform for supporting your business critical applications on VMware.

 

Tech Guide: Building and Optimizing Private Clouds by  Dell, Inc. and Intel®


July 27, 2012 - This Tech Guide from SearchNetworking.com explores the ins and outs of building and optimizing the private clouds.  In three articles, learn about application performance, top challenges you may encounter, and an overview of cloud computing architecture.

 

Tech Guide: Desktop Virtualization and the Network by  Dell, Inc.


February 23, 2012 - Discover the impact desktop virtualization and virtual desktop infrastructure have on your network.

 

Tech Talk: Dennis Martin on SSD technology by  Dell and VMware


November 18, 2013 - In this video, Demartek's Dennis Martin discusses the most recent developments in solid-state storage with Rich Castagna, editorial director of TechTarget's storage media group.

 

Tech Talk: Dennis Martin on SSD technology by  Dell, Inc.


December 17, 2013 - In this storage decisions TechTalk, Dennis Martin, founder and president of Demartek Labs, discusses the best ways to use solid-state storage in an environment.

 

Tech Tips: Deployment of VMware Horizon View Virtual Desktop Infrastructure by  VMware, Inc.


November 01, 2013 - Read this whitepaper to find 3 tips to help ensure success with your virtual desktop infrastructure deployment.

 

Tech Tips: Deployment of VMware Horizon View Virtual Desktop Infrastructure by  VMware, Inc.


October 22, 2013 - Find 6 tips for implementing VMware Horizon View in order to make sure you experience all the benefits this solution has to offer.

 

Tech Tips: Storage for VMware Horizon View Virtual Desktop Infrastructure by  VMware, Inc.


October 28, 2013 - This whitepaper shares a few important considerations to keep in mind before deploying your VDI solution.

 

Tech Tips: Storage for VMware Horizon View Virtual Desktop Infrastructure by  VMware, Inc.


February 23, 2013 - Learn some of the best practices you can exercise around storage for your desktop virtualization environment.

 

Tech Tips: VMware Horizon Mirage by  VMware, Inc.


July 29, 2013 - Access this resource to learn all about VMware Horizon Mirage, a comprehensive image management solution that enables you to deliver updates to individual IT-managed layers seamlessly and simplify backup and desktop disaster recovery. Also, discover nine essential tips that can ensure deployment success.

 

Tech Tips: VMware Horizon View by  VMware, Inc.


December 31, 2013 - This guide explores some essential tips for VMware Horizon View, a tool that tackles these challenges through virtualization of end-user desktops.

 

Tech Tips: VMware Horizon View by  VMware, Inc.


July 29, 2013 - This resource discusses how VMware Horizon View (formerly VMware View) can help IT pros address top mobility pain points. Discover how this tool enables you to easily virtualize end-user desktops so you can cut operational costs, boost security and meet mobile computing demands.

 

Tech Tips: VMware vSphere with Operations Management by  VMware, Inc.


March 12, 2013 - This whitepaper features 10 tips for improving the management of your VMware virtualized environment.

 

Techfocus SQL Server 2008 Migration: Evaluate the Value of a SQL Server Upgrade by  SHI International Corporation


November 23, 2009 - SQL Server 2008 has many compelling features, but not all of them are necessary. See what's a good fit for your enterprise and what can wait.

 

TechFocus: Windows 7 Migration - Why a Windows 7 Upgrade Is Worth It by  Dell and Microsoft


December 02, 2010 - Microsoft Windows 7 addresses user frustrations, but satisfied users are just one benefit of migrating to the new operating system. This expert guide will discuss key features that can make a Windows 7 migration worth the investment.

 

TechGuide: Applying Virtualization Networking in the Cloud by  Dell, Inc.


March 28, 2012 - This Tech Guide from SearchNetworking.com explores emerging network virtualization protocols and strategies, and uncovers the need for software-defined networking in cloud environments.

 

TechNet Webcast: Lync for Mobile Devices (Level 200) by  Microsoft


May 07, 2012 - This webcast explores the many productivity-boosting features found in the Microsoft Lync 2010 mobile clients. optimized for mobile connectivity, this will help your mobile workers communicate more easily than ever before, even while on the go.

 

Technical Brief: Next-Generation Wireless Backhaul Solutions by  Brocade


January 28, 2010 - Many services, such as mobile Internet and mobile TV, require high bandwidth, and current backhaul infrastructures are not optimized to handle this traffic. Advanced routers and switches from Brocade enable highly scalable designs for the eventual convergence of voice and data infrastructure that can deliver new multimedia services.

 

Technical Brief: Top Ten Reasons to Choose Nimble Storage for Business-Critical Applications on VMware by  Nimble Storage


December 10, 2013 - Would you like to maximize storage utilization and efficiency to control costs?If so, take a look at this 1 page white paper to learn about the various benefits of implementing this storage system for business-critical applications with VMware.

 

Technical Comparison of On-line Vs. Line-interactive UPS Designs by  APC by Schneider Electric


January 01, 2004 - This paper describes the advantages and disadvantages of each topology and addresses some common misconceptions about real-world application requirements.

 

Technical Computing Benefits with IBM FlashSystem by  IBM


April 30, 2013 - This white paper explains why high performance computing (HPC) systems generate and consume massive amounts of data that are hungry for high storage performance, and explores the technical computing benefits offered from a major vendor's comprehensive flash portfolio.

 

Technical diagrams of SharePoint 2010 Architecture by  Microsoft Corporation India Pvt Ltd


November 12, 2009 - This article contains a number of technical diagrams describing Microsoft SharePoint Server 2010 features, upgrade considerations, and benefits. Many of these resources are visual representations of recommended solutions. They include poster-sized documents available in formats including Microsoft Office Visio 2007 files, PDF files, and XPS files.

 

Technical Guide on Application Security by  SearchSecurity.com


December 31, 2012 - This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.

 

Technical Guide on Collaboration Threat Vectors by  Websense, Inc.


October 31, 2011 - Techtarget's Security Media Group presents a comprehensive guide to securing collaboration technologies. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice communications via VoIP or Skype.

 

Technical Guide on Emerging Threats by  Websense, Inc.


February 16, 2011 - It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.

 

Technical Guide on Government Security by  SearchSecurity.com


May 23, 2011 - Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.

 

Technical Guide on Malware Trends by  ESET


October 24, 2011 - TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.

 

Technical Guide on Mobile Security by  SearchSecurity.com


November 01, 2011 - Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.

 

Technical Guide on SIM by  SearchSecurity.com


August 16, 2011 - Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.

 

Technical guide on Web Security Gateways by  M86 Security


April 28, 2011 - Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.

 

Technical Guide on Windows Security by  SearchSecurity.com


November 04, 2011 - SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.

 

Technical Guide: Using a Comprehensive Virtualization Solution to Maintain Business Continuity by  Citrix


January 07, 2010 - This white paper explores the challenges of maintaining "business as usual" during major disasters and disruptions to distill the requirements of an ideal solution for disaster recovery and business and workforce continuity through virtualization.

 

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention by  McAfee, Inc.


November 04, 2011 - While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.  

 

Technical Report: Microsoft® SQL Server® Database Protection Using EqualLogic Auto-Snapshot Manager / Microsoft Edition by  Dell, Inc.


May 02, 2011 - This Technical Report describes using EqualLogic Auto-Snapshot Manager / Microsoft Edition to perform online Smart Copy protection and recovery for SQL Server

 

Technical Report: VDI Reference Architecture with Cisco, Citrix, and Nimble Storage by  Nimble Storage


May 31, 2013 - This informative white paper describes the reference architecture for a VDI storage solution that can support up to 1500 pooled virtual desktops, helping you more easily manage a compact storage infrastructure that is easy to manage and powerful enough to support VDI workloads.

 

Technical Report: VDI Reference Architecture with Cisco, VMware, and Nimble Storage by  Nimble Storage


May 31, 2013 - Learn how to deploy 1,000 virtual desktops using VMware View 5.1 with VMware vSphere 5, Cisco UCS, and a single 3U Nimble Storage array.

 

Technical Requirements for Mobile Health Care Deployments by  Juniper Networks, Inc.


May 09, 2011 - With the rapid adoption of mobile devices, it’s only natural that these devices have made their way into health care facilities. However, it’s crucial that mobile devices are protected from security vulnerabilities to ensure compliance with federal regulations. This e-guide discusses best practices for mobile health care deployments.

 

Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007 by  FalconStor Software


October 28, 2009 - This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time.

 

Technology & Business from Sun and AMD by  Sun Microsystems, Inc.


July 20, 2009 - Inside this magazine, you'll find stories explaining why AMD processor-powered Sun solutions for storage and archiving, Microsoft Exchange 2007 and other applications are receiving rave reviews from customers and analysts alike. There are also several exclusive offers...

 

Technology Assessment Vendor Viewpoint: Teradici Corporation by  Teradici Corporation


January 01, 2007 - This white paper gives a IT administrators a new approach to computer deployment management and PC functionality.

 

Technology Audit: Imperva SecureSphere Data Security Suite by  Imperva


June 02, 2010 - Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.

 

Technology Availability & Disaster Recovery Spoken in the Language of Business by  SunGard Availability Services


October 24, 2013 - This upcoming webcast presentation will help you learn key details about the state of DR in today's business landscape, as well as five processes that will help you make sure your DR plan has you prepared for whatever comes.

 

Technology Brief: An Introduction to Video in the Enterprise by  Fluke Networks


October 20, 2010 - To help you get ready for video, Fluke Networks developed a four-page technology primer “An Introduction to Video in the Enterprise” that covers key market drivers, the four major types of video, and illustrates how streaming applications works. 

 

Technology Considerations for Managing Storage Area Network (SAN) Configurations by  IBM


June 30, 2011 - IBM Tivoli Storage Productivity Center's capabilities focus on storage configuration management and provide analysis of current storage utilization and best practice recommendations to provide the storage administrator with analytical input that will provide significant assistance.

 

Technology Focus Drives and Supports Rapid Growth at Applied Engineering by  Bowen & Groves


May 19, 2008 - A contact led Applied Engineering to M1 by B & G™ software, an application that provides total integration and automation from quoting through invoicing, specifically for manufacturing environments.

 

Technology Implications of IFRS adoption for U.S. Companies: More than a technical accounting change by  Deloitte


July 28, 2009 - In this publication, we explore the technology implications associated with IFRS conversion and discuss: Evaluating the potential technology impact; how companies can prepare technology and systems changes related to IFRS adoption; Major differences between U.S. Generally Accepted Accounting Principles (GAAP) and IFRS and much more.

 

Technology industry at the cross-roads: Transforming quote-to-cash operations by  ComputerWeekly.com


March 05, 2013 - This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.

 

Technology industry at the cross-roads: Transforming quote-to-cash operations by  ComputerWeekly.com


March 06, 2013 - This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.

 

Technology Industry Survey 2012 by  ComputerWeekly.com


October 21, 2011 - This exclusive research reveals what IT professionals really think about technology, their employers, and their careers.

 

Technology Industry Survey 2013 by  ComputerWeekly.com


October 19, 2012 - From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.

 

Technology Industry Survey 2014 by  ComputerWeekly.com


November 11, 2013 - From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.

 

Technology Industry Survey2012 by  ComputerWeekly.com


October 21, 2011 - Whether it is an inappropriate ‘tweet’, an internetsecurity scandal or a story of the fastest growingcompany in the world, technology, be it for theright or wrong reasons, has become regular frontpagenews.This survey aims to give a snapshot of thetechnology industry from the inside.

 

Technology Primer: Transparent Application Delivery Networks by  BlueCoat


January 10, 2008 - Some things you want to see, some you don't. Critical application traffic is something you want to see. WAN optimization solutions shouldn't blind your network management, visibility or security.

 

Technology Profile: Cloud Building - Requirements for Private Clouds (Instrumentation and the Private Cloud) by  Virtual Instruments


February 13, 2012 - Check out this white paper for best practices and requirements when establishing a private cloud. Learn about the importance of efficiency, scalability and real-time awareness of your cloud environment, and discover what tools and technologies are currently available to ensure your private cloud is running smoothly and effectively.

 

Technology to Help Your Physicians with the Transition to ICD-10 by  Nuance


February 28, 2013 - This brief resource highlights a solution that, unlike retrospective coding based programs, offers a concurrent review process that allows physicians to accurately capture compliant documentation, complexity levels and severity levels in documentation from the moment the patient enters the system.

 

Technology Trends and the Business of HR by  Oracle Corporation


February 29, 2012 - In the following white paper, Gretchen Alarcon talks about the evolution of Oracle Fusion HCM, and the underlying technology trends that contributed to the development of Oracle Fusion Applications.

 

Technology value matrix : ERP by  ComputerWeekly.com


November 30, 2012 - Analyst group Nucleus Research looks at the latest trends in enterprise resource planning (ERP) and discusses the best performing suppliers.

 

Technology value matrix: Human Resources solutions by  ComputerWeekly.com


October 19, 2012 - Recent developments in programming languages and platforms made HR solutions more user friendly and easier to deploy and manage, says analyst Nucleus Research.

 

Technology, Innovation and Change by  ComputerWeekly.com


August 02, 2013 - IT leaders identify the technologies most likely to impact on their organisations approach to change and innovation in this study by Theron LLP and Computer Weekly.

 

Technology, innovation and change: the IT department's view by  ComputerWeekly.com


November 25, 2013 - This exclusive report, based on a survey of UK IT professionals, assesses how CIOs and IT departments are adapting to the challenges of innovation.

 

TechTalk Podcast: Analyst Jon Toigo discusses tape media today by  Iron Mountain


January 24, 2013 - In this exclusive podcast, expert Jon Toigo provides a glimpse into the tape landscape, analyzing its changing role in the data center and what's in store for the future. Hear about options and best practices for tape encryption as well as steps you can take to optimize the performance of this media.

 

TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today by  Iron Mountain


February 11, 2013 - In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.

 

TechTalk Video: Analyst Jon Toigo discusses tape media today by  Iron Mountain


January 23, 2013 - In this exclusive video, expert Jon Toigo analyzes tape's changing role in the data center and discusses the likely future of this technology. Watch this video now to learn various options and best practices for tape encryption, and discover steps you can take to optimize the performance of this media.

 

TechTalk: Stop Malware at the Web Gateway by  BlueCoat


March 24, 2009 - Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.

 

TechTarget ANZ Data Reduction E-Book by  IBM


July 30, 2010 - Few organisations are willing to pay more for storage every year. Data reduction can get you off the treadmill by reducing the amount of data you need to store, backup and manage, and this e-book explains compression, data de-duplication, archiving and several other techniques to achieve this outcome.

 

TechTarget ANZ PC lifecycle management E-Book by  Numara Software


August 04, 2010 - This e-book explores the five key elements of PC Lifecycle management, a practise that can help you to greatly reduce the ongoing costs of operating your PC fleet.

 

TechTarget ANZ Securing Virtualised Data Centres E-Book by  Trend Micro


August 04, 2010 - Virtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them.

 

TechTarget ANZ's guide to a cost-effective and reliable data centre by  APC by Schneider Electric


September 22, 2010 - Virtualisation is known for reducing rack footprint and improving disaster recovery in the data centre. But it can also reduce power and cooling costs, so long as you consider the physical design of your data centre, as this e-book explains.

 

TechTarget ANZ’s guide to upgrading your PBX by  VExpress


October 25, 2010 - Read this guide and discover how a new PBX could trim your telephony costs and boost productivity.

 

TechWiseTV: Switching Secrets for MultiMedia by  Cisco Systems, Inc.


October 28, 2009 - We're adding new dimensions to the globe today as we discover switching secrets for multimedia. This episode of Cisco TechWiseTV looks at Cisco's StackWise technology, the Cisco Catalyst 6500 Series Virtual Switch System (VSS), overlooked security technologies, and how to build out your network to support high-end, full services video.

 

Telco 2015: Five telling years, four future scenarios by  IBM


December 03, 2010 - The telecommunications industry was already in a redefining shift in consumer preferences, business models and infrastructure development prior to the  economic crisis. Faced with challenges in declining revenues, a maturing mobile industry and increased competition from new entrants, the industry finds itself in dire need of new models for growth.

 

Telecom Carrier Offers First-of-its-Kind Cloud Security Solution by  Cisco Systems, Inc.


July 11, 2012 - This case study demonstrates how one telecom provider developed an intelligent visual data analysis engine that allowed them to identify voice and data threats in real time. This provided them with a holistic view of their network environment while bolstering overall data security by securing the voice network.

 

Telecom network vision: New service needs drive change to telecom data center architecture by  Alcatel-Lucent


September 21, 2011 - This expert E-Guide takes a look at the big changes in telecom network management and what you can do to prepare for and adjust to changes in the traditional telecom data center architecture.

 

Telecom Switches Emphasis: Preliminary Analysis of the 2007 Telecom Executive Survey by  IBM Line of Business


June 01, 2008 - To remain competitive as industry boundaries blur, telecom providers recognize the need for new business models and other capabilities beyond their traditional strengths, learn more by downloading this IBM white paper.

 

Telecom Switches Emphasis: Preliminary Analysis of the 2007 Telecom Industry Survey by  IBM


May 01, 2008 - As revenues from traditional telecom services decline, the continual erosion of technology barriers to adjacent industries offers the prospect of new markets for telecom providers.

 

Telecommunications: Future Services and Business Models by  Comarch Telecommunications


June 01, 2008 - With the onset of converged communications that integrate voice, video, text and data, Telecommunication Service providers needs have exploded. This paper examines the many challenges providers and operators face, as well as potential solutions.

 

TeleComputing Case Study: Transform the Data Center by  Vision Solutions


January 31, 2014 - This paper dives into a case study of a telecommunications organization that decided to migrate its enormous VMware environment to Hyper-V, and created a hosted private cloud environment based on a cloud operating system.

 

Telephone Reliability for Alarm Notification: Where Have All the Landlines Gone? by  Sensaphone


June 01, 2008 - This paper discusses why timely and reliable alarm notification is part of a successful remote monitoring program and discusses the factors to consider when selecting a remote monitoring system.

 

Telstra Reaps Transformation Rewards by  Alcatel-Lucent


August 16, 2010 - The business benefits of the IP transformation are numerous. First of all, as you reduce the number of actual networks, you save on software licensing costs, air conditioning and power. Less people are also required because rather than operating many silo networks in standalone mode you now have a common network.

 

TEM for IP Readiness by  AnchorPoint


August 01, 2008 - AnchorPoint TEM solutions provide a business process foundation for companies to systematically prioritize, address and assess their telecom spend - and apply the technologies and services that will yield the highest ROI.

 

Ten benefits for health care practices in EHR selection by  Iron Mountain


March 27, 2012 - For health care facilities still pondering a move to electronic health records, this E-Guide provides a list of 10 EHR benefits that should serve as further incentive toward making the switch.

 

Ten Cooling Solutions to Support High-Density Server Deployment by  APC by Schneider Electric


May 01, 2012 - Access this white paper to discover ten cooling solutions to support high-density server deployment. Read on to learn how your organization can increase cooling efficiency and more.

 

Ten Cooling Solutions to Support High-Density Server Deployment by  APC by Schneider Electric


October 01, 2010 - High-density servers offer a significant performance per watt benefit. But, depending on the deployment, they can present a cooling challenge. This paper provides ten approaches for increasing cooling efficiency, cooling capacity and power density.

 

Ten Cooling Solutions to Support High-density Server Deployment by  Schneider Electric


July 13, 2012 - Access this white paper to discover ten cooling solutions to support high-density server deployment. These strategic approaches can help you increase cooling efficiency, cooling capacity and power density.

 

Ten Errors to Avoid When Commissioning a Data Center by  APC by Schneider Electric


February 03, 2009 - This paper outlines the ten most common errors that prevent successful execution of the commissioning process.

 

Ten Factors To Consider For Business Grade WLANS by  Avaya


December 05, 2011 - Access this whitepaper for a list of 10 key factors to consider when creating a business grade WLAN.

 

Ten IT Skills on the Brink of Extinction by  Global Knowledge


March 21, 2014 - This brief resource talks about the top 10 IT skills that are going to become irrelevant soon. It also highlights what's going to come next in terms of advancing technologies.

 

Ten Key Steps to Effective Succession Planning by  Halogen Software


August 20, 2008 - Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.

 

Ten Mistakes to Avoid by  SAS


April 16, 2014 - Access the following white paper to uncover the top 10 mistakes most organizations make when launching a data governance program. Learn about the common pain points, how to avoid them, and much more.

 

Ten Signs That You Need a New Server by  Dell, Inc. and Microsoft


December 30, 2009 - If you're a small or medium business owner with more than one computer, it's time to consider investing in a server. A server will keep your data secure and organized and will help you run your business more efficiently and professionally. If you've reached one of the 10 thresholds in this paper, a server could do your business a world of good.

 

Ten Signs That You Need a Server by  Dell, Inc. and Intel®


December 30, 2009 - If you'e a small or medium business owner with more than one computer, it's time to consider investing in a server. A server will keep your data secure and organized and will help you run your business more efficiently and professionally. If you've reached one of the 10 thresholds in this article, a server could do your business a world of good.

 

Ten Smart Things to Know About Storage by  NetApp


December 31, 2012 - This white paper details the top ten smart things to know about storage and how you can leverage this information to improve your business operations.

 

Ten Smart Things to Know about Storage by  NetApp


December 31, 2012 - This brief white paper outlines the top ten smart things to know about storage and how it could affect your business.

 

Ten Smart Things to Know About Storage by  Sirius Computer Solutions


August 30, 2013 - Check out this informative paper to explore ten crucial things to know about today's storage and how it can affect your business. Read on to explore topics such as storage scaling, thin provisioning, backup and deduplication and much more.

 

Ten Steps to an Enterprise Mobility Strategy by  iPass Inc.


January 27, 2012 - Ensure traveling employees are productive while you control costs and security, with an enterprise mobility strategy.

 

Ten Steps to Better Requirements Management by  IBM


October 01, 2008 - Requirements definition and management is an activity that has the potential to deliver a high, fast ROI. This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management. Read on to learn how better requirements translate into easier, higher quality projects.

 

Ten Steps to Better Requirements Management White Paper by  IBM


October 01, 2008 - This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management.

 

Ten Steps to Increasing Data Center Efficiency and Availability through Infrastructure Monitoring by  Emerson Network Power


November 16, 2011 - This white paper details 10 solutions to take your data center from reactive to proactive.

 

Ten Steps to Protecting Your Sensitive Data by  McAfee.


December 17, 2010 - Data loss prevention has become a major focus for companies of all sizes. One reasonis for this is mobile employees carry an increasingly large collection of sensitive data. How can you protect your organization's sensitive data from loss or theft? Read these ten steps.

 

Ten Things to Avoid in a Data Model by  CA ERwin from CA Technologies


August 01, 2010 - The construction of a data model is one of the more difficult tasks of software engineering and is often pivotal to the success or failure of a project. Many factors determine the effectiveness of a data model. In this white paper, industry expert Michael Blaha covers the Top 10 pitfalls to avoid — from both the strategy and detail perspective.

 

Ten Things to Avoid in a Data Model by  CA ERwin from CA Technologies


April 20, 2011 - The construction of a data model is one of the more difficult tasks of software engineering and is often pivotal to the success or failure of a project. Many factors determine the effectiveness of a data model. In this white paper, industry expert Michael Blaha covers the Top 10 pitfalls to avoid - from both the strategy and detail perspective.

 

Ten Things You Need to Know about Virtualization by  DataCore Software Corporation


November 19, 2009 - Thinking of making the move to “total enterprise virtualization?" Here are some interesting points of view about virtualization you should know coming from the vantage point of a storage virtualization pioneer, DataCore Software.

 

Ten Tips for Change Data Capture (CDC): How to Maximize Data Integration Value in Analytic and Operational Systems by  HiT Software, Inc.


October 04, 2010 - This paper will describe how Change Data Capture (CDC), a specialized function of data integration, can optimize value in both analytical and operational systems within a data-driven environment. Continue reading this paper to learn more about these ten tips for CDC and learn how to maximize data integration value in analytic operational systems.

 

Ten Tips for Effective Lead Management by  Marketo


March 01, 2008 - Learn 10 tips for effective lead management that will enable you to create more educated buyers, help you better understand their needs and ultimately increase revenue.

 

Ten Tips for Reducing Storage TCO by  LSI Corporation


October 01, 2008 - This white paper outlines the top ten strategic steps that should be taken to reduce the Total Cost of Ownership (TCO) of a storage infrastructure.

 

Ten Top Problems Network Techs Encounter by  Fluke Networks


July 01, 2009 - This whitepaper discusses ten common problems encountered by network technicians today and their symptoms, causes, and resolutions.

 

Ten top problems network techs encounter by  Fluke Networks


April 18, 2011 - This whitepaper discusses ten common problems encountered by technicians today and their symptoms, causes, and resolutions.

 

Ten top problems network techs encounter by  Fluke Networks


October 14, 2010 - This white paper discusses ten common problems encountered by technicians today and their symptoms, causes, and resolutions.

 

Ten Ways Hackers Breach Security by  Global Knowledge


January 01, 2007 - Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.

 

Ten Ways SMBs Can Get More from Their IT Budgets by  Dell and VMware


December 31, 2008 - Virtualization technology presents a number of opportunities for driving capital and operational efficiency for SMBs. Read this brief paper to learn ten cost-saving strategies.

 

Ten Ways the IT Department Enables Cybercrime by  Kaspersky Lab


February 08, 2011 - In this paper to discover 10 ways IT departments are unknowingly supporting cybercrime. View now to explore these common pitfalls and gain key guidelines on how to prevent them.

 

Ten Ways to Dodge CyberBullets by  ESET


April 16, 2010 - This paper comes from a series of blogs from the beginning of 2009 and based on that material, it’s been updated here with more recent material from other members of ESET’s research teams across the globe. Read more to find out.

 

Ten Ways to Dodge CyberBullets: Reloaded by  ESET


January 26, 2012 - In this paper, ESET research teams revisit their top ten list on what people can do to protect themselves against malicious activity, and offers key advice based on today’s changing environments, while still applying the basic principles.

 

Ten Ways to Establish a Strategic Advantage in Managing Change by  IBM


June 17, 2009 - This paper offers ways that companies can establish a strategic advantage in managing change. It suggests a structured approach to managing change amid the complexity of smarter product development in which the rapid evolution of software plays a major part.

 

Ten ways to manage data growth and other top storage challenges by  IBM


October 31, 2011 - This white paper describes ten ways that IBM's highly scalable data protection software can help organizations save money while addressing their data storage challenges, including those associated with exponential data growth.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts