T Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
T Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16

Tera1100 PC-over-IP Portal Processor Product Brief by  Teradici Corporation

March 01, 2008 - The TERA1100 Portal Processor is designed to be integrated into a Desktop Portal, a small device at the end-user's desk.


Tera1200 PC-over-IP Host Processor Product Brief by  Teradici Corporation

March 10, 2008 - This product brief provides IT administrators with key information to better manage their commercial PC environments.


Teradata Active Data Warehouse Private Cloud: Mitigate Risk and Meet Dynamic Business Needs by  Teradata

July 02, 2012 - Check out this article now to learn about public v. private clouds and how they stack up when it comes to mitigating risk and meeting business needs.


Teradata Aster Discovery Portfolio by  Teradata

February 03, 2014 - Access the following white paper to uncover a discovery and analytics platform that can give you more insight from your big data than what can be found with multiple systems. Get a firsthand look at how an all-inclusive discovery system can deliver faster and more powerful insights, ultimately improving your functions and profitability.


TeradiciAPEX™2800: Addressing the next VDI bottleneck by  Teradici Corporation

May 21, 2013 - Read this white paper to learn about an advanced solution that can mitigate the IT management challenges that virtual desktop infrastructure (VDI) can introduce.


Test and simulate rules using WebSphere ILOG Business Rules Management System by  IBM

December 12, 2010 - Learn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.


Test Automation: Exploring Automation Case Studies in Agile Development by  CA Technologies.

May 02, 2012 - Read this article to hear from experts Dorothy Graham and Mark Fewster as they discuss the takeaways from 28 test automation case studies in agile application development. Learn how you can implement test automation in your organization quickly and easily.


Test lab automation on the cloud by  IBM

December 31, 2011 - As many frustrated teams can attest to, manually setting up test labs requires an inordinate amount of resources and drags down development efficiency with its time-consuming complexity. Read this white paper to learn how test lab automation in the cloud can provide a cost- and resource-effective alternative to accelerate application testing.


Test Management: Managing quality in the Agile Enterprise by  SearchSoftwareQuality.com

March 11, 2013 - In this E-Book, explore four main concerns in switching to an Agile software development environment: performance metrics, defect tracking, ALM dashboards, and reducing testing costs.


Test Management: Measuring Quality in the Agile Enterprise by  Micro Focus

July 01, 2012 - The methods of measuring software quality in an agile environment are drastically different from tactics used in traditional IT landscapes. Discover why the "plan the work, then work the plan" technique doesn't work with agile IT, the 10 agile metrics you should be tracking, 3 questions to help determine when to start tracking defects, and more.


Test Management: Measuring Quality in the Agile Enterprise by  SearchSoftwareQuality.com

October 16, 2013 - In this eBook, experts will look at key metrics collected throughout the Agile life cycle to help managers get the data they need to determine when the application is ready to go live.


Test without writing a single line of code…really by  Hewlett-Packard Company

November 25, 2013 - In this webcast, you will see how a customer is increasing the speed and effectiveness of their packaged apps testing projects by using best practices and testing accelerators. Inside, learn about solutions that can enhance development and testing efforts for business-critical systems that organizations rely on.


Testing and Quality Management - Best Practices by  SAP America, Inc.

February 28, 2010 - <p>Read this white paper to learn the best practices for testing and configuration that Aberdeen's best-in-class designated organizations used to reduce operating costs by 26% and improve process efficiencies by 41% so you can adopt them to create a streamlined, stable IT environment for your business.</p>


Testing as Managed Services - TMS by  Wipro Technologies

February 27, 2009 - Testing as Managed Service' also known as TMS is a delivery model which encompasses all the QA activities across project, programs and organization across enterprise domain. This document analyzes the challenges faced in testing enterprise applications and explains some enefits from successful implementation of TMS.


Testing Doesn't Raise Barriers, It Eliminates Them by  CSC

November 30, 2013 - Did you know the cost to fix bugs after an application release can be 30 to 40 times more than for defects identified during development? Since it's a key consideration for developers to release applications quickly, it may seem like adding more testing could slow down the process -- but that couldn't be farther from the truth.


Testing Embedded Systems: Do You Have the GuTs for It? by  IBM Software Group

March 01, 2008 - This article is a general introduction to the testing of embedded systems, and will be followed over the course of the year by more articles focusing on some of the topics discussed.


Testing Multiplay Networks by  Ixia

June 01, 2008 - As the Internet evolves, a wider variety of multiplay services are carried from broadly distributed sources to a large and varied audience of consumers.


Testing Report Enterprise Firewalls by  Cisco

July 31, 2012 - This white paper features a top appliance that includes firewall, VPN, and IPS security services, and doesn't hinder overall performance.


Testing the Performance of Applications Over Wide Area Networks by  Apposite Technologies

September 09, 2010 - IT managers and network administrators therefore need to be able to troubleshoot how applications perform over the wide-area network. However, because application performance can be highly sensitive to bandwidth, latency, loss, and other WAN impairments, testing on the local network generally fails.


Testing your Windows 7 Migration Strategy by  AppSense

February 01, 2012 - Migrating to Windows 7 can be a costly, complex and time consuming project. Learn how virtualization can actually reduce the time and cost of a Windows 7 migration while ensuring maximum user adoption. Inside, take our quick challenge to test your Windows 7 migration plan. Discover the advantages and pitfalls of a user virtualization strategy.


TestStand 2.0.1 – Reducing the Cost of Manufacturing Test by  National Instruments

April 01, 2002 - With TestStand, manufacturing test developers create automated test systems that dramatically reduce the cost of testing products by increasing throughput and reducing test development time.


Text Analytics in the BI Ecosystem by  Sybase, an SAP company

October 28, 2010 - An estimated 80% of enterprise-relevant information resides in text and unstructured forms. Text analytics transforms text into data for BI, data mining, and predictive analytics. This paper reviews business benefits and technical challenges related to taming text. It also introduces text technologies and surveys noteworthy business applications.


Text Analytics: Two Worlds Collide by  SAS

July 29, 2010 - We're all suffering from information overload. We can’t consume the volume of information that we receive every day, so if we think it might be valuable, we try to file it in a safe place for use at some time in the future. Read this white paper to learn more about the latest mashup for business analysts, Text Analytics.


Textron Systems’ Manufacturing Operations Flies High by  Apriso Corporation

December 31, 2010 - Read this brief case study to learn how aerospace and defense development and manufacturing firm Textron Systems benefited from implementing a single, integrated platform to address their manufacturing operations management needs.


That Was Then This Is Now: The New Rules of Email Marketing by  Silverpop Systems Inc.

August 01, 2008 - In this new era of CAN-SPAM legislation, overflowing inboxes and ever-increasing customer expectations, many of the practices that worked for emailers in the past simply won't work anymore. This paper reviews the new rules of email marketing.


That's why you should consider a managed private cloud! by  HP & Intel®

November 14, 2013 - Organizations are experiencing challenges with internal cloud deployments, which is why the alternative private cloud system is the best solution to this problem.


Thawte in Education by  Thawte Inc.

September 30, 2013 - Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.


The "Hard Truths" About Managing Administrative and Application Identities by  Cyber-Ark Software

July 16, 2008 - This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.


The "upwardly mobile" enterprise by  IBM

February 25, 2014 - This critical white paper examines how organizations today are utilizing enterprise mobility technology, highlighting the importance of prioritizing and integrating mobile with other digital investments to develop new and innovative business models that can put you ahead of the pack.


The (Business) Day After: Making a Double Rebound from Disaster by  Iron Mountain

February 28, 2012 - This white paper has today's best practices and keys to help you get back on your feet even if your backup data has been lost. Receive a backup maintenance checklist with key questions to ask regarding your backup strategies, discover common backup challenges and more. Read on to ensure you're prepared for the worst.


The 10 Best Practices for Performance Management by  Gomez

August 03, 2009 - Read this paper to learn the 10 best practices in performance management and how to apply them to your company and your online store to increase the overall customer experience, which is important now more than ever.


The 10 Commandments of a Successful Oracle E-Business R12 Upgrade by  Dell Software

October 04, 2011 - This white paper provides 10 key best practices to help your organization effectively manage change to your enterprise resource planning (ERP) systems, with particular attention to upgrading to R12.


The 10 Critical Steps to Selecting an EHR by  HP & Intel®

March 05, 2013 - Don't be another statistic in the failed world of EHR. This e-guide from SearchHealthIT.com outlines the critical objectives that must be met in order to ensure a thorough EHR assessment. Read now for ten steps sure to guide you in the right direction during your EHR selection stage.


The 10 Most Dangerous Risks to Microsoft Security by  Global Knowledge

May 13, 2009 - Security has always been an important part of any IT infrastructure. This white paper has tips to help improve your awareness of some of the more important risks threatening your Microsoft infrastructure.


The 10 Most Important Technology Trends In Business Application Architecture Today by  Progress

September 23, 2013 - This report enumerates the Top 10 technology trends that are reshaping the nature and value proposition of business applications today and in the future.


The 10 most overlooked payroll pitfalls by  Ultimate Software

February 07, 2011 - While most common payroll process errors are avoidable, they are also easily overlooked. Unfortunately even the smallest errors can lead to long-term issues and increased expenses. Read more to find out the top 10 payroll pitfalls and how to prevent them.


The 10 myths of safe web browsing by  Sophos, Inc.

October 04, 2010 - Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? If you answered “Yes” to any of these questions, you need to read the rest of this report.


The 10 Worst Practices for Technical Support and How to Overcome Them by  NTR Global

October 29, 2009 - This white paper will explore 10 of the "worst practices" that are common to customer support operations. We will discuss how these worst practices can creep in to your contact center and ways to deal with them. We will also touch on how to eliminate well‐intentioned management blunders and discuss good and bad uses of support technology.


The 10 worst practices for Technical Support and how to overcome them by  NTR Global

November 17, 2011 - Delivering superior service and support is more important than ever as companies strive to differentiate themselves from the competition. In many organizations, service quality is governed by self-harming "worst practices" instead of productive best practices. Learn what these practices are and how to avoid them.


The 10 “Must-Haves” for Secure Enterprise Mobility by  Citrix

February 27, 2014 - This informative paper examines the common security issues surrounding BYOD and provides ten helpful "must-haves" for ensuring that your mobile initiatives are safe and secure.


The 101 Guide To The Cloud by  Rackspace Hosting

November 16, 2010 - You may have heard the term cloud computing or 'the Cloud', but could you describe what it is?


The 11 Secrets of Business Rules Success: How to balance speed quantity when building a rules-based approach to Decision Management by  FICO

March 10, 2011 - Based on decades of experience developing decision management applications, FICO has developed 11 steps to help you make the most of business rules. This paper shares these secrets and addresses picking the right application and development approach, writing rules as effectively as possible, plus much more.


The 11 security commandments - Jericho Forum by  ComputerWeekly.com

November 10, 2010 - The Jericho Forum commandments define both the areas and the principles that must be observed when planning for a de-perimeterized future.


The 18 Social Business Imperatives by  Jive Software

January 10, 2014 - Access the following white paper to uncover 18 social business imperatives. Find out what knowledge, tools, and strategies you need to capitalize on the second wave of the social rise.


The 2004 Oversight Systems Financial Executive Report on Sarbanes-Oxley by  Oversight Systems

August 14, 2008 - Through a combination of an invitation-only online survey and survey intercepts, 222 corporate financial leaders from across the U.S. participated in this study on corporate attitudes toward Sarbanes-Oxley compliance.


The 2007 ERP in Manufacturing Benchmark Report by  Epicor Software Corporation

May 01, 2008 - This report aims to serve as a roadmap to those in the manufacturing community who desire to reduce costs, improve accuracy of inventory schedules, and develop customer responsiveness through successful ERP implementations.


The 2007 Regulatory Compliance Executive Survey by  Polivec

April 25, 2008 - The findings in this report were taken from 142 respondents to an online survey administered in 2007. Participants were primarily senior business executives and professionals in the compliance and IT fields from a broad array of industries.


The 2008 (ISC)2 Global Information Security Workforce Study by  ISC2

May 01, 2008 - Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.


The 2008 ERP in Manufacturing Benchmark Report by  Infor

September 04, 2008 - This report explores feedback provided by over 1200 manufacturers, and aims to serve as a roadmap to those in the manufacturing community that desires to reduce costs, and develop customer responsiveness through successful ERP implementations.


The 2008 Hosted Exchange Server Buyers Guide by  Bsafe Information Systems

November 01, 2008 - This paper provides hosted Exchange providers to ensure that you select a provider who is reputable and will recommend a solution that will help increase your corporate profitability and success.


The 2014 Endpoint Security Buyers Guide by  Lumension

August 16, 2013 - This exceptional endpoint security buyer's guide provides clear buying criteria for solutions in anti-malware, mobility, and BYOD. Additionally, scan over 10 questions you should ask when buying this new technology.


The 3D Scaling Advantage: How 3D Scaling Drives Ultimate Storage Efficiency by  Hitachi Data Systems

January 28, 2011 - This white paper sponsored by Hitachi Data Systems, looks at the advantages of implementing an efficient storage system through virtualization. Read on to learn more!


The 5 Key Tactics for Dealing with Advanced Persistent Threats by  Lumension

December 31, 2013 - This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks.


The 5 Point Plan to ERP Selection Success by  Infor

March 08, 2012 - Read this white paper and learn a five step plan for choosing the right enterprise resource planning (ERP) software for the specific business challenges you want your system to address, thus ensuring implementation success.


The 7 Biggest Mistakes You Can Make in Web Conferences by  Citrix Online Go To Meeting

December 30, 2013 - In this white paper, unveil the top 7 biggest things to avoid when conducting web conferences so that you can efficiently and effectively lead meetings even when online.


The 7 Key Components for an Effective Case Management Methodology by  ASG Software Solutions

May 05, 2010 - Case management is a care delivery framework with the potential to relieve three of the most significant pressures facing hospital leaders. The purpose of this paper is to illustrate a number of ways in which hospital case management can and does produce clinical, operational, and financial benefits for the organizations that employ them.


The 8 Worst Practices in Master Data Management and How to Avoid Them by  Information Builders

August 26, 2013 - The road to a successful master data management (MDM) program can be full of detours and dead ends. In this white paper, Dan Power and Julie Hunt from Hub Designs identify the eight worst practices when planning and designing a MDM and data governance program, and show you how to get it right.


The 8 Worst Practices in MDM and How to Avoid Them by  Information Builders

September 03, 2013 - Learn how you can keep up with the times with master data management and data governance. This resource explains how MDM is a key foundation for trusted data and more efficient business processes. Read on to find out how to improve your master data.


The A to Z of Mobile Workforce Scheduling Optimization by  ClickSoftware

December 31, 2011 - This resource offers key advice and recommendations for strategically choosing and implementing an effective mobile workforce scheduling optimization strategy. Continue reading to learn all you need to know to realize workforce scheduling success today.


The ABC's of Big Data by  NetApp

December 31, 2012 - This white paper considers the problems posed by the explosion of big data and provides a framework for evaluating new infrastructure requirements.


The ABCs of CDP: What you need to know by  FalconStor Software

June 17, 2011 - The Storage Networking Industry Association (SNIA) defines CDP as "a class of mechanisms that continuously capture or track data modifications enabling recovery to previous points in time." In part two of this tutorial on continuous data protection backup, learn how CDP is being used today, and about the latest CDP products.


The ABCs of continuous release and deploy in a DevOps approach by  IBM

May 31, 2013 - In this resource, explore the bottlenecks that slow down software delivery and learn how you can overcome them by creating better collaboration through DevOps. Get an in-depth look at how to achieve the continuous release and deployment adoption path to DevOps, with specific examples of each step in the process.


The ABCs of continuous release and deploy in a DevOps approach by  IBM

May 31, 2013 - In this resource, explore the bottlenecks that slow down software delivery and learn how you can overcome them by creating better collaboration through DevOps. Get an in-depth look at how to achieve the continuous release and deployment adoption path to DevOps, with specific examples of each step in the process.


The Accelerated SMB: Moving at the Speed of Virtualization by  AMD

August 09, 2011 - IT is a strategic partner in businesses of all types and sizes, but especially in the small to medium-sized business. Take a look at this exclusive resource to learn how virtualization is a relevant and practical method for the growing SMB to streamline processes and reduce operational costs.


The Accelerated Value Program for IBM Cognos Lifecycle Manager - A flexible approach for advanced support assistance by  IBM

January 13, 2014 - Access the following white paper to uncover how a lifecycle manager for Cognos can offer you the ability to easily transition to the most recent versions of Cognos—freeing up the time and allotting the skills needed to successfully manage future upgrades on your own.


The ACE up Your Sleeve by  CSC

April 30, 2012 - Access this resource to learn about an "application cloud enablement" technology - providing strategy, infrastructure, and change capabilities - that makes it quicker, cheaper, and less risky to migrate legacy apps to the cloud.


The Acronis Global Disaster Recovery Index: 2011 by  Acronis

January 28, 2011 - When it comes to successfully recovering from a serious incident the Australians were the least confident. Just 22% of Australian businesses felt that they would be able to recover quickly in the event of downtime, compared to a global average of 50%.


The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering by  Citrix

January 03, 2014 - One of the most critical parts of your network and data center are application delivery controllers. This guide explores the unique role that ADC plays for networking professionals and how they are utilizing them for their networks.


The Active Directory Recycle Bin: The End of Third-Party Recovery Tools? by  Dell Software

October 02, 2009 - Windows Server 2008 R2 offers a number of exciting new features, including an expanded Server Core offering, new Active Directory features, and - of special interest to anyone who has ever wished Active Directory had an “undo” button - a sort of recycle bin for Active Directory objects.


The Advantage of Service Provider Cloud Solutions vs. Do-It-Yourself (DIY) Internal Cloud Computing Strategies by  SAVVIS

February 02, 2011 - Few technological innovations have garnered as much broad-based attention as the idea of Cloud Computing, which promises faster access to more powerful processing capabilities and application functionality at a fraction of the cost of traditional on-premise systems and software.


The Advantages of a Hosted Security Model by  Websense, Inc.

June 01, 2008 - Learn how organizations today are responding to new types of email threats. This white paper discusses how a hosted security is now a viable solution for organizations and is increasingly deployed to ensure better security and reduced costs.


The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions by  SonicWALL

April 01, 2008 - Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective.


The Advantages of Multi-Core UTM by  SonicWALL

November 18, 2008 - The newest trend in firewall protection is Unified Threat Management (UTM) that not only guards against intrusion, but performs content filtering, data leakage protection, intrusion detection and anti-malware duties.


The Advantages of Virtualized Linux for Business-Critical Applications by  SUSE

April 18, 2013 - This expert paper explains how migrating from UNIX-based systems to Linux standard-based servers can simplify the virtualization of your critical applications, enabling improved performance, reliability and agility.


The Age of Agility: Business Intelligence for your Business by  IBM

February 22, 2012 - Be the first to check out the inaugural issue of Click, an e-zine full of insightful articles dedicated to helping you discover the business and IT solutions that work well for you. This edition is packed with vital information on everything from business intelligence (BI) and cloud computing to collaboration and social networking tools.


The Age of Compliance: Preparing for a Riskier and More Regulated World by  SAP America, Inc.

February 10, 2011 - Most organizations find managing risk and compliance a challenge – but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise – and protect both corporate performance and reputation.


The Age of Electronic Ticketing by  Hexaware Technologies

May 01, 2008 - Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations.


The Age of the Customer Starts with Your Employees by  Hewlett-Packard Limited

February 05, 2014 - This Forrester Research report explores key findings behind employee mobile engagement and how their happiness drives customer satisfaction and ultimately, business growth.


The Agile Architect - Agile Development: Three pillars of success by  IBM

November 08, 2013 - With a goal of continuous software delivery, fast pace, and high quality, Agile developers need the right skills and tools to achieve their goals. In this informative webcast, discover the three pillars necessary for Agile success.


The Agile Business Analyst by  VersionOne Inc.

September 26, 2008 - This white paper discusses the significant impact of agile development techniques on the business analyst community. Gain insight into the skills required by analysts for effective agile development, as well as the steps for a transition to agile...


The Agile CFO: Enabling the Innovation Path to Growth by  IBM Line of Business

June 01, 2008 - This paper proposed several actions financial executives can take to become agile CFOs.


The Agile Checklist by  VersionOne Inc.

July 24, 2009 - This paper presents a set of agile meeting and facilitation checklists that offer an easy framework to help guide software development teams through the various agile cycles. Read on to learn about the Agile Development Rhythms and start using the checklists presented herein to help get through the various agile cycles.


The Agile Data Warehouse Webinar - Next Generation BI by  RightScale

February 24, 2010 - Watch this webinar and find out about the new approach to Business Intelligence (BI) that takes advantage of the cloud as a disruptive technology combined with next-generation software applications.


The Agile Project Manager by  VersionOne Inc.

June 08, 2009 - This white paper will explore the impact agile development methodologies are having on the Project Management community, what new skills are required, and what the Project Manager can do to ease the transition.


The Agility Gap in Today's Private Clouds by  Red Hat

August 08, 2013 - Check out this white paper to explore the current challenges businesses are facing in terms of agility that private clouds have and learn how to overcome these challenges to achieve true business agility.


The Alcatel-Lucent OmniAccess 8550 WebServices Gateway: AUTOMATED WORKFLOW FOR IMPROVED PAT IENT CARE by  Alcatel-Lucent

April 01, 2008 - The Alcatel-Lucent OmniAccess 8550 Web Services Gateway is a network appliance that secures automated business processes to meet corporate governance obligations.


The Alignment-Focused Organization: Bridging the Gap Between Strategy and Execution by  SAP America, Inc.

November 01, 2007 - Take a look at how organizations are taking strides to align business strategy with actual initiatives, projects, and daily activities - in short, to close the gap between strategy and execution.


The All New 2010 Intel Core vPro Processor Family and Windows 7: Your Best Choice for Business PCs by  Intel

January 25, 2010 - The all new Intel® Core™ vPro™ processor family complements the new Windows® 7 operating system by building effective trusted computing and management mechanisms into the hardware. Read this paper to learn more.


The Always Online Single-Instance Database by  Oracle Corporation UK Ltd

December 31, 2009 - Availability is a growing concern for all customers.  Information, and the databases underlying that information, have become more and more integral to business processes and products.


The AMD Opteron 6000 Series Platform: Revolutionizing Server Price/Performance by  AMD

July 02, 2010 - This white paper discusses the market dynamics driving demand for value 4P servers, explains how the AMD Opteron 6000 Series platform satisfies that demand, and explores the practical implications of the value 4P server’s breakthrough combination of performance, scalability, and value.


The Analytics Revolution: Optimizing Reporting and Analytics to Make Actional Intelligence Pervasive by  IBM

November 29, 2010 - 15 petabytes of new information are generated every day. And 80% of it is unstructured data. Don’t let it get in the way of your decision-making. This analyst paper describes how optimizing reporting and analytics can make actionable intelligence pervasive in your organization.


The Anatomy of a Cross-Site Scripting Campaign by  Imperva

August 23, 2010 - XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.


The Anatomy of a Vendor Neutral Archive (VNA) Done Right: The Case for Silo Busting by  Iron Mountain

September 14, 2011 - PACs systems are expensive to support and the rising volume of medical image data is outpacing the limited functionality of the traditional PACS archive. So how can healthcare facilities ensure that medical images are securely stored, while meeting EHR compliance requirements? Learn about the storage and data management options available to help.


The Anytime, Anyplace World: Choosing the Right Mobile Connectivity Strategy for Your Enterprise by  Nokia

January 11, 2008 - From the globetrotting CEO to the roving field engineer, portable devices such as mobile phones, laptop computers, and business devices have radically changed the way people work.


The Anywhere Worker: Essential Tools to Keep Teams Connected by  Citrix

September 12, 2012 - This white paper takes an in-depth look at the changing role of IT departments in the face of the demand to connect, collaborate and communicate with remote and in-office workers in a similar - if not near exact - fashion. Read now to learn about the best practices and tools available to make this a reality.


The Application Compatibility Challenges of Windows Migration by  Dell and Microsoft

May 14, 2013 - In the two years that Windows 7 has been available to the enterprise, many organizations have made the move, and common challenges have been identified. This white paper discusses those challenges, so you know what to expect when planning your migration.


The Application Deluge and Visibility Imperative by  Riverbed Technology, Inc.

January 28, 2014 - In this whitepaper from ESG, you’ll discover how to ensure network performance for your business-critical applications by learning about network challenges in modern environments, what tools and technologies forward-thinking organizations are investing in, and more.


The Application Migration Workbook by  Citrix Systems, Inc.

July 17, 2012 - Discover how to achieve pain-free application migrations in this essential workbook and guide. Read on to uncover key strategies and technologies that can simplify the process and lay the foundation for more effective application management.


The Application Usage and Risk Report by  Palo Alto Networks

December 01, 2011 - This Application Usage and Risk Report from Palo Alto Networks provides a global review of enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide. View now to uncover key findings so that you can build effective strategies to mitigate the risks inherent in certain application.


The Application Usage and Risk Report by  Palo Alto Networks

June 30, 2010 - The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.


The Applications Handbook - a Guide to mastering the modern app lifecycle by  Hewlett-Packard Company

December 31, 2010 - This e-book explains how to master the challenges of modern application delivery.


The APT Lifecycle and its Log Trail by  LogRhythm, Inc.

December 31, 2013 - This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.


The Architectural Advantages of Compellent Automated Tiered Storage by  Dell Compellent

November 11, 2010 - With the recent profusion of tiered storage solutions into the enterprise storage market, organizations are increasingly adopting tiering strategies to accommodate rapid data growth while controlling costs. Yet most solutions fail to maximize the potential benefits of tiered storage. Read this white paper to learn more.


The Architectural Advantages of Dell Compellent Automated Tiered Storage by  Dell Compellent

April 29, 2011 - Tiered storage solutions are becoming increasingly popular for its ability to accommodate rapid data growth while controlling costs.  Yet many organizations fail to maximize the potential of tiered storage.  Check out this white paper for some best practices to realize the ultimate potential of a tiered storage solution.


The Architecture of Next-Generation Intraday Liquidity Risk Management by  IBM

September 30, 2013 - This paper explores potential risk solutions to this challenge, establishing the historic context of liquidity risk management and the specific business problem of intraday liquidity risk.


The Art of Teleworking by  Polycom, Inc.

October 31, 2011 - This paper analyzes the teleworker's primary challenges and offers ideas for overcoming them. It highlights the advances of technology that make teleworking truly successful and of greater benefit to both teleworkers and their organizations.


The Art of Teleworking by  Polycom, Inc.

April 06, 2009 - Does teleworking really work? How can a teleworker be as productive as an employee in the office? This white paper covers the advances in technology that make teleworking successful -- and provides solutions for challenges teleworkers may face.


The Art of the Possible: Rapidly Deploying Cost-Effective Energy-Efficient Data Centers by  IBM

February 01, 2008 - In this white paper, IBM® reveals the next generation data center: scalable, modular data centers (SMDC).


The Art, Act and Science of Knowing by  SAS

July 30, 2010 - We are now exiting a historical moment of under managed and only occasionally acted-upon information to an environment requiring much more active, much more intense, much more aggressive information management. You as an executive will be held much more accountable for your data management behaviors. Read this white paper to learn more.


The Aruba Mobile Virtual Enterprise: The Next-Generation Network Access Architecture for the Post-Laptop Era by  Aruba Networks, Inc.

March 22, 2011 - Aruba MOVE unifies wired, wireless and remote access into one cohesive access solution - for traveling business professionals, remote office workers, corporate headquarters employees and guests.Access privileges are context aware and this dictates the type of network resources each person is entitled to. Read this paper for more.


The Asset Management Personality Quiz by  Dell Software

August 24, 2012 - Access this exclusive white paper to quiz yourself on asset management to learn what you can do to get it done quickly and efficiently.


The Associative Experience: QlikView's Overwhelming Advantage by  QlikTech, Inc.

January 21, 2011 - This QlikView Technology White Paper illuminates the inner workings of QlikView’s associative architecture and explains how it fundamentally improves the way people conduct business analysis. The intended audience includes tech-savvy business decision makers and IT pros who are evaluating QlikView.


The AT&T Telepresence Solution: Transforming Business at AT&T by  AT&T Corp

April 05, 2010 - This paper details the gains AT&T has achieved from using the AT&T Telepresence Solution: Improved productivity, increased business velocity, controlled costs, strengthened business relationships and reduced environmental impact.


The Authoritative ID Store Is Dead - How Cloud Changes Provisioning by  Intel

October 03, 2011 - Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.


The Automation Evolution: An Analysis of the Evolution of Automation in Software Quality Management by  IBM

January 25, 2010 - This paper examines the benefits of quality management automation, the progression of its adoption and future opportunities for expanding it.


The Avaya Collaborative Cloud by  Avaya

March 30, 2012 - The next wave of cloud computing is upon us. In this resource, discover how you can combine collaboration and networking services to effectively build, deliver, use, and enhance communications in the cloud.


The back office front and center by  Aspect

March 11, 2014 - Unfortunately, when 42% of customer experience decision makers say they can't effectively manage the end-to-end workflow of customer interactions, it's clear that inefficient processes can have serious repercussions. Watch this brief video to learn how to optimize people, processes, and insights to transform back-office operations.


The Backbone for Enterprise Cloud-Ready Database Platform by  Dell and Microsoft

June 30, 2013 - This resource introduces a shared infrastructure designed for remote and small office environments, and discusses its usage as a Microsoft SQL Server database platform.


The Backup Target Today by  SearchDataBackup.com

February 11, 2014 - Data backups have evolved dramatically from the days of producing a nightly backup to tape. Modern data protection techniques start with backup targets such as tape libraries and virtual tape libraries to deduplicating disk arrays, integrated backup appliances and the cloud.


The Banking Industry Architecture Network and TOGAF by  ComputerWeekly.com

February 20, 2012 - This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.


The BARC BI Survey 2012 by  Information Builders

December 31, 2012 - Information Builders ranked highest on numerous key performance indicators (KPIs) across multiple peer groups in BARC's BI Survey 12.


The basics of batch in Oracle environments by  Advent Global Solutions Inc.

September 28, 2011 - There are many different ways to manage batch jobs in Oracle depending on the technology. This  tip guide from our editoiral team will teach readers the best practices for approaching batch-job processing.


The Basics of Data Deduplication Solutions by  Dell Software

March 20, 2014 - This guide gives the basics of deduplication and focuses on how deduplication fits in with disaster recovery strategies. It also shows the advantages of hardware and software deduplication.


The Basics of ZigBee Transmitter Testing by  National Instruments

August 11, 2008 - Zigbee is a wireless standard for personal area network (PAN) sensor monitoring and control.


The benefits and drawbacks on test automation by  Micro Focus

May 02, 2012 - Automating software testing may seem ideal but like everything there are benefits and drawbacks. This expert resource features advice from software expert Peter Walen on the pros and cons of automation.


The Benefits and Significance of Private Platform as a Service by  Red Hat

June 30, 2013 - In this technology spotlight from IDC, explore the trends and technologies that characterize the PaaS market today, as well as the top considerations of implementing a private PaaS.


The Benefits of a Converged Infrastructure for Cloud and Other Complex IT Environments by  HP & Intel®

May 26, 2011 - Many organizations implement new technologies as soon as they can with any available servers they have. Such was true with virtualization and now cloud computing. This expert e-guide explains what converged infrastructure brings to a private cloud.


The Benefits of an Integrated Approach to Security in the Cloud by  IBM

December 31, 2013 - This paper looks at how the growing adoption of cloud computing is changing the way organizations are implementing security. Organizations from a variety of industries were interviewed to assess how they are approaching security for their cloud deployments leveraging a solution from IBM.


The Benefits of an Integrated Approach to Security in the Cloud by  IBM

December 31, 2013 - This guide explores the role of growing cloud computing and various security models that can protect your cloud services.


The Benefits of an Objectivity/DB and Panasas Scale-Out NAS Storage High Throughput Solution: A Benchmark Report  by  Panasas, Inc.

August 12, 2010 - Objectivity/DB uses a powerful, distributed processing architecture to manage localized, centralized or distributed object databases. This white paper describes a benchmark that compares the performance of Objectivity/DB running against a local file system versus using files stored on a Panasas PAS 8 configuration. Read this white paper for more.


The Benefits of and Critical Buying Criteria for Clustered Storage Solutions by  NetApp

March 29, 2013 - This paper looks at the adoption and benefits of clustered storage across a variety of enterprises. Discover what these storage users consider to be the most important attributes for a clustered storage system.


The Benefits of Client-Aware Cloud Computing for Mobile Users by  Intel

August 16, 2011 - Mobility can be seen as both a challenge and an opportunity when it comes to client-aware cloud computing. Learn why.


The Benefits of Cloud Networking by  Aerohive Networks

December 31, 2012 - The next wave of cloud is here: Cloud networking. This resource details the current state of cloud networking and the many benefits it offers, including reduced expenditures, boosted productivity, increased scalability, and more.


The Benefits of Cloud Storage Services by  HP and Intel

May 11, 2011 - For solution providers, the last few years have proved that cloud-based storage solutions are the route to go for your customers. This eGuide breaks down the different types of cloud applications and provides the benefits and solutions to the right service fit for your channel business.


The Benefits of Cloud Storage Services by  Kaseya

May 11, 2011 - For solution providers, the last few years have proved that cloud-based storage solutions are the route to go for your customers. This eGuide breaks down the different types of cloud applications and provides the benefits and solutions to the right service fit for your channel business.


The Benefits of Data Modeling in Business Intelligence by  CA ERwin from CA Technologies

October 30, 2009 - Through data modeling of BI systems, we can meet many of today’s data challenges. Through logical and physical modeling of business intelligence systems, we can enable the delivery of the correct business information to business users. Read this paper to learn more.


The Benefits of HP Operations Orchestration Software by  Hewlett-Packard Company

December 31, 2013 - Take a look at this concise resource to find out how HP Operations Orchestration software can help your organization reduce errors, save money, accelerate ROI and more.


The Benefits of Model Driven Development by  CA Technologies.

March 01, 2008 - Read this white paper to learn why model driven development (MDD) can simplify the process of writing software applications, increase productivity, eliminate the need for the code testing cycle, and more.


The Benefits of Next-Generation Virtual ADCs by  Citrix Systems, Inc.

November 27, 2012 - Discover why next-generation and virtual application delivery controllers (ADCs) can help you conquer many of the networking and security challenges of enterprise mobility and cloud computing.


The Benefits of RSD Glass by  RSD

April 10, 2014 - Consult the following white paper to explore an information governance platform that strategically keeps the records you need to grow your business while safely disposing unnecessary records, ultimately reducing storage costs, minimizing audits, and more.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts