U Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
U Listings:  Result Page 1 | 2 | 3

U.S. Army Relies on GlobalSCAPE® Secure Information Exchange Solutions to Protect Critical Data by  GlobalScape

June 24, 2011 - Now you can get a file sharing solution that the U.S. Army uses and eliminate any worries you have about transferring sensitive business data. This case study will show you how this solution has been very successful for the Army and will teach you how your business could benefit a great deal as well.


U.S. Army Relies on Globalscape® to Protect Critical Data by  GlobalScape

December 31, 2013 - In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).


U.S. Navy Cyber Defense Operations Command by  Novell, Inc.

December 08, 2009 - Using Novell® Sentinel™ as part of its PROMETHEUS system, the Navy Cyber Defense Operations Command (NCDOC) has automated and centralized security monitoring across hundreds of diverse locations worldwide.


UC And Collaboration Adoption By Business Leads To Real Benefits by  Cisco

July 31, 2013 - In this paper, research shows that buyers are investing in a wide range of UC&C capabilities. The data shows that they derive real business value when deploying multiple capabilities based on the latest innovations in ways that meet both IT operational and line-of-business requirements.


UC and Collaboration: Benefits and Market Drivers by  SearchSecurity.com

January 30, 2013 - This expert E-Guide from SearchUnifiedCommunications.com explores the benefits collaboration can bring your enterprise and provides an in-depth look at the drivers forcing organizations to find a newer, better UCC solution for their employees to leverage.


UC and the Evolution of Enterprise Telephony by  SearchSecurity.com

April 18, 2013 - This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with unified communications (UC).


UC Collaboration Tools: Greater simplicity needed for IT, end users by  SearchSecurity.com

May 21, 2012 - Uncover why many organizations require greater simplicity in their unified communications (UC) collaboration tools – for both end-users and IT – in order for their UC strategy to be a success. Learn best practices to integrate UC tools, potential challenges you may face, and more!


UC Messaging by  CDW Corporation

March 11, 2011 - Watch this videocast to learn how visual voice mail, speech recognition and voice-to-text can improve information sharing.


UC Strategies and the Evolving Cloud by  SearchSecurity.com

October 01, 2012 - This E-Guide from SearchUnifiedCommunications.com explores the concept of cloud unified communications, the strategies and plans it offers, and how your organization can benefit.


UC Trends That are Changing Collaboration by  Cisco

January 16, 2014 - This expert e-guide features information on the unified communications market with five key trends and a top 10 list of news stories from the past year.


UCHC Leverages Enterprise Job Scheduling to Automate Data Integration Processes by  Cisco Systems, Inc.

January 24, 2012 - Thinking of launching a data warehousing project? Learn how the University of Connecticut Health Center (UCHC), a leading biomedical research center, healthcare facility, and medical school, achieved end-to end automation of data integration and data loading processes from internal and external data sources to ensure consistent, accurate reporting.


UFC knocks out video production bottlenecks with Flash storage by  IBM

December 31, 2012 - Access this case study to discover how the Ultimate Fighting Championship implemented a non-disruptive flash storage technology within a day to eradicate video production bottlenecks.


UK Computer Science Education in the 21st Century by  ComputerWeekly.com

April 03, 2013 - Management consultant Yva Thakurdas assesses the scale of the UK IT skills gap, analyses its causes and potential solutions in this presentation.


UK IT priorities 2012 by  ComputerWeekly.com

August 24, 2012 - This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies.


UK MSP Now Delivering a Reliably Consistent Service to Clients by  Autotask Corporation

January 30, 2014 - This brief video covers a solution that can provide a consistent and reliable help desk and ticketing platform.


UK MSP: Winning and Retaining Customers More Effectively with Autotask by  Autotask Corporation

January 29, 2014 - This brief video covers how to make your organization accountable for IT.


UK Network Carrier Gains Network Visibility For Quick Troubleshooting by  Gigamon

December 31, 2012 - This case study focuses on a UK telecommunications organization that found a way to gain network visibility for quick troubleshooting and customer satisfaction, without affecting existing production network.


UK Service Provider Performance and Satisfaction 2012 by  ComputerWeekly.com

September 14, 2012 - This exclusive report from KPMG assesses UK organisations' satisfaction with their outsourcing service providers and looks at outsourcing trends in 2012.


UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010 by  ComputerWeekly.com

June 02, 2010 - In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010.


Ultimate SQL Tune-Off by  Embarcadero Technologies, Inc.

June 10, 2010 - According to Jonathan Lewis, there is a basic strategy to writing efficient SQL, but it requires knowledge of the data, the metadata, and the intent of the query. Kyle Hailey, though, will discuss his own approach to Visual SQL Tuning (VST) with some ringside support from DB Optimizer XE. Be sure to check out this exciting debate!


Ultrabooks & Mobile Computing by  ComputerWeekly.com

January 05, 2012 - In this report extract, Juniper Research looks at the market challenges and opportunities of ultrabooks, the next generation of note book PCs.


UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by  RSA, The Security Division of EMC

March 27, 2012 - Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more.


Unauthorized Applications: Taking Back Control by  Sophos, Inc.

July 01, 2008 - This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.


Unchain your network with application intelligence and control by  Dell Software

July 31, 2012 - This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.


Unchain Your Network with Application Intelligence and Control by  SonicWALL

February 24, 2011 - This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.


Unclutter Your Data Center With Consolidated Log Management by  VMware, Inc.

June 13, 2013 - In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.


Uncompromising Reliability through Clustered Storage by  Isilon Systems

February 21, 2008 - This white paper describes the limitations of traditional data protection technologies and examines Isilon IQ’s revolutionary new approach to ensuring data integrity and availability in large clustered storage environments.


Uncover Every Nook and Cranny of SDN Technology by  NEC Corporation of America

October 04, 2013 - Read this concise white paper to uncover all the ins-and-outs of one organization's SDN technology.


Uncover the Benefits of Virtualization by  BMC Software, Inc.

November 03, 2009 - BMC Software's internal IT organization launched a virtualization and automation initiative that achieved financial payback in less than six months. The effort improved productivity, increased responsiveness, and saved the company $5 million per year.


Uncover the key features of HP's ConvergedSystem for virtualization by  HP and Intel

March 05, 2014 - Access this resource for multiple white papers and a webcast on the ins-and-outs of a converged infrastructure system.


Uncovering assessment response bias by  IBM

November 04, 2013 - The following white paper details the importance of being able to evaluate nearly every aspect of a potential candidate and most importantly, how to do so.


Uncrossing the Wires: Starting - And Sustaining - The Conversation on Technology Value by  Cisco Systems, Inc.

March 01, 2012 - In December 2011 and January 2012, CFO Research Services and SearchCIO conducted a survey that received qualified responses from 382 senior finance executives and 300 senior IT executives working in a wide variety of companies. Review key findings and learn the three noteworthy areas where IT and finance executives are in strong agreement.


Under Armour Improves Performance of SAP Data Loading with Winshuttle by  Winshuttle, LLC

December 05, 2008 - Winshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention.


Under the Cloud, a Climate Change for IT by  Cisco Systems, Inc.

December 19, 2013 - This brief write-up examines some of the key findings from a survey of over 4,000 IT leaders in 18 industries across nine key global economies on how the cloud is impacting IT.


Under the Hood of Your New Server by  Dell, Inc. and Microsoft

December 10, 2009 - Even though some network servers look very much like the standalone computers that fill your office, they play a very different role in your business than desktop PCs do, and therefore their design is very different under the hood. Take a tour of the components that give a server the power it needs to handle your tough workload.


Under the Spotlight the Transition of Environmental Risk Management by  SAP America, Inc.

July 07, 1967 - In March 2008, the Economist Intelligence Unit surveyed 320 executives from around the world about their attitudes to environmental risk management. Read about their findings in this paper.


Underexposed risks of public Wi-Fi hotspots by  ComputerWeekly.com

March 15, 2013 - This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.


Understand and Counter Insider Threats with Behavioral Analytics by  Hewlett-Packard Company

November 14, 2013 - This in-depth resource explores how to combat insider threats and what you can do to prevent them from causing devastating attacks.


Understand Cloud ERP by  IFS

June 11, 2013 - This on-demand webcast dispels the confusion surrounding cloud enterprise resource planning (ERP). Inside, find out how cloud ERP works, uncover the key benefits it can offer your organization, learn about executive perceptions and misconceptions, and more.


Understanding Advanced Persistent Threats and Complex Malware by  Dell SecureWorks UK

October 10, 2012 - Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.


Understanding Advanced Virtualization Security Practices by  Intel

August 18, 2011 - SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.


Understanding AIX Logical Volume Management by  Global Knowledge

May 30, 2014 - This whitepaper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.


Understanding an OLAP Solution from Oracle by  Oracle Corporation

September 18, 2008 - This white paper discusses two Oracle OLAP solutions: Oracle's Hyperion Essbase and Oracle Database 11g OLAP Option which share similar characteristics but are individuals with their differences.


Understanding and Detecting Malware Threats Based on File Size by  Fortinet, Inc.

December 01, 2006 - Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.


Understanding and Determining Your Dedupe Ratio by  HP and Intel

June 21, 2011 - This SearchStorage.com E-Guide answers these questions and more around deduplication ratios to help your business better understand why they’re important and how to estimate your own.


Understanding and Evaluating BI Options for SQL Server by  SearchSQLServer.com

May 07, 2013 - This expert handbook explores the value that SQL Server business intelligence (BI) tools can provide your organization, and evaluates your analytics options in order to help you find the approach that's best suited for your business needs.


Understanding and Managing Supply Chain Risk by  SAP America, Inc.

January 01, 2006 - Download this white paper and explore new thinking on potential risk to global supply chains and how companies are adopting the statistical methods more commonly associated with finance and insurance. Learn how identifying and profiling risk variables, quantifying risk and using IT solutions can create higher resilience for supply chain management.


Understanding and Selecting a Data Loss Prevention Solution by  Websense, Inc.

January 13, 2011 - Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.


Understanding and Selecting a Data Loss Prevention Solution by  Websense, Inc.

July 07, 1967 - Data Loss Prevention is a confusing market, but by understanding the capabilities of DLP tools you can choose an appropriate tool. This report will provide the necessary background in DLP to help you find the best match for your organization.


Understanding and Selecting a Database Activity Monitoring Solution by  Imperva

February 10, 2009 - Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications.


Understanding and Selecting a Database Assessment Solution by  Application Security, Inc.

February 22, 2010 - In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment.


Understanding and Selecting a File Activity Monitoring Solution by  Imperva

May 16, 2011 - Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.


Understanding and Selecting Data Masking Solutions by  IBM

August 10, 2012 - This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.


Understanding and Simplifying Sharepoint 2007 Permissions Management by  Idera

July 27, 2010 - Authentication to a SharePoint environment is the process in which a company’s IT architecture approves a user’s credentials. To fully understand the spectrum involved with managing permissions in a SharePoint environment, you need to know the components involved with permissions and how they work with one another.


Understanding Architectural Priorities Inside Government Clouds by  AMD

January 25, 2011 - Not since the advent of the Internet has a technological concept achieved more attention than cloud computing. AMD’s server platform technology is uniquely tuned to address critical government requirements for reducing costs, simplifying operations and raising energy efficiency in server price/performance. 


Understanding Automatic Failover for DR: 6 FAQs by  FalconStor Software

July 19, 2011 - Automatic failover involves automatically moving an application to a standby server during a failure or service event to preserve its time. Fortunately, there are a number of approaches available in the market today. Check out this guide to learn the answers to 6 FAQs about automatic failover and disaster recovery automation.


Understanding Avaya IP Office Short Codes by  Global Knowledge

May 01, 2013 - This white paper provides a road map to understanding the programming and use of short codes in an Avaya IP Office system. It is based primarily on the codes used with the IPO 8.1 U-Law system with the Essential, Preferred, or Advanced Edition system licenses.


Understanding Big Data : Analytics for Enterprise Class - Hadoop and Streaming Data by  IBM

December 31, 2012 - The transformation to a big data-ready environment isn't easy, as choosing the right strategy, technologies and goals can be a complicated process. This 166-page e-book will give you a better understanding of the opportunities that big data presents and provide an in-depth look at the tools you'll need to execute a big data analytics program.


Understanding Big Data and Security by  Hewlett-Packard Limited

April 16, 2013 - This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility.


Understanding big data so you can act with confidence by  IBM

July 31, 2013 - Ensuring your data is secure and trustworthy is paramount to harnessing the power of big data, but it's also a difficult task when you've got such a large volume and variety of information coming into the business. Unfortunately, traditional methods of governing and correcting often aren't applicable to big data -- so what can you do?


Understanding Big Data: Analytics to Enterprise Class Hadoop and Streaming Data by  IBM

February 22, 2012 - This comprehensive white paper delves into the world of big data technologies, such as Hadoop, and how to extend it into an enterprise-ready big data platform. It discusses everything related to big data, including common challenges and patterns that exist, and concludes with a chapter on big data analytics with real-world success stories.


Understanding BlackBerry Balance by  BlackBerry

July 10, 2013 - This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.


Understanding Built-in Expertise and Patterns by  IBM

April 09, 2013 - Tune into this podcast to learn more about how businesses are interpreting large amounts of data with business intelligence. It outlines some of the trends to look out for in the IT environment and how shifting the focus of spending money can change the structure of your business.


Understanding Cloud Computing Networks by  Dell, Inc. and Intel®

December 19, 2011 - Cloud computing is catching on, but cloud networks are proving to be challenging to implement and manage. Before enterprises begin architecting their cloud computing networks, they need to consider the impact on the network.


Understanding cloud integration by  Liaison Technology

June 21, 2012 - Many people confuse cloud application integration and cloud-based data integration, but these two types of integrations are actually very different and each requires different approaches, methods, and tools. This expert e-guide addresses the differences between the two and will help you understand which approach will best suit your needs.


Understanding Consumer Device Management and BYOD by  SearchSecurity.com

November 28, 2012 - This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!


Understanding Desktop Virtualization by  Intel

June 08, 2011 - Desktop virtualization is being considered by more IT pros as they face increasing pressure to control costs, security, regulate compliance and more. Read this white paper to learn about the various desktop virtualization models available for your infrastructure, how each model works and identify the best fit for your IT shop today.


Understanding Desktop Virtualization by  Intel

September 13, 2011 - This white paper describes the variety of desktop virtualization models available, how each works, and the advantages and limitations of each model for key vectors such as security, manageability, and power consumption. Also identified are the major providers of software solutions and the end-point devices to deploy each model.


Understanding DLP in the cloud by  SearchSecurity.com

June 04, 2012 - In this tip, uncover how data loss prevention (DLP) for the cloud works and how it can actually enhance security and compliance beyond traditional DLP solutions for physical environments.


Understanding EPO and Its Downtime Risks by  APC by Schneider Electric

January 01, 2005 - This white paper describes the advantages and disadvantages of EPO for protecting data centers and small IT equipment rooms containing UPS systems.


Understanding High Availability for the BlackBerry Enterprise Server by  BlackBerry

August 06, 2009 - Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades.


Understanding High Availability for the BlackBerry Enterprise Server by  BlackBerry

August 06, 2009 - Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades.


Understanding Hosted Exchange Options by  SearchExchange.com

May 09, 2013 - This expert handbook examines the pros and cons of on-premise vs. off-premise Exchange environments. Learn more about how to weigh hosted Exchange options, the key security considerations and why new Office 365 versions are emphasizing subscriptions.


Understanding how advanced analytics can transform your business by  SAP America, Inc.

June 22, 2011 - This eBook focuses on how organizations should leverage the new breed of advanced analytics tools, including in-memory analytics, in-database analytics and complex event processing.


Understanding How Converged Infrastructure Works by  HP & Intel®

February 19, 2013 - This expert e-guide offers a discussion of the different types of converged infrastructure and provides an overview of their advantages for IT environments. The paper goes on to introduce converged infrastructure hardware and the advantages offered by its use of four types of virtualization.


Understanding Intel Xeon 5600 Series Memory Performance and Optimization in IBM System x and BladeCenter Platforms by  IBM

January 20, 2011 - This white paper examines the architecture and performance of the Intel Xeon processor 5600 Series. The performance analysis covers latency to main memory, memory bandwidth and application performance, and addresses performance issues related to memory speed and population of memory.


Understanding ITIL® Service Portfolio Management: An Approach For Implementing Effective Service Lifecycle Management by  BMC Software, Inc.

June 15, 2009 - IT executives and their teams need a comprehensive and accurate view of IT services. A service catalog includes all relevant details about your services, including which service level agreements (SLAs) are associated with it, who is able to request it, how much it costs, and how to fulfill it. This paper describes the IT Infrastructure...


Understanding Log Shipping and Its Advantages for Compliance Archiving with Microsoft Exchange Server by  Mimosa Systems

October 01, 2008 - This white paper describes how log shipping compares with journaling for Exchange compliance archiving.


Understanding Microsoft Office 2013 Features, Licensing and Security by  SearchEnterpriseDesktop

May 22, 2014 - Before moving to Microsoft Office 2013 or Office 365, IT pros should compare features, licensing schemes and application usage and be aware of emerging Office alternatives.


Understanding Microsoft Offloaded Data Transfer on Dell EqualLogic PS Series Arrays by  Dell and Microsoft

April 15, 2013 - This crucial paper examines a storage solution that delegates the heavy lifting of large data transfers to the intelligence of the storage array, reducing the utilization of resources and improving user productivity and efficiency.


Understanding Mobility Trends and Mobile Usage Among Business Users by  iPass Inc.

March 14, 2012 - Technology and data consumption are evolving faster than mobile networks are able to adapt; what we at iPass are calling “Mobile Darwinism.” Learn more as you explore mobility trends and mobile usage among business users.


Understanding Network Regions - The Essentials by  Global Knowledge

December 12, 2013 - A guide for Avaya Aura Communications mananger and how you can set up network regions so that you can group together IP endpoints that share the same characteristics.


Understanding Oracle business intelligence and analytics by  ParAccel

January 10, 2013 - In this SearchOracle.com expert e-guide, read a Q&A that dives into the topics covered at the annual summit held this January by the business intelligence (BI) special interest group within the Independent Oracle Users Group (IOUG), including  advanced Oracle analytics, connectors to Hadoop, the R statistical programming language, and big data.


Understanding Patterns of Expertise: Virtual Application Patterns by  IBM

September 30, 2012 - This resource explains how strategic IT and business leaders can use patterns of expertise provided by virtual application patterns to speed application deployments, reduce the risk of error, simplify and automate management tasks, and more.



September 18, 2013 - This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life.


Understanding Power Factor, Crest Factor, and Surge Factor by  APC by Schneider Electric

January 01, 2006 - This paper explains the technical terms of Power Factor, Crest Factor, and Surge Factor.


Understanding Predictive Analytics: Your guide to the science that makes customer decisions smarter by  FICO

March 03, 2011 - Organizations of every size are using predictive analytics to unlock value in data and make smarter decisions about their customers. This guide tells you how predictive analytics works to improve customer decisions. It can help you see how much value this technology can add to your business – and to every customer interaction.


Understanding Remote Server Management in Small and Medium-size Business by  Raritan Inc.

December 01, 2005 - This white paper summarizes the results of a survey on remote server management in small and medium-sized business.


Understanding Security in Cloud Storage by  Nasuni Corporation

April 20, 2011 - The cloud offers the opportunity to significantly reduce cost while providing reliable, on-demand storage. Read on to learn more about the advantages of cloud storage today!


Understanding Successful Implementation by  Virtual Bridges

November 22, 2013 - This white paper will help you gain a thorough understanding of your VDI infrastructure, the problems that it may pose, and effective tactics for monitoring and resolving these obstacles.


Understanding Successful VDI Implementation by  Virtual Bridges

April 17, 2014 - This whitepaper offers a detailed explanation of modern VDI initiatives, the most common problems encountered, and the effective tactics that help keep it problem-free.


Understanding the Advanced Persistent Threat by  LogRhythm, Inc.

December 31, 2013 - This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.


Understanding the Advantages of Hybrid Clouds by  Brocade

July 31, 2011 - Access this brief Q&A to learn more about hybrid clouds and the advantages they can bring to your organization.


Understanding the Components of Business Confidence by  IBM

July 08, 2009 - With over 60% of CEOs saying they need to do a better job of capturing and understanding information to make more effective and timely business decisions, it's clear that there's a gap between capability and need. It's similarly fair to say that this shortfall is a leading reason why businesses aren’t as competitive as they’d like to be.


Understanding the Data Management Challenges of Dodd-Frank by  Bloomberg

June 03, 2013 - Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.


Understanding the hard ROI of BYOD by  ComputerWeekly.com

June 03, 2013 - BYOD can increase IT costs, rather than decrease them. Companies need to look at carefuly at a range of variables to calculate the real ROI, says Nucleus Research


Understanding the HP CloudSystem Reference Architecture by  HP & Intel®

May 31, 2012 - This exclusive white paper showcases an integrated system that will allow you to build and manage services across private, public, and hybrid cloud environments, delivering unified security, governance, and compliance across applications as well as physical and virtual infrastructure.


Understanding the HP Data Deduplication Strategy: Why one size doesn't fit everyone by  Hewlett Packard Company and Intel

May 01, 2009 - This white paper explains how HP deduplication technologies work in practice, the pros and cons of each approach, when to choose a particular type, and the type of low-bandwidth replication models HP plans to support.


Understanding the Ins-and-Outs of IT Disaster Recovery Management by  SunGard Availability Services

November 25, 2013 - This crucial white paper examines what elements are critical in constructing comprehensive DR strategy, detailing the three components crucial to success: backup hardware, software, and the surrounding programs.


Understanding the Network Impact of 802.11ac by  Aerohive Networks

February 17, 2014 - This crucial webcast takes an in-depth look at 802.11ac and the impact it will have on your network, examining current wireless trends along with how you can best prepare your infrastructure for the next generation of Wi-Fi.


Understanding the Network Impact on Application Load Testing by  Shunra Software

February 01, 2008 - Delivering an application without considering the target network is not sufficient for load testing. Read this white paper that details a new solution for testing to make sure that application performance is optimal across the board.


Understanding the New Open API Economy by  TIBCO Software Inc.

December 31, 2013 - Open application programming interfaces (APIs) give partners and developers access to your business' data or functionality. Why would you want to use an open API? In this white paper, learn more about the business drivers of the open API economy, and learn what you should consider before deciding if open APIs are right for you.


Understanding the pros and cons of network virtualization by  SearchSecurity.com

November 29, 2011 - This expert E-Guide from SearchServerVirtualization.com explains the benefits of virtualizing the network. Find out how to utilize this technology to combine multiple networks into a single logical network. Plus, get answers to common questions about network virtualization technology to ensure a smooth transition.


Understanding the Real Risk for Asset Intensive Industries: Demystifying the Myths by  IBM/MRO

April 01, 2007 - There are common misconceptions about the value and deployment of ERP solutions in asset-intensive industries. This white paper demystifies the myths so decision makers in these asset-intensive industries can better understand what the real risk is.


Understanding the Reasons Behind Data Loss Disasters by  Websense, Inc.

February 02, 2012 - While the importance of establishing the right IT systems and security policies have been expressed time and time again, a quick glance at the news headlines on data disasters reveal that not all organizations have a grasp on data leak protection. View this paper to explore some data loss incidents and the key leassons learned.


Understanding the risks of mobile apps by  Veracode, Inc.

May 11, 2012 - Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.


Understanding the Role Storage Plays in Virtual Environments by  Isilon Systems

July 29, 2010 - To achieve the full benefits of virtualization and power applications, scalable storage becomes a critical component of the next generation datacenter. Read this white paper and develop a better understanding of the benefits scale-out storage provides for virtual environments.


Understanding the Total Cost of Ownership for Endpoint Security Solutions by  Sophos, Inc.

March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.


Understanding the Total Cost of Ownership for Endpoint Security Solutions by  Sophos, Inc.

March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.


Understanding the Value of Cloud Solutions: Maximize Your ROI by  HP & Intel®

December 31, 2012 - This paper provides examples of the return on investment (ROI) of an HP Cloud Service Automation solution.


Understanding the Vendor Neutral Archive: How to Approach a VNA for Immediate and Longer-Term Benefit by  BridgeHead Software

February 28, 2013 - This white paper explains the basics behind vendor neutral archives (VNAs). Click through to uncover the short- and long-term benefits, as well as get information of what to consider before making the investment.


Understanding Voice over IP Converged Trunking Alternatives by  Verizon and Adtran

January 01, 2008 - The benefits, risks and design alternatives are explored within this paper to help you select the solution and service provider that best meet your needs.


Understanding Web Application Security Challenges by  IBM

February 13, 2009 - This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.


Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data by  Imperva

June 17, 2013 - In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.


Understanding Why Web Application Security is Critical to Business by  Sirius Computer Solutions

September 01, 2009 - This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.


Understanding Windows Azure Services by  SIOS Technology Corp

May 06, 2014 - This expert e-guide highlights essential knowledge for the Windows Azure platform by understanding the main parts and responsibilities for IT pros working with Azure. Inside, learn about the features that Azure offers and what this will mean for the IT industry.


Understanding Windows Azure Storage Billing – Bandwidth, Transactions, and Capacity by  Microsoft

July 08, 2010 - View the helpful blog post to learn how to build the most cost-effective applications using Windows Azure Storage (WAS) by understanding how bandwidth, transactions, and capacity are billed.


Understanding Windows PowerShell Functions by  Dell Compellent

September 22, 2011 - This expert e-guide, brought to you by SearchWindowsServer.com, offers advice to help you leverage PowerShell and other tools to automate your Hyper-V infrastructure.


Understanding WMI Malware by  Trend Micro, Inc.

October 26, 2010 - This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.


Understanding Your PCI DSS Guidelines: Successes and Failures by  SearchSecurity.com

December 13, 2013 - This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.


UNH Data Protection Makes the Grade with SEPATON S2100-ES2 Virtual Tape Library by  SEPATON

August 21, 2009 - As part of a data center consolidation project, the University of New Hampshire wanted to implement a faster, more efficient way to backup and protect their academic and administrative data. They turned to the SEPATON S2100-ES2 virtual tape library (VTL) with DeltaStor data deduplication.


Unification enables simplification:The efficient future of networking on 10Gb Ethernet. by  Intel

November 28, 2011 - An essential first step of launching the cloud is preparing your network for the unique requirements of services running on a multi-tenant shared infrastructure. This white paper discusses how a unified networking based on 10 Gigabit Ethernet can offer IT simplicity, scalability, and manageability in a cloud environment.


Unified Access and Optimization with F5 BIG-IP Edge Gateway by  F5 Networks

November 15, 2013 - This exclusive paper examines a gateway solution that integrates security, availability, and application acceleration services to enable context-aware networking, providing the unified access that today's mobile users need while keeping mobile data secure.


Unified and Intelligent Identity and Access Management by  Dell Software

July 08, 2011 - In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.


Unified Application Delivery by  F5 Networks

December 10, 2009 - By providing a unified Application Delivery Networking platform, F5 BIG-IP offers the ability for organizations to adopt a single platform for all its application delivery needs.


Unified Backup and Recovery with EMC NetWorker by  EMC Corporation

November 07, 2011 - This white paper highlights the scope of NetWorker features that enable users to flexibly combine different backup and recovery technologies and techniques to meet both common use cases as well as unique data protection demands.


Unified Backup: Virtual & Physical by  Dell Software

September 03, 2013 - In independent testing, researchers found Dell AppAssure offered advantages in ease-of-use and backup/recovery time. AppAssure's image-level backup technology can essentially eliminate the potential for data loss by creating closely spaced recovery points for mission-critical applications, such as Exchange, SQL and SharePoint. Read the Report


Unified Communication for Dummies by  Avaya Inc.

November 21, 2008 - Find here the real-world examples of how unified communications is being used now to solve critical business challenges and the tips you can use to meet your business needs in the modern, mobile work environment.


Unified Communication Manager - Class of Service by  Global Knowledge

February 14, 2013 - This whitepaper unveils how Class of Service within Cisco's Unified Communication Manager can help you control which phone numbers can be called by particular devices. View now to learn how this simple, flexible solution can be effective in numerous situations.


Unified Communications by  CDW Corporation

July 27, 2010 - Integrate multiple communication networks into a single, unified system to enable more effective communication and collaboration with staff, partners, and customers.


Unified communications and collaboration in action by  IBM

October 05, 2009 - Find out how your employees, customers and business parters can share ideas and information better with a unified approach to business communications.


Unified Communications and Lotus Sametime by  IBM Software Group

June 20, 2007 - Learn how Colgate-Palmolive has improved communications and increased the efficiency of their organization with IBM's Unified Communications platform, Lotus Sametime.


Unified Communications Application: Uses and Benefits by  Cisco Systems, Inc.

January 01, 2006 - Productivity gains and cost savings from unified communication applications can be challenging for organizations considering the required investment. Based on a survey of 200 organizations using these applications, this paper outlines their challenges.


Unified Communications Buyer’s Guide by  ShoreTel

May 13, 2011 - The Unified Communications Buyer's Guide offers complete information to help you compare your options, including guidance to help you evaluate solutions and best practices for getting the most out of your UC vendor.


Unified Communications Buyer’s Guide by  ShoreTel

December 30, 2011 - This Unified Communications Buyer's Guide explores how UC can benefit your organization, how to know if your company is ready for UC, questions you should ask any potential UC vendor, and much more!


Unified Communications Drive Protocol Convergence by  Polycom, Inc.

May 18, 2011 - Unified communications (UC) is morphing voice, video, instant messaging and presence systems into one, but this trend is also bringing on a technical challenge. In this white paper, learn how your organization can receive the benefits of UC while providing a full range of services to end users.


Unified communications etiquette guide: What to know, what to avoid by  SearchSecurity.com

September 06, 2011 - This e-guide takes a close look at UC etiquette: what you should know and what you need to avoid. Uncover the different types of strategies, applications, platforms and models you’ll need to help your organization streamline business processes with collaborative communications.


Unified communications integration: Single vs. multi-vendor environments by  SearchSecurity.com

July 18, 2012 - This e-guide compares the pros and cons of implementing a single versus multi-vendor UC environment, and offers tips for overcoming key UC integration challenges.


Unified Communications Pocket Guide by  ShoreTel

May 19, 2009 - This guide is intended for both IT staff, voice system managers, as well as CIOs. It describes the issues decision makers need to understand as they set out to build a winning unified communication strategy.


Unified Communications Trends and Challenges: How to Stay on Top by  SearchSecurity.com

April 06, 2011 - This e-guide discusses the top trends affecting the unified communication's (UC) market as well as potential UC and IP telephony challenges. Learn what you can do to tackle these issues and stay ahead of the competition.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts