T Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
T Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16

The CIO’s Guide to Building a Mobile Device Management Strategy – And How to Execute on It by  BlackBerry

September 13, 2012 - As the mobility trend continues to take over the business world, CIOs are left with the difficult task of figuring out the best way to manage the drastic increase in mobile users. Discover how mobile device management (MDM) strategies can enable you to improve mobile security, increase productivity, reduce TCO, and more.


The CIO’s Guide to Enterprise Mobility Management (EMM) by  BlackBerry

March 17, 2014 - This exclusive paper discusses what you need to be looking for in an enterprise mobility management (EMM) solution. Read on and find out how you can simplify and strengthen your mobile initiatives.


The CIO’s Guide to HIPAA Compliant Text Messaging by  Imprivata

December 31, 2013 - This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.


The Cisco ONE Enterprise Networks Architecture Enables Business Transformation by  Cisco

November 30, 2013 - This brief white paper focuses on the 3 forces that are driving the need for the evolution of the overall enterprise network and presents a solution that transforms the network to provide unmatched levels of openness and programmability.


The Cisco Unified Data Center: A platform and roadmap for reaching across the clouds by  Cisco Systems, Inc.

July 16, 2012 - This essential resource defines and explores the advantages of creating a unified data center. Learn how this architecture can help your business prepare for cloud computing and maximize the efficiency and performance of your existing systems and applications.


The CISO's Guide to a Full Night's Sleep by  EMC Corporation

April 10, 2014 - This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance.


The CISO's Guide to Virtualization Security by  Rapid7

January 12, 2012 - Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority.


The CISOs Guide to Measuring IT Security by  Lumension

January 12, 2012 - In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.


The Citrix Desktop Transformation Model by  Citrix

February 14, 2011 - Desktop virtualization initiatives are topping the priority lists of most IT managers. Learn more about this key strategic directive and the steps to getting started in your organization. Download the white paper from ESG now.


The City of Vancouver's Information Services Grows to Better Meet Needs of Employees and Residents by  Calabrio, Inc.

April 09, 2014 - The call center for the City of Vancouver's 3-1-1 line (city information services) was experiencing a 20 percent year-over-year call volume growth rate. They needed a way to handle the increased call volume, without sacrificing quality service or employee satisfaction.


The ClearPass Access Management System by  Aruba Networks

May 22, 2013 - This whitepaper describes a way that you can take back control of your company network without having to string together a multitude of loosely integrated point-products that only lead to more complexity. Read on and learn how you can manage all things BYOD from one place.


The Clipper Group: Improving Your Datacenter Through Integration by  Oracle Corporation

July 23, 2013 - IT departments in all industries are looking for ways to remove complexity from the data center while also reducing risks, lowering costs, and complying with regulatory demands. To achieve these goals, forward-thinking organizations are looking to integrated systems -- but which one is best for your environment?


The Clipper Group: Resetting the Server Bar – Oracle Claims Database Performance Superiority by  Oracle Corporation

April 19, 2013 - Data center staff is always trying to improve the availability, performance, and reliability of business-critical applications and services. View this resource to learn about a family of high-performance processors from Oracle that claims to meet these needs and more.


The Clipper Group: Revisiting the Search for Long-Term Storage -- A TCO Analysis of Tape and Disk by  The LTO Program

May 13, 2013 - This white paper presents the findings from a recent survey that compared the relative total cost of ownership for storing archived data on tape or disk.


The Cloud and HR: Choosing the Right SaaS Application by  SuccessFactors

July 24, 2013 - This expert e-guide from SearchFinancialApplications.com outlines four questions to ask potential service providers before signing an HR SaaS contract. In addition, uncover the top five HR technology trends for 2013 that you should keep an eye out for.


The Cloud Fax Advantage For SAP Users by  Esker Inc.

December 31, 2013 - In this white paper, learn how cloud-based services for fax communications can help modernize your fax operations within SAP applications. Discover how a pay-per-use automation technology can offer all the benefits of process automation, without the in-house hardware.


The Cloud for Finance is Here by  Workday

December 18, 2013 - In 2013, global IT business research firm Saugatuck Technology surveyed more than 270 finance and IT executives in North America. They were asked about their experience, expectations, and attitudes toward their existing finance management systems. Watch our video infographic to see the results.


The Cloud Is Changing Everything: It’s Not Just for Scaling Your Business, But Protecting It Too by  McAfee, Inc.

August 08, 2011 - New technologies like the cloud come with both risks and rewards. But while many question the potential security risks, they fail to realize that the cloud isn’t just good for scaling a business’s computer power, it’s also a highly efficient way to scale security and protection. View this brief to explore the benefits of security from the cloud.


The Cloud Networking Report by  Cisco Systems, Inc.

December 30, 2011 - Access this exclusive resource to find out about the challenges associated with cloud computing and the solutions available for your organization and network than can help you overcome them.


The Cloud Ready Data Center Network by  Juniper Networks, Inc.

September 01, 2011 - This paper gives you an inside look at the could-ready data center network and how to implement one in your organization.


The Cloud Risk Framework by  ComputerWeekly.com

June 01, 2012 - This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud.


The Cloud's Impact on the Future of IT by  Hewlett-Packard Company

October 31, 2011 - Read this white paper to explore the impact that cloud computing has on traditional IT practices and discover the importance of adjusting your mindset to accommodate the new trend. Learn how to meet the demands of your line of business customers so you can prevent them from outsourcing to external service providers instead.


The Cloud-Connected Management Suite by  CA Technologies.

May 03, 2010 - CA implemented a strategy to help manage and exploit cloud computing as part of an existing infrastructure and help run IT as a supply chain. Continue reading to learn more about the CA Cloud-Connected Management Suite and how it will help manage and optimize the dynamic IT supply chain.


The Cloud-Ready Data Center by  Cisco Systems, Inc.

December 05, 2011 - This video cites the critical role of the data center in enabling growth, through virtualization and the cloud. Discover why a unified architecture is recommended to help you integrate your IT infrastructure and achieve maximum agility and efficiency.


The Cloud-Ready Data Center Network by  Juniper Networks, Inc.

March 25, 2011 - CIOs are looking for ways to achieve greater IT efficiencies and agility to meet their requirements for an improved user experience and lower costs. Cloud computing represents a new way of meeting these goals by delivering services on a dynamic and shared IT infrastructure.


The Cloud: Benefits Beyond ROI by  NaviSite, Inc.

May 23, 2012 - This essential resource explores the benefits of cloud computing that extend beyond simple ROI calculations. Find out how your organization can leverage the soft benefits of the cloud to enhance overall productivity and accelerate time to market.


The Cloud: Time for Delivery by  ComputerWeekly.com

February 28, 2012 - This report from Capgemini, shows how organisations can navigate around ‘cloud confusion’  from suppliers pushing products rather than business solutions.


The CMO–CIO disconnect by  ComputerWeekly.com

August 27, 2013 - This study from Accenture reveals the extent of the disconnect between chief marketing officers (CMOs) and chief information officers (CIOs), and offers advice on how to bridge the gap.


The CMT Storage Efficiency Calculator by  CMT

May 05, 2009 - CMT recognizes containing IT-related cost is paramount. They know your storage systems represent a significant expense and re-evaluating your needs and strategies to achieve better efficiency while reducing costs is a priority. How can you accomplish that? It all starts with this exclusive Storage Efficiency Calculator.


The Coming Carrier Network Infrastructure - A Very Different Landscape New Partnerships, New Business Models for Tomorrow's Telcos by  Alcatel-Lucent

May 01, 2008 - To compete in this new environment, operators are rethinking their business models and are turning to outsourcing arrangements as a way to enhance their competitive positioning. Ownership of the network infrastructure is increasingly being viewed a...


The Compelling Case for Conferencing by  Microsoft

August 01, 2009 - As organizations look for ways to improve business outcomes while reducing costs and encouraging environmental sustainability, many are turning to software-based conferencing and collaboration solutions for audio and Web conferencing. This paper explains some benefits realized by companies who have deployed these unified communications solutions.


The Compelling Case for Conferencing by  Premiere Global Services

August 31, 2009 - In this white paper, explore some of the business benefits enjoyed by organizations who have implemented conferencing and collaboration technology. Also, learn what factors are most important to consider when selecting and deploying a conferencing tool.


The Complete Guide to Backup and Recovery for the SMB by  Nexsan

September 23, 2011 - Small and mid-sized businesses are a market that has been underserved by data protection software, appliances and online backup services until the last few years.Yet, these organizations have the same needs as large enterprises to protect their data. Full-time, dedicated IT resources are often beyond their means.


The Complete Guide to Log and Event Management by  Novell, Inc.

March 07, 2011 - This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.


The Complete Guide to Log and Event Management by  Novell, Inc.

May 11, 2011 - This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.


The Complete Network Assessment by  Dorado Software

November 01, 2008 - This paper gives a brief overview on how a complete network inventory assessment can improve the health & security of network.


The Complex Powers of Network Virtualization by  SearchWindowsServer.com

March 18, 2014 - In which situations is network virtualization worth the trouble that implementation would entail? Read this whitepaper to find out.


The Compliance Case for Social Media Records Management by  Iron Mountain

September 21, 2012 - In this e-guide, learn how your organization can develop a solid records management policy to stay compliant while reaping social networking benefits.


The Components of the Red Hat Application Stack by  Red Hat and JBoss

November 01, 2006 - Learn how open source software standardizes Web application platforms and dramatically reduce the cost and complexity of an SOA deployment.


The Connected Consumer and the New Decision-Making Cycle by  IBM

February 28, 2013 - This informative white paper offers an overview of the modern customer journey from attention to action, and describes how marketers must respond to the new ways customers form and make buying decisions. Discover the four key pillars of managing the customer journey.


The Connection Imperative: How to Realize Your Cloud Potential by  SnapLogic

January 29, 2014 - A major challenge for modern organizations is successfully managing the technology risks of delivering real-time data. Access this informative paper today to learn how to properly manage consistent integration struggles and better understand the importance of integrating data both in the cloud and on the ground.


The Consumerisation of IT by  ComputerWeekly.com

April 29, 2013 - This report looks at the nature and level of activity, motivations and drivers, unintended consequences, and the practicalities of managing consumer devices and social media at work.


The Consumerization of IT 101 by  LogMeIn, Inc.

February 14, 2012 - Access this expert briefing to get answers to your most pressing questions concerning the consumerization of IT.


The Consumerization of IT: Security Challenges of the New World Order by  CA Technologies.

May 31, 2012 - Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them.


The Convergence of Enterprise Telecom Services: BlackBerry Mobile Voice System on the Aruba Networks Wireless LAN Infrastructure by  Aruba Networks

December 01, 2010 - Learn about the benefits that fixed-mobile convergence (FMC) and unified communications (UC) offer for both remote and mobile employees and for the corporate IT group, and solutions available to help implement these technologies.


The Corporate Network of the Future: Convergence 2.0 by  Brocade

September 09, 2010 - We are in the midst of a major innovation cycle in IT - moving from infrastructure designed to automate existing processes to services-oriented architectures that speed the delivery of innovative new services. Read this paper to learn about the features and benefits of a unified fabric and its critical role in the corporate network of the future.



July 06, 2011 - This comprehensive white paper explores the many challenges organizations need to address in order to ensure smooth implementation, coordination and management of their PC refresh initiatives.


The Corporate Threat Posed by Email Trojans by  GFI Software

March 18, 2008 - Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.


The Cost and Benefits of BYOD by  Kaseya

December 06, 2012 - Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.


The Cost and Benefits of On-Demand Vs. On-Premise Procurement Software by  coupa.com

September 01, 2008 - While there are dozens of procurement software solutions available, there are really only two types offered: "on-premise" procurement software and newer "ondemand" procurement software. This paper outlines an approach to compute and compare them.


The Cost of Free - The Hidden Costs of Server Migrations by  Vision Solutions

March 31, 2014 - This white paper puts server migrations in perspective, deciphering the issues that arise during server migrations, as well as the hidden costs of server migrations that many vendors try to cover up with no licensing fee tactics.


The Cost of Maintaining the Storage Network Status Quo by  Brocade

February 28, 2014 - This white paper pinpoints 2 major costs that arise through the storage network status quo of incremental upgrades to the data center – the cost of incrementalism, and the cost of workarounds.


The Costs and Implications of EHR System Downtime on Physician Practices by  Stratus Technologies

August 11, 2011 - The paper includes calculations showing the cost of downtime expected for a given level of EHR solution uptime in practices of various sizes, as well as products associated with specific uptime levels. The report also includes a “cost per hour” tool that estimates the financial impact of downtime in practices they administer, oversee or assist.


The Costs of Weak Information Governance by  Iron Mountain

March 26, 2013 - View this expert resource to stay informed on some of the hazards that occur when you let your data fall by the wayside. Find out why it's important to use your information to unlock value and provide your business with the information you need to ensure success.


The Critical Incident Response Maturity Journey by  EMC Corporation

December 31, 2013 - This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.


The Critical Incident Response Maturity Journey by  RSA, The Security Division of EMC

December 31, 2013 - This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.


The Critical Need for Edge Data Protection with Security, Access, and Control by  CommVault Systems, Inc.

October 04, 2013 - In this white paper, the challenges associated with safeguarding data and opening up universal access for distributed desktop and laptop systems residing at the edge of an organization's IT infrastructure are examined.


The Critical Need for Encrypted Email and Secure File Transfer Solutions by  Proofpoint, Inc.

July 01, 2009 - This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.


The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by  Mimecast

November 22, 2010 - This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk.


The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by  Mimecast

August 05, 2009 - Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Learn why email Data Leak Prevention is critical to safeguard the information that is inside your network.


The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by  Mimecast

December 15, 2008 - Read this paper and learn how a successful data leak prevention system can protect your business from internal threats in this age of regulatory compliance, risk, and governance.


The Critical Role of Text Analytics in the BI Ecosystem by  Sybase, an SAP company

June 15, 2010 - Though a great amount of valuable information lies within documents, e-mails, and other media, integrating this data into modern analytics applications is challenging. Join Sybase and Kapow on Tuesday, June 15th at 1:00 PM ET to learn how enterprises are motivated to deploy text analytics capabilities for its wide range of intelligence benefits.


The Critical Role of the Network in Supporting Cloud-Based Solutions by  Cisco Systems, Inc.

November 23, 2011 - This paper focuses on how a communication service provider (CSP) can leverage the investment it has made in deploying a next generation network (NGN) to capitalize on the growing market for Software-as-as-Service (SaaS) solutions.


The Critical Security Controls – Moving Beyond the Checklist Mentality by  Lumension

August 13, 2009 - The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.


The Customer Loyalty Playbook: 4 Steps To Build Loyal, High-Value Customers by  Oracle Corporation

February 01, 2010 - The longer a customer is loyal, the more profit the company gains. Read this brief to learn four steps to help guide your customer loyalty strategy.


The Customer Service Balancing Act by  Jive Software

July 11, 2013 - Access this helpful resource to discover a customer service technology that provides complete integration of all your customer communication channels so that you can achieve a unified view of customer interactions. Read on to discover how this peer-based strategy can cut costs while enhancing customer service by reading now!


The Customer Service Balancing Act by  Jive Software

February 18, 2014 - New social business solutions eliminate the traditional service trade-offs, providing an optimal combination of assisted peer-to-peer support communities, call deflection, selective escalation and productivity-enhancing collaboration. The result? Reduced call volume and faster resolution times, happier customers and lower costs.


The Customer You Know: Keeping, Leveraging, and Profiting from Current Customers with Business Analytics by  SAS

May 05, 2010 - Read this paper to learn about business analytics and how it can significantly impact customer service improvements and customer retention and how it can enable your company to develop more agile strategies that will allow you to adapt to changing customer behavior and achieve their business goals.


The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats by  ComputerWeekly.com

September 05, 2011 - The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues.


The Cybercrime Arms Race by  Kaspersky Lab

February 18, 2008 - Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.


The Data Archive Challenge: What’s Your Game Plan? by  Horison Information Strategies

March 15, 2012 - Learn how you can overcome the challenges associated with effectively archiving information in today's data-intensive IT environments. Learn about different types of archiving strategies, discover an emerging method known as hierarchical storage management (HSM), receive a step-by-step guide for building a long-term, scalable data archive and more.


The Data Center Dilemma: Controlling Costs While Managing Risk by  Emerson Network Power

July 30, 2010 - The escalation in data center costs has been driven by the demand for computing. IT has responded to this demand by adding more servers and replacing older servers with newer devices that deliver more power in less space. Read this whitepaper to learn more.


The Data Center Facilities IT Handbook: Reinforcing IT and Facilities Relations by  APC by Schneider Electric

April 24, 2009 - Communication failures between IT staff and facilities managers have cost companies enormous amounts of money in lost revenue. This eBook discusses the importance of open communication between both groups, and also serves as a guide for IT pros looking for information on ensuring that their physical infrastructures support the data center.


The Data Center Revolution: Making the Journey to IT as a Service with a Software-Defined Data Center by  VMware, Inc.

March 04, 2014 - This webcast covers how IT must transform the way it delivers services with IT-as-a-Service and how a software-defined data center is the foundation you need.


The Data Governance Maturity Model by  DataFlux Corporation

July 01, 2007 - The success of a business is increasingly tied to the quality of their information. Through the Data Governance Maturity Model, organizations can identify precisely how they can create an environment that can deliver and sustain high-quality information.


The Data Protection Benchmark Report by  Vision Solutions

September 28, 2010 - The practice of data protection has evolved into a full-fledged discipline. In the last few years, it has been marked with a strong surge in innovation. Bottom line: Customers now have a lot more data protection options. Read on to learn what options you should consider for your organization.


The Data Recovery Workbook by  Iron Mountain

December 18, 2013 - This informative paper explores the basics of developing a plan that will help you protect your data should the worst (or not-quite-worst) happen. Read on now to discover five key steps for protecting your business data and get started!


The Data Replication Bottleneck: Overcoming Out-of-Order and Lost Packets by  Silver Peak

November 30, 2007 - This analyst paper explores why packet loss and ordering has become such a bit problem in today's WANs and offers what can be done to overcome these packet delivery challenges.


The DDoS Threat Spectrum by  F5 Networks

November 19, 2013 - This crucial paper takes an in-depth look at the evolution of DDoS attacks, outlining their history, present landscape and potential future so that your organization can understand what may be coming on the horizon and take the necessary precautions to ensure data protection and business continuity.


The Deciding Factor: Big Data & Decision Making by  ComputerWeekly.com

June 26, 2012 - This study by Capgemini and the Economist Intelligence Unit report assess the impact of Big Data on businesses.


The Definitive Guide to Application Performance Management (APM) by  Compuware Corporation

October 13, 2010 - This book’s definitive approach to explaining APM strategy and tactics gives you the information you need to make smart purchasing decisions. Once decided, its chapters then help guide you towards the best ways to lay it into place. Continue reading to learn how APM benefits everyone. You just have to show everyone how, and with this book you can.


The Definitive Guide to Lead Nurturing by  Marketo

November 12, 2010 - The goal of this guide is to arm B2B marketers with the ultimate resource for lead nurturing, whether you’re just starting to think about lead nurturing in your business or are looking for ways to enhance and optimize your existing programs. Read this definitive guide to learn more.


The Definitive Guide to Telework by  Aerohive Networks

May 31, 2011 - This e-book looks at teleworking from all angles, examining what’s driving and potentially hindering its adoption, the technical and cultural requirements to support teleworking, and the considerations enterprises should make to ensure they have what they need for an effective telework deployment in their workplace.


The Definitive Guide to Upgrading Your Nortel™ Communications System by  Avaya

September 02, 2011 - Read this guide and garner the information you need for a closer look at the opportunity cost you are paying by NOT upgrading. Also, discover how you can protect up to 60 percent of your original system investment — a value-added benefit that can actually cover the entire cost of an upgrade.


The Definitive Guide to Windows Application Server and Backup 2.0 - Chapter 3: Whole Server Backups by  AppAssure Software, Inc.

September 21, 2009 - Ready to start ensuring solid backups in your environment, the Backup 2.0 way? That's what this chapter is all about, and what I call "whole server backups" is definitely the right place to begin. In this chapter, we'll discuss all the most common types of servers, what their native solutions look like, and assemble a Backup 2.0 wishlist.


THE DEFINITIVE GUIDE TO: Windows Application and Server Backup 2.0 CHAPTER 1 by  AppAssure Software, Inc.

August 18, 2009 - Are you still making backups the old-fashioned way? With special chapters devoted to Exchange Server, SQL Server, virtualization, and SharePoint, you'll learn about new techniques and technologies designed to take backups out of the 1960's and into the 21st century.


THE DEFINITIVE GUIDE TO: Windows Application and Server Backup 2.0 CHAPTER 2 by  AppAssure Software, Inc.

August 18, 2009 - This chapter shares stories about backups to highlight problems that you yourself may have encountered. For each, we'll look at some of the root causes for those problems, and suggest ways that a modernized “Backup 2.0” approach might help solve the problem.


The Dell™ EqualLogic™ PS Series: Intelligent iSCSI Storage Arrays by  Dell, Inc.

June 18, 2010 - The Dell™ EqualLogic™ PS Series is fundamentally changing the way IT organizations think about purchasing and managing storage. This data sheet provides a detailed look at the ease of use, reliability, affordability, and enterprise performance of the Dell PS Series iSCSI storage arrays.


The Deloitte CIO Survey 2013 by  ComputerWeekly.com

November 08, 2013 - This ground breaking study from Deloitte, based on a survey of 700 CIOs world wide, gives you the latest trends in IT spending, technology and business priorities and CIO's career aspirations.


The Deloitte Consumer Review: A more secure customer by  ComputerWeekly.com

March 12, 2013 - This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.


The Demise in Effectiveness of Signature and Heuristic Based Antivirus by  ComputerWeekly.com

February 18, 2013 - Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.


The Department of Defence and Open Source Software by  Oracle Corporation UK Ltd

March 31, 2009 - Is open source software a viable strategy for large-scale SOA deployments, especially at the U.S. Department of Defence?


The Department of Defense and Open Source Software by  Oracle Corporation

January 01, 2008 - This white paper looks at the pros and cons of open-source software and helps organizations understand how to build a business case that is based on cost, schedule, performance and risks across the entire program lifecycle not just up-front program inception costs and considerations. 


The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD by  Aerohive Networks

May 23, 2012 - Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.


The Desktop Dilemma: Liberty vs. Lockdown by  Bit9, Inc.

June 09, 2009 - CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.


The Desktop Transformation Project Virtual Desktops – Demystified by  Matrix42

June 20, 2011 - Desktop virtualization has become a viable and cost justifiable alternative to the standard, physical laptop/desktop system. Review this white paper and learn the technical basics of this initiative along with the expected benefits this environment can bring to your organization.


The Detrimental Cost of Cyber Crime by  Hewlett-Packard Limited

October 25, 2013 - In this analyst report by Ponemon Institute, see how cybercrime has continued to bring heavy economic damage to U.K. companies, and what they should do to reduce such detrimental impact.


The different dedupe offerings by  Quantum Corporation

June 16, 2010 - Check out this interactive classroom for a storage refresher course on the topic of deduplicaiton and gain insight on how you can better leverage this technology to benefit the overall success of your businesses.


The Different Technologies for Cooling Data Centers by  APC by Schneider Electric

December 31, 2012 - This white paper talks about data center cooling and the advantages, disadvantages and applications of the 13 basic methods for heat removal.


The Different Types of Air Conditioning Equipment for IT Environments by  APC by Schneider Electric

July 09, 2009 - Cooling equipment for an IT environment can be implemented in 10 basic configurations. The information in this paper allows IT professionals to be more involved in the specification of precision cooling solutions that better align with IT objectives.


The Different Types of UPS Systems by  APC by Schneider Electric

February 01, 2005 - There is much confusion in the marketplace about the different types of UPS systems and their characteristics. Each of these UPS types is defined, practical applications of each are discussed, and advantages and disadvantages are listed.


The Different Types of UPS Systems by  APC by Schneider Electric

October 28, 2011 - Since many IT pros are unaware that there are more than 2 types of UPS systems, they often select technologies that fail to meet their application needs.  This resource explores available UPS options and highlights the performance characteristics and design attributes of each.


The Digital Enterprise by  ComputerWeekly.com

March 17, 2014 - Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.


The digital mail room is dead by  IBM

September 27, 2011 - This paper explores the strategies needed to capture and transform all incoming documents, including mailroom paper, fazes, electronic forms, and electronic data interchange (EDI).


The Digital Universe Decade – Are You Ready? by  EMC Corporation

October 21, 2010 - As we enter a new decade of record-setting growth of digital information, we face unprecedented challenges in how to manage our Digital Universe. Are you ready for the Digital Decade?


The Dirty Dozen: Preventing Common Application-Level Hack Attacks by  IBM

December 01, 2007 - This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.


The Dirty little Secrets of the Warehouse Management Systems Industry by  HighJump Software

May 01, 2008 - Read this white paper to learn five secrets you should know before you purchase a WMS. Guide your evaluation and selection processes in a way that best benefits your business, your customers and your long-term success and competitive advantage.


The Distributed Enterprise by  Raritan Inc.

January 01, 2008 - This paper addresses the added value (in terms of uptime and security) of out-of-band access and control tools for branch offices, and why out-of-band should be considered as a component of branch office networks.


The Diverse and Exploding Digital Universe by  EMC Corporation

August 01, 2008 - This white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.


The DNA of the CIO by  ComputerWeekly.com

October 31, 2012 - This must-read report analyses the role and challenges of the CIO and offers guidance for career development, influencing the business and becoming part of the executive management team.


The Dollars and Sense of Web Identity Management: How Saas Cuts the High Costs of Web Access and SSO by 75% by  Symplified

August 01, 2008 - This analysis presented by Symplified, shows the compelling Software as a Service (SaaS) Total Cost of Ownership (TCO) advantages over software, driving identity lifecycle costs down by more than 75% based on real-world data. Read this paper to learn more


The Drive to Greater Data Center Efficiency by  Tideway Systems

May 01, 2008 - Trying to plan data center optimization projects without an accurate picture of the very assets you are trying to optimize is an exercise in futility. The results of this approach are well known...


The Drivers for Web Security in the Cloud by  Webroot

February 01, 2010 - This Bloor Research paper examines the key drivers for Web security in the cloud. View now to explore the realities of web threats and learn how cloud-based solutions can provide a high level of protection against these increasingly complex and sophisticated threats.


The Driving Principles of Open Source Software Success by  Actuate

September 13, 2013 - In this e-guide, gain enterprise programming lessons from the driving principles of OSS success, and uncover why you should stop merely thinking about how open source development projects will bring in profits for a specific sector of your business and start thinking about how they can generate good press for your whole business.


The Dynamic DNS Infrastructure by  F5 Networks

June 29, 2012 - This resource details a full-proxy architecture for DNS that provides a complete solution for global, local, and cloud load balancing, helping you overcome all the growth and security challenges the DNS is facing.


The Dynamic Duo: SAM & Security by  CDW Corporation

April 02, 2014 - This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.


The E-discovery Ostrich by  Iron Mountain

March 25, 2013 - This white paper highlights four simple steps that will ensure your organization is ready for e-discovery. Learn what a failure to plan for an e-discovery mandate can really cost your business, and discover why a little foresight can go a long way toward peace of mind.


The E-Discovery “How-To” Guide: Practical Recommendations for Streamlining Corporate E-Discovery by  Clearwell Systems

October 01, 2008 - This paper breaks down the e-discovery process into phases, discusses best practices and relevant technologies for each phase, and provides a matrix to guide an e-discovery team’s decision making process.


The Eaton UPS and Power Management Fundamentals Handbook by  Eaton Corporation

March 31, 2013 - This extraordinary 48-page reference handbook provides rich detail and an easy-to-navigate format to answer all of your questions and concerns from UPS design considerations to power blackout problems. Read on to gain insight from this UPS treasure chest.


The ECHO™ - Avaya Connection: ECHO™, and How It Interacts with Avaya's Telephony Solutions by  Teleformix

July 01, 2008 - Read this paper to learn how Teleformix's ECHO™ digital recording solution integrates seamlessly with Avaya's telephony systems, providing your company with a crucial customer service tool - quality assurance recording.


The ECHO™ - Cisco Connection: ECHO™, and How It Interacts with Cisco's CallManager by  Teleformix

July 01, 2008 - Read this white paper and learn how ECHO's direct digital integration with Cisco's VoIP network enables the pooling of voice VLAN ports through SPAN or RSPAN.


The Economic and Productivity Impact of IT Security on Healthcare by  Imprivata

May 31, 2013 - This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations.


The Economic Effects of Virtualization, Tiered Storage and Hitachi Dynamic Provisioning Software by  Hitachi Data Systems

February 11, 2009 - This paper examines CAPEX and OPEX as they contribute to TCO in order to provide the most comprehensive analysis of the economic impact of tiered storage and virtualization strategies.


The Economic Evolution of Enterprise Storage by  Hitachi Data Systems

December 02, 2010 - The latest technologies innovations provide a big, evolutionary stride in economically superior storage designed to swiftly address mounting data challenges and changing business demands. With 3D scaling and dynamic tiering, IT leaders can dynamically scale up, scale out and scale deep for increased performance and scalability.


The Economic Impact of File Virtualization: Reducing Storage Costs and Improving Management Efficiency by  F5 Networks

May 01, 2007 - Network-based file virtualization is a key technology for more effectively managing file-based information. Download this IDC white paper to learn how file virtualization is being implemented and its impact on organizations.


The Economic Impact of IBM's Worklight Mobile Application Platform by  IBM

April 30, 2013 - In this informative Forrester report, explore the economic impact of one mobile application platform -- IBM Worklight -- that promises to provide cost savings in the development, maintenance, and integration of multiplatform mobile apps.


The Economic Value of Data by  ComputerWeekly.com

June 17, 2013 - Big data analytics promises to boost customer centricity and profitability for financial services firms, according to this report from Cognizant.


The Economics of Cooperative Control Protocols are Free by  Aerohive Networks

March 18, 2011 - The key takeaway here is that inter-AP protocols are free, but controllers are not. In a market where all enterprise-class APs cost roughly the same, removing the controller hardware and feature licensing from the equation results in an immediate and extremely significant CAPEX decrease.


The Economics of Cooperative Control – Protocols are Free by  Aerohive Networks

March 30, 2011 - Instead of regurgitating an architecture where costly, centralized controllers are needed, Aerohive followed the original intent of the 802.11 standard designers more closely and brought the technology to maturity. This paper explores how inter-AP protocols can execute the same functions performed by centralized controllers with lower cost.


The Economics of Cooperative Control: Protocols are Free by  Aerohive Networks

September 20, 2010 - This paper discusses the controller-based architecture was created to solve manageability, mobility (as opposed to portability), and high operational expenditure (OPEX) problems that were prevalent in autonomous (fat, thick, standalone) AP implementations.


The Economics of File-based Storage by  Hitachi Data Systems

March 31, 2013 - This paper focuses on enterprise data center NAS environments and examines three significant contributors to storage efficiency in more detail.


The Economics of Networking White Paper by  Cisco Systems, Inc.

February 06, 2012 - Access this white paper to learn about a next-generation network architecture that paves the way for true business innovation with architectural benefits that empower IT to say “yes” to new business opportunities and the ever-changing work environment.


The Economics of Software Testing: Service Virtualization by  IBM

April 22, 2013 - See how Service Virtualization is helping companies save millions while achieving higher quality and faster releases.


The Education Edge: School Administration Software by  Blackbaud

This complete solution was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information.


The Eight Truths of Social Learning. Now. by  SkillSoft Corporation

June 30, 2011 - This paper seeks to uncover the fundamental requirements for a successful social learning program. Based on early experience with our own social learning tool, this list of eight “truths” has been compiled to provide a foundation for learning professionals who are launching social learning in their organizations.


The Elephant in the Room - Cloud Security and what Vendors and Customers Need to do to Stay Secure by  Rackspace Hosting

May 31, 2011 - Both vendors and customers share the responsibility of cloud security, and each have their own part to play. This white paper highlights a non-profit organization's findings on the most typical security practices across the cloud computing industry.


The EMA All-Stars in Enterprise Systems Management for 2008 by  CA Technologies.

March 01, 2008 - Analyst firm EMA has released the results of their first ever All-Stars in Enterprise Systems Management for 2008 report, covering 18 different systems management disciplines.


The Emergence Of Service Assurance For Enterprise IT by  CA Technologies.

April 04, 2010 - In surveying more than 150 IT professionals with direct responsibility for network, systems, and/or application delivery, Forrester found that all of these enterprises had fundamental issues around managing the performance of these applications and business services and the underlying transactions.


The Emergence of Service Assurance in Enterprise IT by  CA Technologies.

June 09, 2011 - Forrester Consulting evaluated issues surrounding the assurance of critical business services and applications. In surveying more than 150 IT professionals, Forrester found that all of these enterprises had fundamental issues around managing the performance of these applications and business services and the underlying transactions.


The emerging intersection of data warehousing and analytics by  IBM

May 05, 2011 - In this presentation transcript, BI expert Wayne Eckerson will discuss the emerging intersection of data warehousing and analytics, including the business value in optimizing processes and in-database analytics.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts