U Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
U Listings:  Result Page 1 | 2 | 3
 

U.S. Army Relies on GlobalSCAPE® Secure Information Exchange Solutions to Protect Critical Data by  GlobalScape


June 24, 2011 - Now you can get a file sharing solution that the U.S. Army uses and eliminate any worries you have about transferring sensitive business data. This case study will show you how this solution has been very successful for the Army and will teach you how your business could benefit a great deal as well.

 

U.S. Navy Cyber Defense Operations Command by  Novell, Inc.


December 08, 2009 - Using Novell® Sentinel™ as part of its PROMETHEUS system, the Navy Cyber Defense Operations Command (NCDOC) has automated and centralized security monitoring across hundreds of diverse locations worldwide.

 

UC And Collaboration Adoption By Business Leads To Real Benefits by  Cisco


July 31, 2013 - In this paper, research shows that buyers are investing in a wide range of UC&C capabilities. The data shows that they derive real business value when deploying multiple capabilities based on the latest innovations in ways that meet both IT operational and line-of-business requirements.

 

UC and Collaboration: Benefits and Market Drivers by  Sprint


January 30, 2013 - This expert E-Guide from SearchUnifiedCommunications.com explores the benefits collaboration can bring your enterprise and provides an in-depth look at the drivers forcing organizations to find a newer, better UCC solution for their employees to leverage.

 

UC and the Evolution of Enterprise Telephony by  AVST


April 18, 2013 - This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with unified communications (UC).

 

UC Collaboration Tools: Greater simplicity needed for IT, end users by  Sprint


May 21, 2012 - Uncover why many organizations require greater simplicity in their unified communications (UC) collaboration tools – for both end-users and IT – in order for their UC strategy to be a success. Learn best practices to integrate UC tools, potential challenges you may face, and more!

 

UC Messaging by  CDW Corporation


March 11, 2011 - Watch this videocast to learn how visual voice mail, speech recognition and voice-to-text can improve information sharing.

 

UC Trends That are Changing Collaboration by  Cisco


January 16, 2014 - This expert e-guide features information on the unified communications market with five key trends and a top 10 list of news stories from the past year.

 

UC's Impact on the Network by  SearchUnifiedCommunications.com


March 14, 2013 - This TechGuide from SearchUnifiedCommunications.com looks at how UC applications affect network performance and explains the importance of coordinating deployments with other enterprise IT plans.

 

UCHC Leverages Enterprise Job Scheduling to Automate Data Integration Processes by  Cisco Systems, Inc.


January 24, 2012 - Thinking of launching a data warehousing project? Learn how the University of Connecticut Health Center (UCHC), a leading biomedical research center, healthcare facility, and medical school, achieved end-to end automation of data integration and data loading processes from internal and external data sources to ensure consistent, accurate reporting.

 

UFC knocks out video production bottlenecks with Flash storage by  IBM


December 31, 2012 - Access this case study to discover how the Ultimate Fighting Championship implemented a non-disruptive flash storage technology within a day to eradicate video production bottlenecks.

 

UK College Embraces BYOD and Cuts IT Spend by  Dell, Inc.


October 31, 2013 - This white paper features a case study on a UK college that enhanced its virtual infrastructure to ensure high speed and easy management, allowing students and staff to have better access to the network from their personal devices.

 

UK Computer Science Education in the 21st Century by  ComputerWeekly.com


April 03, 2013 - Management consultant Yva Thakurdas assesses the scale of the UK IT skills gap, analyses its causes and potential solutions in this presentation.

 

UK IT priorities 2012 by  ComputerWeekly.com


August 24, 2012 - This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies.

 

UK MSP Now Delivering a Reliably Consistent Service to Clients by  Autotask Corporation


January 30, 2014 - This brief video covers a solution that can provide a consistent and reliable help desk and ticketing platform.

 

UK MSP: Winning and Retaining Customers More Effectively with Autotask by  Autotask Corporation


January 29, 2014 - This brief video covers how to make your organization accountable for IT.

 

UK Network Carrier Gains Network Visibility For Quick Troubleshooting by  Gigamon


December 31, 2012 - This case study focuses on a UK telecommunications organization that found a way to gain network visibility for quick troubleshooting and customer satisfaction, without affecting existing production network.

 

UK Service Provider Performance and Satisfaction 2012 by  ComputerWeekly.com


September 14, 2012 - This exclusive report from KPMG assesses UK organisations' satisfaction with their outsourcing service providers and looks at outsourcing trends in 2012.

 

UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010 by  ComputerWeekly.com


June 02, 2010 - In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010.

 

Ultimate SQL Tune-Off by  Embarcadero Technologies, Inc.


June 10, 2010 - According to Jonathan Lewis, there is a basic strategy to writing efficient SQL, but it requires knowledge of the data, the metadata, and the intent of the query. Kyle Hailey, though, will discuss his own approach to Visual SQL Tuning (VST) with some ringside support from DB Optimizer XE. Be sure to check out this exciting debate!

 

Ultrabooks & Mobile Computing by  ComputerWeekly.com


January 05, 2012 - In this report extract, Juniper Research looks at the market challenges and opportunities of ultrabooks, the next generation of note book PCs.

 

UltraDNS: Performance and Security for Your Online Business by  Neustar®


March 19, 2014 - This informative paper examines DNS solution that provides you with the performance and uptime that you need while protecting against security threats that could impact availability.

 

UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by  RSA, The Security Division of EMC


March 27, 2012 - Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more.

 

Unauthorized Applications: Taking Back Control by  Sophos, Inc.


July 01, 2008 - This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.

 

Unchain Your Network with Application Intelligence and Control by  SonicWALL


February 24, 2011 - This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.

 

Unclutter Your Data Center With Consolidated Log Management by  VMware, Inc.


June 13, 2013 - In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.

 

Uncompromising Reliability through Clustered Storage by  Isilon Systems


February 21, 2008 - This white paper describes the limitations of traditional data protection technologies and examines Isilon IQ’s revolutionary new approach to ensuring data integrity and availability in large clustered storage environments.

 

Uncover the Benefits of Virtualization by  BMC Software, Inc.


November 03, 2009 - BMC Software's internal IT organization launched a virtualization and automation initiative that achieved financial payback in less than six months. The effort improved productivity, increased responsiveness, and saved the company $5 million per year.

 

Uncovering assessment response bias by  IBM


November 04, 2013 - The following white paper details the importance of being able to evaluate nearly every aspect of a potential candidate and most importantly, how to do so.

 

Uncovering the Business Value of Managed Services by  IBM


December 31, 2013 - Check out this concise resource to find out just how much you can expect to gain and save by implementing managed services into your IT environment.

 

Uncrossing the Wires: Starting - And Sustaining - The Conversation on Technology Value by  Cisco Systems, Inc.


March 01, 2012 - In December 2011 and January 2012, CFO Research Services and SearchCIO conducted a survey that received qualified responses from 382 senior finance executives and 300 senior IT executives working in a wide variety of companies. Review key findings and learn the three noteworthy areas where IT and finance executives are in strong agreement.

 

Under Armour Improves Performance of SAP Data Loading with Winshuttle by  Winshuttle, LLC


December 05, 2008 - Winshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention.

 

Under the Cloud, a Climate Change for IT by  Cisco Systems, Inc.


December 19, 2013 - This brief write-up examines some of the key findings from a survey of over 4,000 IT leaders in 18 industries across nine key global economies on how the cloud is impacting IT.

 

Under the Hood of Your New Server by  Dell, Inc. and Microsoft


December 10, 2009 - Even though some network servers look very much like the standalone computers that fill your office, they play a very different role in your business than desktop PCs do, and therefore their design is very different under the hood. Take a tour of the components that give a server the power it needs to handle your tough workload.

 

Under the Spotlight the Transition of Environmental Risk Management by  SAP America, Inc.


July 07, 1967 - In March 2008, the Economist Intelligence Unit surveyed 320 executives from around the world about their attitudes to environmental risk management. Read about their findings in this paper.

 

Underexposed risks of public Wi-Fi hotspots by  ComputerWeekly.com


March 15, 2013 - This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.

 

Understand and Counter Insider Threats with Behavioral Analytics by  Hewlett-Packard Company


November 14, 2013 - This in-depth resource explores how to combat insider threats and what you can do to prevent them from causing devastating attacks.

 

Understand Cloud ERP by  IFS


June 11, 2013 - This on-demand webcast dispels the confusion surrounding cloud enterprise resource planning (ERP). Inside, find out how cloud ERP works, uncover the key benefits it can offer your organization, learn about executive perceptions and misconceptions, and more.

 

Understanding Advanced Persistent Threats and Complex Malware by  Dell SecureWorks UK


October 10, 2012 - Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.

 

Understanding Advanced Virtualization Security Practices by  Intel


August 18, 2011 - SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.

 

Understanding an OLAP Solution from Oracle by  Oracle Corporation


September 18, 2008 - This white paper discusses two Oracle OLAP solutions: Oracle's Hyperion Essbase and Oracle Database 11g OLAP Option which share similar characteristics but are individuals with their differences.

 

Understanding and Detecting Malware Threats Based on File Size by  Fortinet, Inc.


December 01, 2006 - Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.

 

Understanding and Determining Your Dedupe Ratio by  HP and Intel


June 21, 2011 - This SearchStorage.com E-Guide answers these questions and more around deduplication ratios to help your business better understand why they’re important and how to estimate your own.

 

Understanding and Evaluating BI Options for SQL Server by  SearchSQLServer.com


May 07, 2013 - This expert handbook explores the value that SQL Server business intelligence (BI) tools can provide your organization, and evaluates your analytics options in order to help you find the approach that's best suited for your business needs.

 

Understanding and Managing Supply Chain Risk by  SAP America, Inc.


January 01, 2006 - Download this white paper and explore new thinking on potential risk to global supply chains and how companies are adopting the statistical methods more commonly associated with finance and insurance. Learn how identifying and profiling risk variables, quantifying risk and using IT solutions can create higher resilience for supply chain management.

 

Understanding and Selecting a Data Loss Prevention Solution by  Websense, Inc.


July 07, 1967 - Data Loss Prevention is a confusing market, but by understanding the capabilities of DLP tools you can choose an appropriate tool. This report will provide the necessary background in DLP to help you find the best match for your organization.

 

Understanding and Selecting a Data Loss Prevention Solution by  Websense, Inc.


January 13, 2011 - Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.

 

Understanding and Selecting a Database Activity Monitoring Solution by  Imperva


February 10, 2009 - Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications.

 

Understanding and Selecting a Database Assessment Solution by  Application Security, Inc.


February 22, 2010 - In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment.

 

Understanding and Selecting a File Activity Monitoring Solution by  Imperva


May 16, 2011 - Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.

 

Understanding and Selecting Data Masking Solutions by  IBM


August 10, 2012 - This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.

 

Understanding and Simplifying Sharepoint 2007 Permissions Management by  Idera


July 27, 2010 - Authentication to a SharePoint environment is the process in which a company’s IT architecture approves a user’s credentials. To fully understand the spectrum involved with managing permissions in a SharePoint environment, you need to know the components involved with permissions and how they work with one another.

 

Understanding Architectural Priorities Inside Government Clouds by  AMD


January 25, 2011 - Not since the advent of the Internet has a technological concept achieved more attention than cloud computing. AMD’s server platform technology is uniquely tuned to address critical government requirements for reducing costs, simplifying operations and raising energy efficiency in server price/performance. 

 

Understanding Automatic Failover for DR: 6 FAQs by  FalconStor Software


July 19, 2011 - Automatic failover involves automatically moving an application to a standby server during a failure or service event to preserve its time. Fortunately, there are a number of approaches available in the market today. Check out this guide to learn the answers to 6 FAQs about automatic failover and disaster recovery automation.

 

Understanding Avaya IP Office Short Codes by  Global Knowledge


May 01, 2013 - This white paper provides a road map to understanding the programming and use of short codes in an Avaya IP Office system. It is based primarily on the codes used with the IPO 8.1 U-Law system with the Essential, Preferred, or Advanced Edition system licenses.

 

Understanding Big Data : Analytics for Enterprise Class - Hadoop and Streaming Data by  IBM


December 31, 2012 - The transformation to a big data-ready environment isn't easy, as choosing the right strategy, technologies and goals can be a complicated process. This 166-page e-book will give you a better understanding of the opportunities that big data presents and provide an in-depth look at the tools you'll need to execute a big data analytics program.

 

Understanding Big Data and Security by  Hewlett-Packard Limited


April 16, 2013 - This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility.

 

Understanding big data so you can act with confidence by  IBM


July 31, 2013 - Ensuring your data is secure and trustworthy is paramount to harnessing the power of big data, but it's also a difficult task when you've got such a large volume and variety of information coming into the business. Unfortunately, traditional methods of governing and correcting often aren't applicable to big data -- so what can you do?

 

Understanding Big Data: Analytics to Enterprise Class Hadoop and Streaming Data by  IBM


February 22, 2012 - This comprehensive white paper delves into the world of big data technologies, such as Hadoop, and how to extend it into an enterprise-ready big data platform. It discusses everything related to big data, including common challenges and patterns that exist, and concludes with a chapter on big data analytics with real-world success stories.

 

Understanding BlackBerry Balance by  BlackBerry


July 10, 2013 - This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.

 

Understanding Built-in Expertise and Patterns by  IBM


April 09, 2013 - Tune into this podcast to learn more about how businesses are interpreting large amounts of data with business intelligence. It outlines some of the trends to look out for in the IT environment and how shifting the focus of spending money can change the structure of your business.

 

Understanding Cloud Computing Networks by  Dell, Inc. and Intel®


December 19, 2011 - Cloud computing is catching on, but cloud networks are proving to be challenging to implement and manage. Before enterprises begin architecting their cloud computing networks, they need to consider the impact on the network.

 

Understanding cloud integration by  Liaison Technology


June 21, 2012 - Many people confuse cloud application integration and cloud-based data integration, but these two types of integrations are actually very different and each requires different approaches, methods, and tools. This expert e-guide addresses the differences between the two and will help you understand which approach will best suit your needs.

 

Understanding Consumer Device Management and BYOD by  Symantec Corporation


November 28, 2012 - This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!

 

Understanding Desktop Virtualization by  Intel


September 13, 2011 - This white paper describes the variety of desktop virtualization models available, how each works, and the advantages and limitations of each model for key vectors such as security, manageability, and power consumption. Also identified are the major providers of software solutions and the end-point devices to deploy each model.

 

Understanding Desktop Virtualization by  Intel


June 08, 2011 - Desktop virtualization is being considered by more IT pros as they face increasing pressure to control costs, security, regulate compliance and more. Read this white paper to learn about the various desktop virtualization models available for your infrastructure, how each model works and identify the best fit for your IT shop today.

 

Understanding EPO and Its Downtime Risks by  APC by Schneider Electric


January 01, 2005 - This white paper describes the advantages and disadvantages of EPO for protecting data centers and small IT equipment rooms containing UPS systems.

 

Understanding High Availability for the BlackBerry Enterprise Server by  BlackBerry


August 06, 2009 - Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades.

 

Understanding High Availability for the BlackBerry Enterprise Server by  BlackBerry


August 06, 2009 - Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades.

 

Understanding Hosted Exchange Options by  SearchExchange.com


May 09, 2013 - This expert handbook examines the pros and cons of on-premise vs. off-premise Exchange environments. Learn more about how to weigh hosted Exchange options, the key security considerations and why new Office 365 versions are emphasizing subscriptions.

 

Understanding how advanced analytics can transform your business by  SAP America, Inc.


June 22, 2011 - This eBook focuses on how organizations should leverage the new breed of advanced analytics tools, including in-memory analytics, in-database analytics and complex event processing.

 

Understanding How Converged Infrastructure Works by  HP & Intel®


February 19, 2013 - This expert e-guide offers a discussion of the different types of converged infrastructure and provides an overview of their advantages for IT environments. The paper goes on to introduce converged infrastructure hardware and the advantages offered by its use of four types of virtualization.

 

Understanding Intel Xeon 5600 Series Memory Performance and Optimization in IBM System x and BladeCenter Platforms by  IBM


January 20, 2011 - This white paper examines the architecture and performance of the Intel Xeon processor 5600 Series. The performance analysis covers latency to main memory, memory bandwidth and application performance, and addresses performance issues related to memory speed and population of memory.

 

Understanding ITIL® Service Portfolio Management: An Approach For Implementing Effective Service Lifecycle Management by  BMC Software, Inc.


June 15, 2009 - IT executives and their teams need a comprehensive and accurate view of IT services. A service catalog includes all relevant details about your services, including which service level agreements (SLAs) are associated with it, who is able to request it, how much it costs, and how to fulfill it. This paper describes the IT Infrastructure...

 

Understanding Log Shipping and Its Advantages for Compliance Archiving with Microsoft Exchange Server by  Mimosa Systems


October 01, 2008 - This white paper describes how log shipping compares with journaling for Exchange compliance archiving.

 

Understanding Microsoft Offloaded Data Transfer on Dell EqualLogic PS Series Arrays by  Dell and Microsoft


April 15, 2013 - This crucial paper examines a storage solution that delegates the heavy lifting of large data transfers to the intelligence of the storage array, reducing the utilization of resources and improving user productivity and efficiency.

 

Understanding Mobility Trends and Mobile Usage Among Business Users by  iPass Inc.


March 14, 2012 - Technology and data consumption are evolving faster than mobile networks are able to adapt; what we at iPass are calling “Mobile Darwinism.” Learn more as you explore mobility trends and mobile usage among business users.

 

Understanding Network Regions - The Essentials by  Global Knowledge


December 12, 2013 - A guide for Avaya Aura Communications mananger and how you can set up network regions so that you can group together IP endpoints that share the same characteristics.

 

Understanding Oracle business intelligence and analytics by  ParAccel


January 10, 2013 - In this SearchOracle.com expert e-guide, read a Q&A that dives into the topics covered at the annual summit held this January by the business intelligence (BI) special interest group within the Independent Oracle Users Group (IOUG), including  advanced Oracle analytics, connectors to Hadoop, the R statistical programming language, and big data.

 

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES by  Intel


September 18, 2013 - This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life.

 

Understanding Power Factor, Crest Factor, and Surge Factor by  APC by Schneider Electric


January 01, 2006 - This paper explains the technical terms of Power Factor, Crest Factor, and Surge Factor.

 

Understanding Predictive Analytics: Your guide to the science that makes customer decisions smarter by  FICO


March 03, 2011 - Organizations of every size are using predictive analytics to unlock value in data and make smarter decisions about their customers. This guide tells you how predictive analytics works to improve customer decisions. It can help you see how much value this technology can add to your business – and to every customer interaction.

 

Understanding Remote Server Management in Small and Medium-size Business by  Raritan Inc.


January 01, 2008 - This white paper summarizes the results of a survey on remote server management in small and medium-sized business.

 

Understanding Security in Cloud Storage by  Nasuni Corporation


April 20, 2011 - The cloud offers the opportunity to significantly reduce cost while providing reliable, on-demand storage. Read on to learn more about the advantages of cloud storage today!

 

Understanding Successful Implementation by  Virtual Bridges


November 22, 2013 - This white paper will help you gain a thorough understanding of your VDI infrastructure, the problems that it may pose, and effective tactics for monitoring and resolving these obstacles.

 

Understanding the Components of Business Confidence by  IBM


July 08, 2009 - With over 60% of CEOs saying they need to do a better job of capturing and understanding information to make more effective and timely business decisions, it's clear that there's a gap between capability and need. It's similarly fair to say that this shortfall is a leading reason why businesses aren’t as competitive as they’d like to be.

 

Understanding the Current Mobile Trends and Network Upgrades by  Hewlett-Packard Company


August 02, 2013 - This brief video explores these new wireless LAN upgrades and possibilities and how it can optimize your network for the increasing amount of mobile devices.

 

Understanding the Data Management Challenges of Dodd-Frank by  Bloomberg


June 03, 2013 - Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.

 

Understanding the hard ROI of BYOD by  ComputerWeekly.com


June 03, 2013 - BYOD can increase IT costs, rather than decrease them. Companies need to look at carefuly at a range of variables to calculate the real ROI, says Nucleus Research

 

Understanding the HP CloudSystem Reference Architecture by  HP & Intel®


May 31, 2012 - This exclusive white paper showcases an integrated system that will allow you to build and manage services across private, public, and hybrid cloud environments, delivering unified security, governance, and compliance across applications as well as physical and virtual infrastructure.

 

Understanding the HP Data Deduplication Strategy: Why one size doesn't fit everyone by  Hewlett Packard Company and Intel


May 01, 2009 - This white paper explains how HP deduplication technologies work in practice, the pros and cons of each approach, when to choose a particular type, and the type of low-bandwidth replication models HP plans to support.

 

Understanding the Ins-and-Outs of IT Disaster Recovery Management by  SunGard Availability Services


November 25, 2013 - This crucial white paper examines what elements are critical in constructing comprehensive DR strategy, detailing the three components crucial to success: backup hardware, software, and the surrounding programs.

 

Understanding the Network Impact of 802.11ac by  Aerohive Networks


February 17, 2014 - This crucial webcast takes an in-depth look at 802.11ac and the impact it will have on your network, examining current wireless trends along with how you can best prepare your infrastructure for the next generation of Wi-Fi.

 

Understanding the Network Impact on Application Load Testing by  Shunra Software


February 01, 2008 - Delivering an application without considering the target network is not sufficient for load testing. Read this white paper that details a new solution for testing to make sure that application performance is optimal across the board.

 

Understanding the New Open API Economy by  TIBCO Software Inc.


December 31, 2013 - Open application programming interfaces (APIs) give partners and developers access to your business' data or functionality. Why would you want to use an open API? In this white paper, learn more about the business drivers of the open API economy, and learn what you should consider before deciding if open APIs are right for you.

 

Understanding the pros and cons of network virtualization by  Datalink and NetApp


November 29, 2011 - This expert E-Guide from SearchServerVirtualization.com explains the benefits of virtualizing the network. Find out how to utilize this technology to combine multiple networks into a single logical network. Plus, get answers to common questions about network virtualization technology to ensure a smooth transition.

 

Understanding the Real Risk for Asset Intensive Industries: Demystifying the Myths by  IBM/MRO


April 01, 2007 - There are common misconceptions about the value and deployment of ERP solutions in asset-intensive industries. This white paper demystifies the myths so decision makers in these asset-intensive industries can better understand what the real risk is.

 

Understanding the Reasons Behind Data Loss Disasters by  Websense, Inc.


February 02, 2012 - While the importance of establishing the right IT systems and security policies have been expressed time and time again, a quick glance at the news headlines on data disasters reveal that not all organizations have a grasp on data leak protection. View this paper to explore some data loss incidents and the key leassons learned.

 

Understanding the risks of mobile apps by  Veracode, Inc.


May 11, 2012 - Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.

 

Understanding the Role Storage Plays in Virtual Environments by  Isilon Systems


July 29, 2010 - To achieve the full benefits of virtualization and power applications, scalable storage becomes a critical component of the next generation datacenter. Read this white paper and develop a better understanding of the benefits scale-out storage provides for virtual environments.

 

Understanding The State Of Data Security And Privacy by  TITUS


October 01, 2013 - In this analyst report by Forrester Research, explore the state of data security from 2013 to 2014. Gain 3 takeaways to consider and adjustments to make with your current strategies before heading into the next year.

 

Understanding the Total Cost of Ownership for Endpoint Security Solutions by  Sophos, Inc.


March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

 

Understanding the Total Cost of Ownership for Endpoint Security Solutions by  Sophos, Inc.


March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

 

Understanding the Value of Cloud Solutions: Maximize Your ROI by  HP & Intel®


December 31, 2012 - This paper provides examples of the return on investment (ROI) of an HP Cloud Service Automation solution.

 

Understanding VMware vCloud Suite - A Technical Deep Dive by  VMware, Inc.


February 26, 2014 - This webcast covers the value of a software-defined data center and details the offering that VMware can give your organization.

 

Understanding Voice over IP Converged Trunking Alternatives by  Verizon and Adtran


January 01, 2008 - The benefits, risks and design alternatives are explored within this paper to help you select the solution and service provider that best meet your needs.

 

Understanding Web Application Security Challenges by  IBM


February 13, 2009 - This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.

 

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data by  Imperva


June 17, 2013 - In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.

 

Understanding What your Endpoint Security Policy Needs by  Symantec Corporation


November 22, 2013 - Access this e-guide for tips to determine whether antivirus alternatives should be brought to your network. Uncover what the future of endpoint antimalware holds, as well as how to detect hostile endpoints.

 

Understanding Why Web Application Security is Critical to Business by  Sirius Computer Solutions


September 01, 2009 - This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

 

Understanding Windows Azure Storage Billing – Bandwidth, Transactions, and Capacity by  Microsoft


July 08, 2010 - View the helpful blog post to learn how to build the most cost-effective applications using Windows Azure Storage (WAS) by understanding how bandwidth, transactions, and capacity are billed.

 

Understanding Windows PowerShell Functions by  Dell Compellent


September 22, 2011 - This expert e-guide, brought to you by SearchWindowsServer.com, offers advice to help you leverage PowerShell and other tools to automate your Hyper-V infrastructure.

 

Understanding WMI Malware by  Trend Micro, Inc.


October 26, 2010 - This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.

 

UNH Data Protection Makes the Grade with SEPATON S2100-ES2 Virtual Tape Library by  SEPATON


August 21, 2009 - As part of a data center consolidation project, the University of New Hampshire wanted to implement a faster, more efficient way to backup and protect their academic and administrative data. They turned to the SEPATON S2100-ES2 virtual tape library (VTL) with DeltaStor data deduplication.

 

Unification enables simplification:The efficient future of networking on 10Gb Ethernet. by  Intel


November 28, 2011 - An essential first step of launching the cloud is preparing your network for the unique requirements of services running on a multi-tenant shared infrastructure. This white paper discusses how a unified networking based on 10 Gigabit Ethernet can offer IT simplicity, scalability, and manageability in a cloud environment.

 

Unified Access and Optimization with F5 BIG-IP Edge Gateway by  F5 Networks


November 15, 2013 - This exclusive paper examines a gateway solution that integrates security, availability, and application acceleration services to enable context-aware networking, providing the unified access that today's mobile users need while keeping mobile data secure.

 

Unified and Intelligent Identity and Access Management by  Dell Software


July 08, 2011 - In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.

 

Unified Application Delivery by  F5 Networks


December 10, 2009 - By providing a unified Application Delivery Networking platform, F5 BIG-IP offers the ability for organizations to adopt a single platform for all its application delivery needs.

 

Unified Backup and Recovery with EMC NetWorker by  EMC Corporation


November 07, 2011 - This white paper highlights the scope of NetWorker features that enable users to flexibly combine different backup and recovery technologies and techniques to meet both common use cases as well as unique data protection demands.

 

Unified Backup: Virtual & Physical by  Dell Software


September 03, 2013 - In independent testing, researchers found Dell AppAssure offered advantages in ease-of-use and backup/recovery time. AppAssure's image-level backup technology can essentially eliminate the potential for data loss by creating closely spaced recovery points for mission-critical applications, such as Exchange, SQL and SharePoint. Read the Report

 

Unified Communication for Dummies by  Avaya Inc.


November 21, 2008 - Find here the real-world examples of how unified communications is being used now to solve critical business challenges and the tips you can use to meet your business needs in the modern, mobile work environment.

 

Unified Communication Manager - Class of Service by  Global Knowledge


February 14, 2013 - This whitepaper unveils how Class of Service within Cisco's Unified Communication Manager can help you control which phone numbers can be called by particular devices. View now to learn how this simple, flexible solution can be effective in numerous situations.

 

Unified Communications by  CDW Corporation


July 27, 2010 - Integrate multiple communication networks into a single, unified system to enable more effective communication and collaboration with staff, partners, and customers.

 

Unified Communications by  IBM


March 19, 2014 - This exclusive white paper examines how your peers are adopting UC solutions, including which solutions can satisfy your specific needs best and what direction the overall market is heading in.

 

Unified communications and collaboration in action by  IBM


October 05, 2009 - Find out how your employees, customers and business parters can share ideas and information better with a unified approach to business communications.

 

Unified Communications and Lotus Sametime by  IBM Software Group


June 20, 2007 - Learn how Colgate-Palmolive has improved communications and increased the efficiency of their organization with IBM's Unified Communications platform, Lotus Sametime.

 

Unified Communications Application: Uses and Benefits by  Cisco Systems, Inc.


January 01, 2006 - Productivity gains and cost savings from unified communication applications can be challenging for organizations considering the required investment. Based on a survey of 200 organizations using these applications, this paper outlines their challenges.

 

Unified Communications Buyer’s Guide by  ShoreTel


May 13, 2011 - The Unified Communications Buyer's Guide offers complete information to help you compare your options, including guidance to help you evaluate solutions and best practices for getting the most out of your UC vendor.

 

Unified Communications Buyer’s Guide by  ShoreTel


December 30, 2011 - This Unified Communications Buyer's Guide explores how UC can benefit your organization, how to know if your company is ready for UC, questions you should ask any potential UC vendor, and much more!

 

Unified Communications Drive Protocol Convergence by  Polycom, Inc.


May 18, 2011 - Unified communications (UC) is morphing voice, video, instant messaging and presence systems into one, but this trend is also bringing on a technical challenge. In this white paper, learn how your organization can receive the benefits of UC while providing a full range of services to end users.

 

Unified communications etiquette guide: What to know, what to avoid by  Avaya


September 06, 2011 - This e-guide takes a close look at UC etiquette: what you should know and what you need to avoid. Uncover the different types of strategies, applications, platforms and models you’ll need to help your organization streamline business processes with collaborative communications.

 

Unified Communications Pocket Guide by  ShoreTel


May 19, 2009 - This guide is intended for both IT staff, voice system managers, as well as CIOs. It describes the issues decision makers need to understand as they set out to build a winning unified communication strategy.

 

Unified Communications Trends and Challenges: How to Stay on Top by  ScanSource Communications


April 06, 2011 - This e-guide discusses the top trends affecting the unified communication's (UC) market as well as potential UC and IP telephony challenges. Learn what you can do to tackle these issues and stay ahead of the competition.

 

Unified Communications Trends: What's in Store for 2014? by  Premiere Global Services


February 19, 2014 - Access the following e-guide to uncover the top 5 trends changing the game for unified communications today. Additionally, hear from an industry analyst as he revels what you can expect to see for collaboration technology in 2014.

 

Unified Communications: Strategic Value, Benefits and the Role of System Integrators by  Hewlett-Packard Company


August 29, 2008 - This white paper shows how current economic and technological trends increase the importance of efficient communication and collaboration processes for enterprises. Further, it demonstrates how unified communications (UC) can help companies to address these challenges.

 

Unified Communications: Improving Clinical Performance by  BlackBerry


February 01, 2010 - Read on to learn more about the importance of clinical unified communications, as well as the first steps to take toward deploying innovative and valuable applications of UC in your healthcare organization.

 

Unified Computing: An Agile Platform for Your Next Gen Virtualized Data Center by  PC Connection


May 17, 2011 - The data center is under great pressure as managers try to balance business demands and operational limitations. This webcast discusses how to transform your data center through virtualization and process automation, bringing your organization exceptional benefits.

 

Unified Content Security in Practice by  Websense, Inc.


May 03, 2011 - Unified Content Security is a new sescurity solution, but it is an effective one. With this solutions your business is able to combine web security, email security, and data loss prevention.

 

Unified Data Architecture by  Teradata


January 31, 2014 - Access the following e-book to uncover the tools and strategies you need to get the most out of big data. Learn from leading authors in the field of data management as they explain some of the common mistakes made by analytics professionals while mining for new insights and what you can do to avoid them.

 

Unified data center fabric overview: Tips from the pro by  Enterasys


December 02, 2011 - Access this e-guide to learn more about data center fabrics with tips from the pros.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts