T Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
T Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
 

Ten Tips for Reducing Storage TCO by  LSI Corporation


October 01, 2008 - This white paper outlines the top ten strategic steps that should be taken to reduce the Total Cost of Ownership (TCO) of a storage infrastructure.

 

Ten top problems network techs encounter by  Fluke Networks


October 14, 2010 - This white paper discusses ten common problems encountered by technicians today and their symptoms, causes, and resolutions.

 

Ten top problems network techs encounter by  Fluke Networks


April 18, 2011 - This whitepaper discusses ten common problems encountered by technicians today and their symptoms, causes, and resolutions.

 

Ten Top Problems Network Techs Encounter by  Fluke Networks


July 01, 2009 - This whitepaper discusses ten common problems encountered by network technicians today and their symptoms, causes, and resolutions.

 

Ten Ways Hackers Breach Security by  Global Knowledge


January 01, 2007 - Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.

 

Ten Ways SMBs Can Get More from Their IT Budgets by  Dell and VMware


December 31, 2008 - Virtualization technology presents a number of opportunities for driving capital and operational efficiency for SMBs. Read this brief paper to learn ten cost-saving strategies.

 

Ten Ways the IT Department Enables Cybercrime by  Kaspersky Lab


February 08, 2011 - In this paper to discover 10 ways IT departments are unknowingly supporting cybercrime. View now to explore these common pitfalls and gain key guidelines on how to prevent them.

 

Ten Ways to Dodge CyberBullets by  ESET


April 16, 2010 - This paper comes from a series of blogs from the beginning of 2009 and based on that material, it’s been updated here with more recent material from other members of ESET’s research teams across the globe. Read more to find out.

 

Ten Ways to Dodge CyberBullets: Reloaded by  ESET


January 26, 2012 - In this paper, ESET research teams revisit their top ten list on what people can do to protect themselves against malicious activity, and offers key advice based on today’s changing environments, while still applying the basic principles.

 

Ten Ways to Establish a Strategic Advantage in Managing Change by  IBM


June 17, 2009 - This paper offers ways that companies can establish a strategic advantage in managing change. It suggests a structured approach to managing change amid the complexity of smarter product development in which the rapid evolution of software plays a major part.

 

Ten ways to manage data growth and other top storage challenges by  IBM


October 31, 2011 - This white paper describes ten ways that IBM's highly scalable data protection software can help organizations save money while addressing their data storage challenges, including those associated with exponential data growth.

 

Tennis Australia scores big with IBM® XIV® Storage Systems by  IBM


March 22, 2011 - With the pressure and exposure of major international tournaments, Tennis Australia had a compelling need for reliable, easy-to-manage storage that could scale quickly. IBM served up their XIV Storage System, which dramatically reduced downtime, cut costs, and simplified storage management. Read this case study for more.

 

Tenzing Resource Center by  Tenzing Managed IT Services


June 29, 2010 - Welcome to Tenzing's new Managed Hosting Resource Center. Tenzing's resource center provides information such as news articles, white papers, and webinar broadcasts concerning managed hosting services from in-house and third-party sources that can help you make the right hosting choices for your organization.

 

Tera1100 PC-over-IP Portal Processor Product Brief by  Teradici Corporation


March 01, 2008 - The TERA1100 Portal Processor is designed to be integrated into a Desktop Portal, a small device at the end-user's desk.

 

Tera1200 PC-over-IP Host Processor Product Brief by  Teradici Corporation


March 10, 2008 - This product brief provides IT administrators with key information to better manage their commercial PC environments.

 

Teradata Active Data Warehouse Private Cloud: Mitigate Risk and Meet Dynamic Business Needs by  Teradata


July 02, 2012 - Check out this article now to learn about public v. private clouds and how they stack up when it comes to mitigating risk and meeting business needs.

 

Teradata Aster Discovery Portfolio by  Teradata


February 03, 2014 - Access the following white paper to uncover a discovery and analytics platform that can give you more insight from your big data than what can be found with multiple systems. Get a firsthand look at how an all-inclusive discovery system can deliver faster and more powerful insights, ultimately improving your functions and profitability.

 

TeradiciAPEX™2800: Addressing the next VDI bottleneck by  Teradici Corporation


May 21, 2013 - Read this white paper to learn about an advanced solution that can mitigate the IT management challenges that virtual desktop infrastructure (VDI) can introduce.

 

Terrorist use of the internet by  ComputerWeekly.com


May 23, 2014 - Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats?

 

Test and simulate rules using WebSphere ILOG Business Rules Management System by  IBM


December 12, 2010 - Learn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.

 

Test Automation: Exploring Automation Case Studies in Agile Development by  CA Technologies.


May 02, 2012 - Read this article to hear from experts Dorothy Graham and Mark Fewster as they discuss the takeaways from 28 test automation case studies in agile application development. Learn how you can implement test automation in your organization quickly and easily.

 

Test Data Management for Security and Compliance by  EMC Corporation


December 31, 2013 - As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.

 

Test lab automation on the cloud by  IBM


December 31, 2011 - As many frustrated teams can attest to, manually setting up test labs requires an inordinate amount of resources and drags down development efficiency with its time-consuming complexity. Read this white paper to learn how test lab automation in the cloud can provide a cost- and resource-effective alternative to accelerate application testing.

 

Test Management: Managing quality in the Agile Enterprise by  SearchSoftwareQuality.com


March 11, 2013 - In this E-Book, explore four main concerns in switching to an Agile software development environment: performance metrics, defect tracking, ALM dashboards, and reducing testing costs.

 

Test Management: Measuring Quality in the Agile Enterprise by  Micro Focus


July 01, 2012 - The methods of measuring software quality in an agile environment are drastically different from tactics used in traditional IT landscapes. Discover why the "plan the work, then work the plan" technique doesn't work with agile IT, the 10 agile metrics you should be tracking, 3 questions to help determine when to start tracking defects, and more.

 

Test Management: Measuring Quality in the Agile Enterprise by  SearchSoftwareQuality.com


October 16, 2013 - In this eBook, experts will look at key metrics collected throughout the Agile life cycle to help managers get the data they need to determine when the application is ready to go live.

 

Test Report: Dell Blade, Storage and Network Solutions by  Dell and Microsoft


November 07, 2013 - This white paper reveals the results of a test of three blade server solutions over three scenarios.

 

Test without writing a single line of code…really by  Hewlett-Packard Company


November 25, 2013 - In this webcast, you will see how a customer is increasing the speed and effectiveness of their packaged apps testing projects by using best practices and testing accelerators. Inside, learn about solutions that can enhance development and testing efforts for business-critical systems that organizations rely on.

 

Testimonial: Cystic Fibrosis Trust by  CommVault Systems, Inc.


March 07, 2014 - View the following webcast to reveal the solution Cystic Fibrosis Trust used to improve their information governance strategies that ultimately allowed them to decrease time to compliance, improve data insights, and more.

 

Testing and Quality Management - Best Practices by  SAP America, Inc.


February 28, 2010 - <p>Read this white paper to learn the best practices for testing and configuration that Aberdeen's best-in-class designated organizations used to reduce operating costs by 26% and improve process efficiencies by 41% so you can adopt them to create a streamlined, stable IT environment for your business.</p>

 

Testing and Quality Tools for Modern Applications by  Hewlett-Packard Company


December 31, 2013 - Do you have everything you need to execute effective tests every time? Take a look at this product info sheet to explore a variety of quality and test automation software options, as well as the benefits of each

 

Testing as Managed Services - TMS by  Wipro Technologies


February 27, 2009 - Testing as Managed Service' also known as TMS is a delivery model which encompasses all the QA activities across project, programs and organization across enterprise domain. This document analyzes the challenges faced in testing enterprise applications and explains some enefits from successful implementation of TMS.

 

Testing Doesn't Raise Barriers, It Eliminates Them by  CSC


November 30, 2013 - Did you know the cost to fix bugs after an application release can be 30 to 40 times more than for defects identified during development? Since it's a key consideration for developers to release applications quickly, it may seem like adding more testing could slow down the process -- but that couldn't be farther from the truth.

 

Testing Embedded Systems: Do You Have the GuTs for It? by  IBM Software Group


March 01, 2008 - This article is a general introduction to the testing of embedded systems, and will be followed over the course of the year by more articles focusing on some of the topics discussed.

 

Testing Multiplay Networks by  Ixia


June 01, 2008 - As the Internet evolves, a wider variety of multiplay services are carried from broadly distributed sources to a large and varied audience of consumers.

 

Testing Report Enterprise Firewalls by  Cisco


July 31, 2012 - This white paper features a top appliance that includes firewall, VPN, and IPS security services, and doesn't hinder overall performance.

 

Testing the Cloud: Definitions, Requirements, and Solutions by  Ixia


May 02, 2014 - Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.

 

Testing the Performance of Applications Over Wide Area Networks by  Apposite Technologies


September 09, 2010 - IT managers and network administrators therefore need to be able to troubleshoot how applications perform over the wide-area network. However, because application performance can be highly sensitive to bandwidth, latency, loss, and other WAN impairments, testing on the local network generally fails.

 

Testing your Windows 7 Migration Strategy by  AppSense


February 01, 2012 - Migrating to Windows 7 can be a costly, complex and time consuming project. Learn how virtualization can actually reduce the time and cost of a Windows 7 migration while ensuring maximum user adoption. Inside, take our quick challenge to test your Windows 7 migration plan. Discover the advantages and pitfalls of a user virtualization strategy.

 

TestStand 2.0.1 – Reducing the Cost of Manufacturing Test by  National Instruments


April 01, 2002 - With TestStand, manufacturing test developers create automated test systems that dramatically reduce the cost of testing products by increasing throughput and reducing test development time.

 

Text Analytics in the BI Ecosystem by  Sybase, an SAP company


October 28, 2010 - An estimated 80% of enterprise-relevant information resides in text and unstructured forms. Text analytics transforms text into data for BI, data mining, and predictive analytics. This paper reviews business benefits and technical challenges related to taming text. It also introduces text technologies and surveys noteworthy business applications.

 

Text Analytics: Two Worlds Collide by  SAS


July 29, 2010 - We're all suffering from information overload. We can’t consume the volume of information that we receive every day, so if we think it might be valuable, we try to file it in a safe place for use at some time in the future. Read this white paper to learn more about the latest mashup for business analysts, Text Analytics.

 

Text Mining and Analysis: Practical Methods, Examples, and Case Studies Using SAS by  SAS


May 05, 2014 - The following digital book, Text Mining and Analysis Practical Methods, Examples, and Case Studies Using SAS, provides the reader with a solid foundation to successfully leverage text analytics. Understand core components, strategies, and much more.

 

Textron Systems’ Manufacturing Operations Flies High by  Apriso Corporation


December 31, 2010 - Read this brief case study to learn how aerospace and defense development and manufacturing firm Textron Systems benefited from implementing a single, integrated platform to address their manufacturing operations management needs.

 

That Was Then This Is Now: The New Rules of Email Marketing by  Silverpop Systems Inc.


August 01, 2008 - In this new era of CAN-SPAM legislation, overflowing inboxes and ever-increasing customer expectations, many of the practices that worked for emailers in the past simply won't work anymore. This paper reviews the new rules of email marketing.

 

That's why you should consider a managed private cloud! by  HP & Intel®


November 14, 2013 - Organizations are experiencing challenges with internal cloud deployments, which is why the alternative private cloud system is the best solution to this problem.

 

Thawte in Education by  Thawte Inc.


September 30, 2013 - Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.

 

The "Hard Truths" About Managing Administrative and Application Identities by  Cyber-Ark Software


July 16, 2008 - This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.

 

The (Business) Day After: Making a Double Rebound from Disaster by  Iron Mountain


February 28, 2012 - This white paper has today's best practices and keys to help you get back on your feet even if your backup data has been lost. Receive a backup maintenance checklist with key questions to ask regarding your backup strategies, discover common backup challenges and more. Read on to ensure you're prepared for the worst.

 

The 10 Best Practices for Performance Management by  Gomez


August 03, 2009 - Read this paper to learn the 10 best practices in performance management and how to apply them to your company and your online store to increase the overall customer experience, which is important now more than ever.

 

The 10 Commandments of a Successful Oracle E-Business R12 Upgrade by  Dell Software


October 04, 2011 - This white paper provides 10 key best practices to help your organization effectively manage change to your enterprise resource planning (ERP) systems, with particular attention to upgrading to R12.

 

The 10 Critical Steps to Selecting an EHR by  HP & Intel®


March 05, 2013 - Don't be another statistic in the failed world of EHR. This e-guide from SearchHealthIT.com outlines the critical objectives that must be met in order to ensure a thorough EHR assessment. Read now for ten steps sure to guide you in the right direction during your EHR selection stage.

 

The 10 Most Dangerous Risks to Microsoft Security by  Global Knowledge


May 13, 2009 - Security has always been an important part of any IT infrastructure. This white paper has tips to help improve your awareness of some of the more important risks threatening your Microsoft infrastructure.

 

The 10 Most Important Technology Trends In Business Application Architecture Today by  Progress


September 23, 2013 - This report enumerates the Top 10 technology trends that are reshaping the nature and value proposition of business applications today and in the future.

 

The 10 most overlooked payroll pitfalls by  Ultimate Software


February 07, 2011 - While most common payroll process errors are avoidable, they are also easily overlooked. Unfortunately even the smallest errors can lead to long-term issues and increased expenses. Read more to find out the top 10 payroll pitfalls and how to prevent them.

 

The 10 myths of safe web browsing by  Sophos, Inc.


October 04, 2010 - Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? If you answered “Yes” to any of these questions, you need to read the rest of this report.

 

The 10 worst practices for Technical Support and how to overcome them by  NTR Global


November 17, 2011 - Delivering superior service and support is more important than ever as companies strive to differentiate themselves from the competition. In many organizations, service quality is governed by self-harming "worst practices" instead of productive best practices. Learn what these practices are and how to avoid them.

 

The 10 Worst Practices for Technical Support and How to Overcome Them by  NTR Global


October 29, 2009 - This white paper will explore 10 of the "worst practices" that are common to customer support operations. We will discuss how these worst practices can creep in to your contact center and ways to deal with them. We will also touch on how to eliminate well‐intentioned management blunders and discuss good and bad uses of support technology.

 

The 10 “Must-Haves” for Secure Enterprise Mobility by  Citrix


June 01, 2014 - This informative paper examines the common security issues surrounding BYOD and provides ten helpful "must-haves" for ensuring that your mobile initiatives are safe and secure.

 

The 101 Guide To The Cloud by  Rackspace Hosting


November 16, 2010 - You may have heard the term cloud computing or 'the Cloud', but could you describe what it is?

 

The 11 Secrets of Business Rules Success: How to balance speed quantity when building a rules-based approach to Decision Management by  FICO


March 10, 2011 - Based on decades of experience developing decision management applications, FICO has developed 11 steps to help you make the most of business rules. This paper shares these secrets and addresses picking the right application and development approach, writing rules as effectively as possible, plus much more.

 

The 11 security commandments - Jericho Forum by  ComputerWeekly.com


November 10, 2010 - The Jericho Forum commandments define both the areas and the principles that must be observed when planning for a de-perimeterized future.

 

The 18 Social Business Imperatives by  Jive Software


January 10, 2014 - Access the following white paper to uncover 18 social business imperatives. Find out what knowledge, tools, and strategies you need to capitalize on the second wave of the social rise.

 

The 2004 Oversight Systems Financial Executive Report on Sarbanes-Oxley by  Oversight Systems


August 14, 2008 - Through a combination of an invitation-only online survey and survey intercepts, 222 corporate financial leaders from across the U.S. participated in this study on corporate attitudes toward Sarbanes-Oxley compliance.

 

The 2007 ERP in Manufacturing Benchmark Report by  Epicor Software Corporation


May 01, 2008 - This report aims to serve as a roadmap to those in the manufacturing community who desire to reduce costs, improve accuracy of inventory schedules, and develop customer responsiveness through successful ERP implementations.

 

The 2007 Regulatory Compliance Executive Survey by  Polivec


April 25, 2008 - The findings in this report were taken from 142 respondents to an online survey administered in 2007. Participants were primarily senior business executives and professionals in the compliance and IT fields from a broad array of industries.

 

The 2008 (ISC)2 Global Information Security Workforce Study by  ISC2


May 01, 2008 - Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.

 

The 2008 ERP in Manufacturing Benchmark Report by  Infor


September 04, 2008 - This report explores feedback provided by over 1200 manufacturers, and aims to serve as a roadmap to those in the manufacturing community that desires to reduce costs, and develop customer responsiveness through successful ERP implementations.

 

The 2008 Hosted Exchange Server Buyers Guide by  Bsafe Information Systems


November 01, 2008 - This paper provides hosted Exchange providers to ensure that you select a provider who is reputable and will recommend a solution that will help increase your corporate profitability and success.

 

The 3D Scaling Advantage: How 3D Scaling Drives Ultimate Storage Efficiency by  Hitachi Data Systems


January 28, 2011 - This white paper sponsored by Hitachi Data Systems, looks at the advantages of implementing an efficient storage system through virtualization. Read on to learn more!

 

The 5 Levels of Corporate Performance Management (CPM) Maturity: Climbing to the Top Floor by  Prophix Software


April 15, 2014 - Tune into this webcast to discover the 5 levels of CPM maturity, and learn how to get from spreadsheet chaos to the precise alignment of business strategy with CPM initiatives that drive business growth.

 

The 5 Point Plan to ERP Selection Success by  Infor


March 08, 2012 - Read this white paper and learn a five step plan for choosing the right enterprise resource planning (ERP) software for the specific business challenges you want your system to address, thus ensuring implementation success.

 

The 7 Biggest Mistakes You Can Make in Web Conferences by  Citrix Online Go To Meeting


December 30, 2013 - In this white paper, unveil the top 7 biggest things to avoid when conducting web conferences so that you can efficiently and effectively lead meetings even when online.

 

The 7 Key Components for an Effective Case Management Methodology by  ASG Software Solutions


May 05, 2010 - Case management is a care delivery framework with the potential to relieve three of the most significant pressures facing hospital leaders. The purpose of this paper is to illustrate a number of ways in which hospital case management can and does produce clinical, operational, and financial benefits for the organizations that employ them.

 

The 7 Keys to MSP Success by  N-able Technologies


April 25, 2014 - This informative guide explores 7 key tips for MSP success and how you can provide top-tier services.

 

The 8 Worst Practices in Master Data Management and How to Avoid Them by  Information Builders


May 15, 2014 - Real-time decision making is essential to gain competitive advantage, and to make the best decisions, you need accurate, complete, and timely data -- you need master data management (MDM). View this white paper to discover the eight worst possible practices of MDM and how to avoid them

 

The 8 Worst Practices in Master Data Management and How to Avoid Them by  Information Builders


August 26, 2013 - The road to a successful master data management (MDM) program can be full of detours and dead ends. In this white paper, Dan Power and Julie Hunt from Hub Designs identify the eight worst practices when planning and designing a MDM and data governance program, and show you how to get it right.

 

The 8 Worst Practices in MDM and How to Avoid Them by  Information Builders


September 03, 2013 - Learn how you can keep up with the times with master data management and data governance. This resource explains how MDM is a key foundation for trusted data and more efficient business processes. Read on to find out how to improve your master data.

 

The A to Z of Mobile Workforce Scheduling Optimization by  ClickSoftware


December 31, 2011 - This resource offers key advice and recommendations for strategically choosing and implementing an effective mobile workforce scheduling optimization strategy. Continue reading to learn all you need to know to realize workforce scheduling success today.

 

The ABCs of Adopting DevOps by  IBM


May 31, 2013 - View this white paper to learn how a DevOps strategy can eliminate bottlenecks that occur during the handoff between development and operations while reducing time to customer feedback, improving governance, and balancing quality and cost.

 

The ABCs of CDP: What you need to know by  FalconStor Software


June 17, 2011 - The Storage Networking Industry Association (SNIA) defines CDP as "a class of mechanisms that continuously capture or track data modifications enabling recovery to previous points in time." In part two of this tutorial on continuous data protection backup, learn how CDP is being used today, and about the latest CDP products.

 

The ABCs of continuous release and deploy in a DevOps approach by  IBM


May 31, 2013 - In this resource, explore the bottlenecks that slow down software delivery and learn how you can overcome them by creating better collaboration through DevOps. Get an in-depth look at how to achieve the continuous release and deployment adoption path to DevOps, with specific examples of each step in the process.

 

The Accelerated SMB: Moving at the Speed of Virtualization by  AMD


August 09, 2011 - IT is a strategic partner in businesses of all types and sizes, but especially in the small to medium-sized business. Take a look at this exclusive resource to learn how virtualization is a relevant and practical method for the growing SMB to streamline processes and reduce operational costs.

 

The Accelerated Value Program for IBM Cognos Lifecycle Manager - A flexible approach for advanced support assistance by  IBM


January 13, 2014 - Access the following white paper to uncover how a lifecycle manager for Cognos can offer you the ability to easily transition to the most recent versions of Cognos—freeing up the time and allotting the skills needed to successfully manage future upgrades on your own.

 

The ACE up Your Sleeve by  CSC


April 30, 2012 - Access this resource to learn about an "application cloud enablement" technology - providing strategy, infrastructure, and change capabilities - that makes it quicker, cheaper, and less risky to migrate legacy apps to the cloud.

 

The Acronis Global Disaster Recovery Index: 2011 by  Acronis


January 28, 2011 - When it comes to successfully recovering from a serious incident the Australians were the least confident. Just 22% of Australian businesses felt that they would be able to recover quickly in the event of downtime, compared to a global average of 50%.

 

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering by  Citrix


May 07, 2014 - This informative whitepaper explores the importance of application delivery controllers and why they are essential to the performance of your data centers and networks.

 

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering by  Citrix


January 03, 2014 - One of the most critical parts of your network and data center are application delivery controllers. This guide explores the unique role that ADC plays for networking professionals and how they are utilizing them for their networks.

 

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools? by  Dell Software


October 02, 2009 - Windows Server 2008 R2 offers a number of exciting new features, including an expanded Server Core offering, new Active Directory features, and - of special interest to anyone who has ever wished Active Directory had an “undo” button - a sort of recycle bin for Active Directory objects.

 

The Advantage of Service Provider Cloud Solutions vs. Do-It-Yourself (DIY) Internal Cloud Computing Strategies by  SAVVIS


February 02, 2011 - Few technological innovations have garnered as much broad-based attention as the idea of Cloud Computing, which promises faster access to more powerful processing capabilities and application functionality at a fraction of the cost of traditional on-premise systems and software.

 

The Advantages of a Hosted Security Model by  Websense, Inc.


June 01, 2008 - Learn how organizations today are responding to new types of email threats. This white paper discusses how a hosted security is now a viable solution for organizations and is increasingly deployed to ensure better security and reduced costs.

 

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions by  SonicWALL


April 01, 2008 - Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective.

 

The Advantages of Multi-Core UTM by  SonicWALL


November 18, 2008 - The newest trend in firewall protection is Unified Threat Management (UTM) that not only guards against intrusion, but performs content filtering, data leakage protection, intrusion detection and anti-malware duties.

 

The Advantages of Virtualized Linux for Business-Critical Applications by  SUSE


April 18, 2013 - This expert paper explains how migrating from UNIX-based systems to Linux standard-based servers can simplify the virtualization of your critical applications, enabling improved performance, reliability and agility.

 

The Age of Agility: Business Intelligence for your Business by  IBM


February 22, 2012 - Be the first to check out the inaugural issue of Click, an e-zine full of insightful articles dedicated to helping you discover the business and IT solutions that work well for you. This edition is packed with vital information on everything from business intelligence (BI) and cloud computing to collaboration and social networking tools.

 

The Age of Compliance: Preparing for a Riskier and More Regulated World by  SAP America, Inc.


February 10, 2011 - Most organizations find managing risk and compliance a challenge – but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise – and protect both corporate performance and reputation.

 

The Age of Electronic Ticketing by  Hexaware Technologies


May 01, 2008 - Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations.

 

The Agile Architect - Agile Development: Three pillars of success by  IBM


November 08, 2013 - With a goal of continuous software delivery, fast pace, and high quality, Agile developers need the right skills and tools to achieve their goals. In this informative webcast, discover the three pillars necessary for Agile success.

 

The Agile Business Analyst by  VersionOne Inc.


September 26, 2008 - This white paper discusses the significant impact of agile development techniques on the business analyst community. Gain insight into the skills required by analysts for effective agile development, as well as the steps for a transition to agile...

 

The Agile CFO: Enabling the Innovation Path to Growth by  IBM Line of Business


June 01, 2008 - This paper proposed several actions financial executives can take to become agile CFOs.

 

The Agile Checklist by  VersionOne Inc.


July 24, 2009 - This paper presents a set of agile meeting and facilitation checklists that offer an easy framework to help guide software development teams through the various agile cycles. Read on to learn about the Agile Development Rhythms and start using the checklists presented herein to help get through the various agile cycles.

 

The Agile Data Warehouse Webinar - Next Generation BI by  RightScale


February 24, 2010 - Watch this webinar and find out about the new approach to Business Intelligence (BI) that takes advantage of the cloud as a disruptive technology combined with next-generation software applications.

 

The Agile Project Manager by  VersionOne Inc.


June 08, 2009 - This white paper will explore the impact agile development methodologies are having on the Project Management community, what new skills are required, and what the Project Manager can do to ease the transition.

 

The Agility Gap in Today's Private Clouds by  Red Hat


August 08, 2013 - Check out this white paper to explore the current challenges businesses are facing in terms of agility that private clouds have and learn how to overcome these challenges to achieve true business agility.

 

The Alcatel-Lucent OmniAccess 8550 WebServices Gateway: AUTOMATED WORKFLOW FOR IMPROVED PAT IENT CARE by  Alcatel-Lucent


April 01, 2008 - The Alcatel-Lucent OmniAccess 8550 Web Services Gateway is a network appliance that secures automated business processes to meet corporate governance obligations.

 

The Alignment-Focused Organization: Bridging the Gap Between Strategy and Execution by  SAP America, Inc.


November 01, 2007 - Take a look at how organizations are taking strides to align business strategy with actual initiatives, projects, and daily activities - in short, to close the gap between strategy and execution.

 

The All New 2010 Intel Core vPro Processor Family and Windows 7: Your Best Choice for Business PCs by  Intel


January 25, 2010 - The all new Intel® Core™ vPro™ processor family complements the new Windows® 7 operating system by building effective trusted computing and management mechanisms into the hardware. Read this paper to learn more.

 

The Always Online Single-Instance Database by  Oracle Corporation UK Ltd


December 31, 2009 - Availability is a growing concern for all customers.  Information, and the databases underlying that information, have become more and more integral to business processes and products.

 

The AMD Opteron 6000 Series Platform: Revolutionizing Server Price/Performance by  AMD


July 02, 2010 - This white paper discusses the market dynamics driving demand for value 4P servers, explains how the AMD Opteron 6000 Series platform satisfies that demand, and explores the practical implications of the value 4P server’s breakthrough combination of performance, scalability, and value.

 

The Analytics Revolution: Optimizing Reporting and Analytics to Make Actional Intelligence Pervasive by  IBM


November 29, 2010 - 15 petabytes of new information are generated every day. And 80% of it is unstructured data. Don’t let it get in the way of your decision-making. This analyst paper describes how optimizing reporting and analytics can make actionable intelligence pervasive in your organization.

 

The Anatomy of a Cross-Site Scripting Campaign by  Imperva


August 23, 2010 - XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.

 

The Anatomy of a Vendor Neutral Archive (VNA) Done Right: The Case for Silo Busting by  Iron Mountain


September 14, 2011 - PACs systems are expensive to support and the rising volume of medical image data is outpacing the limited functionality of the traditional PACS archive. So how can healthcare facilities ensure that medical images are securely stored, while meeting EHR compliance requirements? Learn about the storage and data management options available to help.

 

The Anytime, Anyplace World: Choosing the Right Mobile Connectivity Strategy for Your Enterprise by  Nokia


January 11, 2008 - From the globetrotting CEO to the roving field engineer, portable devices such as mobile phones, laptop computers, and business devices have radically changed the way people work.

 

The Anywhere Worker: Essential Tools to Keep Teams Connected by  Citrix


September 12, 2012 - This white paper takes an in-depth look at the changing role of IT departments in the face of the demand to connect, collaborate and communicate with remote and in-office workers in a similar - if not near exact - fashion. Read now to learn about the best practices and tools available to make this a reality.

 

The Application Compatibility Challenges of Windows Migration by  Dell and Microsoft


May 14, 2013 - In the two years that Windows 7 has been available to the enterprise, many organizations have made the move, and common challenges have been identified. This white paper discusses those challenges, so you know what to expect when planning your migration.

 

The Application Deluge and Visibility Imperative by  Riverbed Technology, Inc.


January 28, 2014 - In this whitepaper from ESG, you’ll discover how to ensure network performance for your business-critical applications by learning about network challenges in modern environments, what tools and technologies forward-thinking organizations are investing in, and more.

 

The Application Migration Workbook by  Citrix Systems, Inc.


July 17, 2012 - Discover how to achieve pain-free application migrations in this essential workbook and guide. Read on to uncover key strategies and technologies that can simplify the process and lay the foundation for more effective application management.

 

The Application Usage and Risk Report by  Palo Alto Networks


June 30, 2010 - The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.

 

The Application Usage and Risk Report by  Palo Alto Networks


December 01, 2011 - This Application Usage and Risk Report from Palo Alto Networks provides a global review of enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide. View now to uncover key findings so that you can build effective strategies to mitigate the risks inherent in certain application.

 

The Applications Handbook - a Guide to mastering the modern app lifecycle by  Hewlett-Packard Company


December 31, 2010 - This e-book explains how to master the challenges of modern application delivery.

 

The Architectural Advantages of Compellent Automated Tiered Storage by  Dell Compellent


November 11, 2010 - With the recent profusion of tiered storage solutions into the enterprise storage market, organizations are increasingly adopting tiering strategies to accommodate rapid data growth while controlling costs. Yet most solutions fail to maximize the potential benefits of tiered storage. Read this white paper to learn more.

 

The Architectural Advantages of Dell Compellent Automated Tiered Storage by  Dell Compellent


April 29, 2011 - Tiered storage solutions are becoming increasingly popular for its ability to accommodate rapid data growth while controlling costs.  Yet many organizations fail to maximize the potential of tiered storage.  Check out this white paper for some best practices to realize the ultimate potential of a tiered storage solution.

 

The Architecture of Next-Generation Intraday Liquidity Risk Management by  IBM


September 30, 2013 - This paper explores potential risk solutions to this challenge, establishing the historic context of liquidity risk management and the specific business problem of intraday liquidity risk.

 

The Art of Teleworking by  Polycom, Inc.


April 06, 2009 - Does teleworking really work? How can a teleworker be as productive as an employee in the office? This white paper covers the advances in technology that make teleworking successful -- and provides solutions for challenges teleworkers may face.

 

The Art of Teleworking by  Polycom, Inc.


October 31, 2011 - This paper analyzes the teleworker's primary challenges and offers ideas for overcoming them. It highlights the advances of technology that make teleworking truly successful and of greater benefit to both teleworkers and their organizations.

 

The Art of the Possible: Rapidly Deploying Cost-Effective Energy-Efficient Data Centers by  IBM


February 01, 2008 - In this white paper, IBM® reveals the next generation data center: scalable, modular data centers (SMDC).

 

The Art, Act and Science of Knowing by  SAS


July 30, 2010 - We are now exiting a historical moment of under managed and only occasionally acted-upon information to an environment requiring much more active, much more intense, much more aggressive information management. You as an executive will be held much more accountable for your data management behaviors. Read this white paper to learn more.

 

The Aruba Mobile Virtual Enterprise: The Next-Generation Network Access Architecture for the Post-Laptop Era by  Aruba Networks, Inc.


March 22, 2011 - Aruba MOVE unifies wired, wireless and remote access into one cohesive access solution - for traveling business professionals, remote office workers, corporate headquarters employees and guests.Access privileges are context aware and this dictates the type of network resources each person is entitled to. Read this paper for more.

 

The Asset Management Personality Quiz by  Dell Software


August 24, 2012 - Access this exclusive white paper to quiz yourself on asset management to learn what you can do to get it done quickly and efficiently.

 

The Associative Experience: QlikView's Overwhelming Advantage by  QlikTech, Inc.


January 21, 2011 - This QlikView Technology White Paper illuminates the inner workings of QlikView’s associative architecture and explains how it fundamentally improves the way people conduct business analysis. The intended audience includes tech-savvy business decision makers and IT pros who are evaluating QlikView.

 

The AT&T Telepresence Solution: Transforming Business at AT&T by  AT&T Corp


April 05, 2010 - This paper details the gains AT&T has achieved from using the AT&T Telepresence Solution: Improved productivity, increased business velocity, controlled costs, strengthened business relationships and reduced environmental impact.

 

The Authoritative ID Store Is Dead - How Cloud Changes Provisioning by  Intel


October 03, 2011 - Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.

 

The Automation Evolution: An Analysis of the Evolution of Automation in Software Quality Management by  IBM


January 25, 2010 - This paper examines the benefits of quality management automation, the progression of its adoption and future opportunities for expanding it.

 

The Avaya Collaborative Cloud by  Avaya


March 30, 2012 - The next wave of cloud computing is upon us. In this resource, discover how you can combine collaboration and networking services to effectively build, deliver, use, and enhance communications in the cloud.

 

The Backbone for Enterprise Cloud-Ready Database Platform by  Dell and Microsoft


June 30, 2013 - This resource introduces a shared infrastructure designed for remote and small office environments, and discusses its usage as a Microsoft SQL Server database platform.

 

The backup appliance that can provide agility for your workloads by  Symantec Corporation


December 27, 2013 - Searching for a backup appliance to support your virtualized data center? This enterprise class appliance leads the integrated purpose-built backup market, with good reason. Read on to learn why.

 

The Backup Target Today by  SearchDataBackup.com


February 11, 2014 - Data backups have evolved dramatically from the days of producing a nightly backup to tape. Modern data protection techniques start with backup targets such as tape libraries and virtual tape libraries to deduplicating disk arrays, integrated backup appliances and the cloud.

 

The Banking Industry Architecture Network and TOGAF by  ComputerWeekly.com


February 20, 2012 - This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.

 

The BARC BI Survey 2012 by  Information Builders


December 31, 2012 - Information Builders ranked highest on numerous key performance indicators (KPIs) across multiple peer groups in BARC's BI Survey 12.

 

The basics of batch in Oracle environments by  Advent Global Solutions Inc.


September 28, 2011 - There are many different ways to manage batch jobs in Oracle depending on the technology. This  tip guide from our editoiral team will teach readers the best practices for approaching batch-job processing.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts