W Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
W Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6
 

Webinar: Achieving Smarter Process with a mobile first approach by  IBM


March 11, 2014 - In this webcast, industry experts examine some of the scenarios where customer engagement processes and mobility work in conjunction to create more successful interactions with customers and drive business value exponentially.

 

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market by  ArcSight, an HP Company


March 04, 2011 - This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

 

Webinar: Autoscaling Server Arrays by  RightScale


March 01, 2010 - This webinar focuses on how the RightScale Platform handles autoscaling with specific instructions and a live demo.

 

Webinar: Benefits of Grid Computing in the Cloud by  RightScale


February 25, 2010 - See how pharmaceutical, insurance, and Web 2.0 companies are using grid computing to reduce costs and speed processing. You’ll learn how to set up a scalable compute array using RightScale's Grid Edition.

 

Webinar: Business Intelligence in the Cloud by  RightScale


February 24, 2010 - In this webinar, you will be introduced to the first business intelligence solution stack running on the cloud. This cutting-edge solution has been created by business intelligence industry leaders Jaspersoft, Talend and Vertica with the leader in cloud computing management, RightScale.

 

Webinar: Create Secure Test and Dev Environments in the Cloud by  RightScale


February 24, 2010 - In this webinar, you will lean how to operate your entire application testing infrastructure in the cloud to save time and money – enabling you to test more extensively and quickly hand off projects from development to operations.

 

Webinar: Deploying a Major Server Upgrade on the Cloud by  RightScale


March 01, 2010 - This webinar continues the exploration of how to manage deployments on the cloud. We demonstrate how much easier and more efficient it is to perform maintenance tasks on the cloud using the RightScale Cloud Management Platform, while staying in control through the entire process.

 

Webinar: How to Deploy and Manage Rails Apps on the Cloud by  RightScale


February 25, 2010 - In this webinar learn how you can use RightScale and New Relic to launch and monitor your Rails app on the cloud.

 

Webinar: Implementing Powerful IT Search on the Cloud by  RightScale


March 01, 2010 - Traditional, static approaches to managing IT data simply aren't built for the cloud. In this webinar, Splunk provides an alternative that is dynamic and easily deployed using the RightScale Platform.

 

Webinar: Managing the Deployment Lifecycle by  RightScale


March 01, 2010 - In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.

 

Webinar: RightScale and Amazon EC2 in Europe by  RightScale


February 25, 2010 - Learn how to utilize RightScale for your deployment on Amazon EC2 in Europe. In this webinar, the importance of RightScale and Amazon EC2 in Europe and European adoption of cloud computing will be discussed.

 

Webinar: SaaS vs. On-Premise: A Black and White Comparison by  Workday


February 12, 2014 - SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered. 

 

Webinar: Transitioning to the Cloud - Implications for Reliability, Redundancy and Recoverability by  RightScale


February 24, 2010 - Hear from leading experts in cloud computing to gain real-world insight into how their customers are using cloud computing and achieving new levels of backup, recovery and reliability. In this webinar, learn how you can migrate your apps and data to the cloud in a way that's affordable and reliable.

 

Webinar: What’s New in Linux System Management by  Red Hat


October 28, 2013 - Watch this webcast to learn about the latest Red Hat Satellite capabilities and see them in action.

 

Webinar: Why Top Social Game Companies Are Moving to the Cloud with RightScale by  RightScale


February 24, 2010 - Watch this webinar and you will walk away with a better understanding of how RightScale can help you manage the challenges and opportunities in the social game industry.

 

WebLogic Suite ActiveCache and Increasing ROI: A Technical Perspective by  Oracle Corporation UK Ltd


September 10, 2009 - Oracle ActiveCache enables organizations to predictably scale applications running on Oracle WebLogic Server with simplified integration to Oracle Coherence. Learn more about the benefits of Oracle ActiveCache in this free white paper.

 

Webmail Forensics: Investigating Issues with Email Forwarding Security by  Kaspersky Lab


April 22, 2013 - This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

 

webMethods Optimize for Process by  SoftwareAG Inc., USA


February 06, 2009 - webMethods Optimize for Process facilitates real-time insight into key business process activities, providing business managers with the actionable information they need to make informed decisions and quickly address problems.

 

WebPulse Collaborative Defense by  BlueCoat


November 04, 2011 - Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.

 

WebPulse Technical Overview by  BlueCoat


November 04, 2011 - The Blue Coat WebPulse™ is a cloud-based infrastructure specifically designed to harness the power of user-driven behavior and to translate user input into global web and web threat intelligence. Learn how WebPulse employs multiple technologies to analyze and deliver the fastest and most accurate web ratings service available.

 

Webroot Cheat Sheet by  Webroot


February 28, 2012 - Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.

 

Webroot E-Mail Security Saas: Business Continuity by  Webroot


January 01, 2007 - ‘On Tap' Business Continuity means that the service is constantly active and available at all times, not just when disaster strikes.

 

Webroot Enterprise Spy Audit by  Webroot


October 16, 2006 - Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.

 

Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World by  Webroot


May 15, 2013 - This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

 

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World by  Webroot


August 02, 2013 - This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

 

Webroot Secure Anywhere - Endpoint Protection by  Webroot


August 06, 2012 - Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.

 

Webroot Secure Anywhere Business - Mobile Protection by  Webroot


July 25, 2012 - Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.

 

Webroot Secure Anywhere Business Value Assessment by  Webroot


August 13, 2012 - Consult this helpful resource to get financial justification for endpoint protection. Though you can't slap a price tag on a fully secured business enterprise, these eight simple questions can help you rest easy knowing you made the right choice!

 

Webroot Secure Anywhere Cloud vs. Six Traditional Security Products by  Webroot


July 24, 2012 - PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource.

 

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors by  Webroot


January 17, 2013 - This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.

 

Webroot  Endpoint Security eBook by  Webroot


July 25, 2012 - This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.

 

WebSense Security Lab: Zero-Day in Critical Vulnerability by  Websense, Inc.


September 28, 2009 - The Websense Security Labs Team provides a review of recent threats in this presentation transcript. Learn more about techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. Read on to learn more.

 

Websense Security Labs: Data Loss Prevention by  Websense, Inc.


September 28, 2009 - Rich Mogull of Securosis answers the question, "What is Data Loss Prevention (DLP)?" In this presentation transcript he explains how DLP provides benefits for business and shows examples of DLP usage in the real world. Read on to learn more.

 

Websense TRITON Mobile Security by  Websense, Inc.


April 16, 2012 - When it comes to mobile security, the biggest concern isn’t the mobile device itself – it’s the data; so it’s important to implement the most effective measures to fend off mobile threats. In this brief resource, explore how Triton Mobile Security combines four (4) key elements to enable highly effective unified mobile security.

 

Website Performance for the Speed of Your Business by  Limelight Networks, Inc.


October 31, 2013 - Access this guide today to learn why high website performance is a business differentiator, and discover the role that content delivery networks (CDNs) play in improving user experiences.

 

Website Security Threat Report, Part Two by  Symantec Corporation


October 11, 2013 - This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.

 

Websites are Dead. Long Live Digital Presence by  Limelight Networks, Inc.


October 31, 2012 - In this resource, learn why the website as you know it is dead, and find guidance to help you engage and interact with customers through your content and build a stronger digital presence.

 

WebSmart Services by  Melissa Data Corp


April 20, 2010 - Melissa Data’s WebSmart Services can handle your data quality needs. Ensure that your contact data, including addresses, names, phone numbers, and emails are valid, and use existing data to append additional information to enhance initiatives. The WebSmart services can be integrated into the business chain to ensure the integrity of your database.

 

WebSphere Application Server Feature Pack for Web 2.0 by  IBM


June 10, 2008 - This white paper explores methods for improving the development of Ajax-based applications and Web 2.0 to SOA connectivity.

 

WebSphere Application Server v7 vs. Oracle WebLogic 11g by  IBM


September 02, 2011 - This document briefly covers key differences between IBM® WebSphere® Application Server and Oracle WebLogic Server. While both products are of high quality and will perform well even in demanding mission-critical environments, there are still some differences in their efficiency and resulting total cost of ownership.

 

WebSphere Application Server vs. Oracle WebLogic by  IBM


December 28, 2011 - This white paper briefly covers key differences between IBM WebSphere Application Server and Oracle WebLogic Server. While both products are of high quality and will perform well even in demanding mission-critical environments, there are still some differences in their efficiency and resulting total cost of ownership.

 

WebSphere Cast Iron Cloud Integration Technical Overview by  IBM


March 07, 2012 - This whitepaper covers a solution that will make the migration and integration of all functions into the cloud much simpler.

 

WebSphere Cast Iron Express Demo by  IBM


November 25, 2013 - Access the following webcast to gain a firsthand look on how you can easily integrate your enterprise data in a matter of seconds with Salesforce.com.

 

WebSphere Cloudburst Appliance and PowerVM by  IBM


July 07, 2011 - Cloud computing is the pooling of computing resources to provide a single source of computing power to multiple users. Find out how a cloud manager provides a self-service portal that maintains permissions and information about cloud objects such as virtual images, patterns, and resources.

 

WebSphere DataPower Integration Blade XI50B by  IBM


April 12, 2012 - Read this paper to learn about WebSphere DataPower Integration Blade XI50B, a specialized, high-performance hardware appliance that can empower you t improve competitiveness by helping to strengthen business connectivity with partners and customers, and between internal organizations, add specialized connectivity, integration and more.

 

WebSphere eXtreme Scale V7: Solutions Architecture (redbook) by  IBM


December 14, 2009 - This paper is a follow-up to Users Guide to WebSphere eXtreme Scale, updating the architectural content for WebSphere eXtreme Scale V7.

 

WebSphere Message Broker - Universal Connectivity and Transformation by  IBM


February 11, 2009 - This video demo describes the benefits of implementing a universal ESB, and covers the wealth of new features in IBM® WebSphere® Message Broker 6.1.

 

WebSphere MQ 7.0 Features and Enhancements by  IBM


October 12, 2012 - Read this white paper to learn why messaging middleware is essential in service oriented architecture (SOA) and get an understanding of how it works and what it requires.

 

WebSphere MQ 7.0 Features and Enhancements by  IBM


December 28, 2011 - This e-book provides details about IBM WebSphere MQ V7.0 product features and enhancements required for individuals and organizations to make informed application and design decisions prior to implementing a WebSphere MQ infrastructure or begin development of a WebSphere MQ application.

 

WebSphere Virtual Enterprise Adds Value by  IBM


June 06, 2011 - This study compares the performance and efficiency of several system configurations to determine which configuration is best for processing transactions.

 

WebYaST data sheet by  SUSE


June 01, 2012 - Review this product overview and discover the benefits of utilizing WebYaST for the management of your virtual, software, or cloud applications. Learn the 14 key features, and the system requirements.

 

Weighing the Options for an Enterprise Mobility Strategy by  Dimension Data


March 06, 2013 - In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.

 

Weighing the pros and cons of a web-based EHR system by  VMware, Inc.


December 11, 2012 - This e-guide from SearchHealthIT.com highlights many of the pros and cons of a web-based EHR system. Additionally, get a break-down of health care application delivery options, and learn what methods would align with your business model.

 

Weighing the Pros and Cons of Continuous Delivery in ALM by  Electric Cloud


December 09, 2013 - Consult this expert e-guide to explore both the opportunities and challenges faced by those adopting continuous delivery, and hear from Agile expert Jeff Porter as he explains his road to Agile evangelism, as well as how he implemented Agile practices at FamilySearch, an online nonprofit genealogy services provider.

 

Weighing Virtualization by  Hitachi Data Systems


February 18, 2011 - This e-zine from Hitachi Data Systems highlights the many advantages of adopting a virtualized data center. It focuses on the costs associated with this implementation and the ways in which businesses are weighing these costs against the inherent benefits of such a infrastructure change. Read on to learn more today.

 

Welcome to Iron Mountain’s National Data Center by  Iron Mountain


January 27, 2014 - This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.

 

Welcome to Your Internet Future - Mobile Broadband Brought to You by WiMAX by  Intel Corporation


December 01, 2007 - WiMAX is a new way of subscribing to mobile Internet access through a wireless connection, direct to your service provider, it gives you reliable, convenient broadband access on the go, for real-time information and entertainment.

 

WEP Cloaking for Legacy Encryption Protection by  Motorola, Inc.


November 01, 2008 - Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.

 

West Jefferson Medical Center Rearchitects its Data Protection Infrastructure with NetApp Syncsort Integrated Backup by  NetApp


January 05, 2012 - This IDC Buyer Case Study assesses the deployment and use of NetApp Syncsort Integrated Backup (NSB) at the West Jefferson Medical Center.

 

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner by  Perimeter eSecurity


November 03, 2011 - Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter.

 

What 150 CIOs Want in an Enterprise Tablet – and How BlackBerry Playbook Stacks Up by  BlackBerry


July 01, 2012 - Gartner predicts that 80% of businesses will deploy tablet computers across their enterprise by 2013. Review this comprehensive paper to discover what CIOs ranked as the top features and applications of an enterprise-grade tablet, and learn about one tablet option that stands apart from the competition.

 

What are Patterns of Expertise? by  IBM


August 07, 2012 - Watch this brief video to learn how patterns of expertise -- actual applications including CRM, ERP, and business analytics -- are optimized to offer faster time-to-value, lower cost, and increase performance.

 

What are the challenges of backing up remote sites? by  3X Systems


October 21, 2009 - This is a presentation transcript of the SearchStorage.com expert videocast on Remote Backup. Dave Raffo, Senior News Director at TechTarget’s storage sites, discusses remote backup with Curtis Preston, Executive Editor at TechTarget. The transcript will address the challenges of backing up remote sites.

 

What are the keys to analytical success? by  SearchBusinessAnalytics


September 18, 2013 - Analytics requires both strong analytical leaders and executives who are willing to make a long-term commitment to its success. Access this resource to learn from today's analytical leaders as they describe their steps to success.

 

What are the Real Benefits of Virtual Desktops? by  VMware, Inc.


January 24, 2013 - Access this expert e-guide for a helpful list of the major benefits that VDI can bring to your organization presented in a way so that both IT and non-IT decision makers can easily see the value.

 

What Are Your Obligations to Retain Email and Other Electronic Content? by  EMC Backup and Recovery Solutions


March 23, 2011 - This white paper discusses what drives organizations in heavily regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands. Also provided with this paper is an overview of EMC.

 

What Are Your Obligations to Retain Email and Other Electronic Content? by  Proofpoint, Inc.


October 29, 2010 - This paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands.

 

What are your options when performing a Windows migration? by  AppSense


May 17, 2013 - This crucial resource takes an in-depth look at the options that you have for planning and deploying a Windows 7 migration, detailing the benefits and drawbacks of each approach so you can create a strategy that will satisfy your specific needs and requirements.

 

What Auditors Think about Crypto by  Thales


May 09, 2011 - Thales e-Security & The Ponemon Institute present a joint webinar “What Auditors Think about Crypto”. The webinar discusses the findings of a recent survey that was conducted with auditors in various industries.

 

What Auditors Think about CryptoTechnologies by  Thales


April 11, 2011 - This white paper explains why auditor input should be incorporated into an organization’s security strategy. Find out why encryption is the preferred data protection technology and access results from a recent survey on the current state of compliance across today’s enterprises.

 

What Big Data Growth Means to Information Management by  CommVault Systems, Inc.


December 31, 2012 - This resource provides you with ten key questions revolving around the big data management challenge Find out how you can answer them with a converged process for backup,  archiving and reporting

 

What can go wrong during a relocation: What unauthorized support providers don't tell you - Government Finance customer by  Hewlett-Packard Company


November 30, 2013 - Read through this concise case study to find out how HP fixed one organization's hardware faults in their system.

 

What can go wrong with counterfeit parts : What unauthorized support providers don't tell you - Government Finance customer by  Hewlett-Packard Company


November 30, 2013 - Read through this concise case study to find out how HP resolved an organization's data loss issues, when it was discovered their hardware was not genuine HP parts.

 

What can go wrong with firmware updates : What unauthorized support providers don’t tell you -Defense Contractor customer by  Hewlett-Packard Company


November 30, 2013 - Read through this concise case study to find out what HP recommended their customer to solve a hardware issue.

 

What can go wrong with firmware updates: What unauthorized support providers don’t tell you - Manufacturing industry customer by  Hewlett-Packard Company


November 30, 2013 - This case study describes what can go wrong with firmware updates when relying on Unauthorized Support Providers (USPs), and reveals how this strategy led the way for disaster in one real-world organization.

 

What can go wrong with outdated spare parts: What unauthorized support providers don’t tell you - Financial Services Industry customer by  Hewlett-Packard Company


November 30, 2013 - Access this brief case study to learn what can go wrong with outdated spare parts when relying on Unauthorized Service Providers (USPs), and discover how one organization in the financial services industry could have avoided challenges with its firmware, CPU, network, and more.

 

What can HP Software Professional Services do for you? by  Hewlett-Packard Limited


August 01, 2013 - This whitepaper offers tips on what to look for when choosing data center partners.

 

What Can Power/Linux Do That x86/Linux Can NOT - Top 5 reasons to run your workloads on Power with Linux by  IBM


April 14, 2014 - This informative webcast highlights the top 5 reasons for what makes Power a better choice for running Linux than x86. Not only does Power offer better reliability and resiliency, but it delivers virtualization at a low cost.

 

What Can Rapid Deployment Technology Do for You? by  itelligence, Inc.


June 07, 2013 - This video introduces a rapid-deployment solution (RDS) for SAP software. Watch now to learn how an RDS makes SAP deployments quick, predictable, and low-risk, as well as integrates seamlessly with your existing SAP systems.

 

What can RSD Glass do for your IG strategy? by  RSD


April 08, 2014 - Access the following solution overview to explore an information governance platform that skillfully keeps the records you need to grow your business while safely disposing unnecessary records, ultimately reducing storage costs, minimizing audits, and more.

 

What can you do differently to guard against threats from rapidly evolving mobile malware? by  IBM


January 31, 2014 - This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.

 

What CEOs Should Expect from Storage by  IBM


February 08, 2013 - This video explains, from a business perspective, exactly what CEOs should expect of their storage capabilities today.

 

What CFOs Should Ask their Software Development Leaders by  IBM


September 20, 2011 - This paper illustrates a new way of thinking about the funding of IT software projects, one that considers funding in terms of investment, and value as an expansive, longitudinal variable.

 

What Changed? Leveraging the Power of Change Auditing by  Tripwire, Inc.


December 31, 2008 - Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed.

 

What Converged Infrastructure Brings to a Private Cloud by  HP & Intel®


December 07, 2012 - This expert e-guide explores how a private cloud can act as an enabler of converged infrastructure. Read on to learn why converged infrastructure has quickly become one of the industry's hottest topics.

 

What Developers Want: The End of Application Redeploys by  ZeroTurnaround


March 31, 2014 - For developers, turnaround time due to application redeployments and restarts after code changes is a huge waste of time. In this white paper, discover how you can eliminate the need to redeploy Java applications after making code changes, including while adding new features or fixing bugs.

 

What Distinguishes World Class Manufacturing Companies by  NetSuite


December 14, 2011 - This webcast discusses the challenges faced by manufacturers and the characteristics that make top enterprises stand out from the pack.

 

What Does an Unplanned Data Center Outage Cost? by  Emerson Network Power


December 12, 2013 - This whitepaper covers the results of a study of 67 data centers that experienced power outages to determine the true cost of an unplanned outage.

 

What Enterprises Should Do About IPv6 in 2011 by  Cisco Systems, Inc.


January 26, 2011 - The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.

 

What Every Enterprise Should Know About Cloud Computing and eDiscovery by  Proofpoint, Inc.


February 25, 2011 - This paper offers guidelines for evaluating cloud service providers and for defining SLAs that meet the business and IT goals of cloud computing as well as the legal re­quirements for eDiscovery.

 

What Every Enterprise Should Know About Cloud Computing and eDiscovery by  Proofpoint, Inc.


July 12, 2011 - This paper offers guidelines for evaluating cloud service providers and for defining SLAs that meet the business and IT goals of cloud computing as well as the legal requirements for eDiscovery

 

What Every HR Manager Needs to Know about Online Benefits Enrollment by  Sage Abra


March 03, 2008 - When selecting and deploying an online benefits enrollment solution, there are many factors to take into consideration.

 

What Every HR Manager Needs to Know about Online Recruiting by  Sage Abra


March 03, 2008 - This white paper discusses topics that HR Managers need to know to understand the growing importance of online recruitment, and to create strategies that fully utilize the Internet as a key source of highly-qualified applicants.

 

What If Any Agent Could Take Any Call? by  KANA


June 22, 2012 - Good customer service involves leveraging policies, people, and technology to answer customer questions and solve problems with accuracy, speed, and consistency. Check out this paper for tips on how to relieve customer service pain points and get your agents able to answer calls with ease, and keep customers coming back time and time again.

 

What if? Unleashing the Potential of Digital Signage by  Insight


December 21, 2012 - In this presentation transcript, Principle Analyst Zeus Kerravala of ZK Research reveals the secrets of utilizing digital signage to its fullest potential. Learn the transformations this technology has gone through, where it's going, and how businesses have successfully leveraged its power.

 

What is an Application Delivery Controller (ADC)? by  Citrix Systems, Inc.


October 15, 2013 - This white paper details how application delivery controllers can help ensure the performance of your applications.

 

What Is an Ethernet Fabric? by  Brocade


August 31, 2011 - Compared to classic hierarchical Ethernet architectures, Ethernet fabrics provide the higher levels of performance, utilization, availability and simplicity required to meet the business needs of data centers today and into the future.

 

What is an IT Operations Bridge and who benefits from it by  Hewlett-Packard Company


February 11, 2014 - This webcast highlights an IT operations solution built for today's expansive data environment. Learn how tools that aggregate, control, and collaborate can improve availability, enhance efficiencies, and reduce management costs.

 

What is Application Lifecycle Management? by  Microsoft


December 01, 2008 - This analyst white paper gives a clear definition to application lifecycle management (ALM). It also reviews 3 distinct main areas of ALM: governance, development and operations.

 

What is behind the rise of Application Lifecycle Management? by  IBM


November 07, 2011 - This e-guide provides expert insight on trends that are driving application lifecycle management (ALM) adoption, and breaks down the process itself so organizations can implement it to their advantage.

 

What is Carrier Grade Ethernet? by  Brocade


January 28, 2010 - This paper explains the fundamentals of Carrier Ethernet and examines how service profiles and Service Level Agreements (SLAs) can be defined in Carrier Ethernet.

 

What Is Cloud Computing? by  Salesforce.com


March 10, 2009 - Cloud computing is a better way to run your business. Instead of running your apps yourself, they run on a shared data center. When you use any app that runs in cloud, you just log in, customize it, and start using it.

 

What is Desktop Virtualization? by  Intel


September 13, 2011 - Discover how new compute models enable IT to gain the control they need while dialing in the performance their users need with PCs powered by 2nd gen Intel® Core™ vPro™ processors with built in Intel® Virtualization Technology (Intel® VT). Learn to maximize IT flexibility without compromising performance and mobility in this informative video.

 

What is FakeAV? by  Sophos UK


June 07, 2010 - Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.

 

What is FakeAV? by  Sophos, Inc.


May 24, 2010 - FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.

 

What is IBM Service Management? by  IBM


December 03, 2010 - Read on for a breakdown of IBM Service Management’s components and learn what questions should be asked to determine if it may benefit your organization.

 

What is Intel Core vPro Technology by  Intel


June 15, 2012 - This short video examines a hardware-assisted approach to PC management. Find out more about this technique and how it can help you properly manage your desktop environment, regardless of system states.

 

What is Oracle Compatibility? by  EnterpriseDB Corporation


November 09, 2009 - Watch this 10 minute video and discover what Oracle compatibility means for your business from a technical, and skills point of view. This video also offers multiple low risk strategies for using Postgres Plus Advanced Server to lower your Oracle costs and utilize the advantages of the most advanced open source database available.

 

What is Private Cloud Computing Anyway? by  Hewlett-Packard Company


February 27, 2012 - Vendors are racing to deliver private cloud offerings, but there are really only a few “true” cloud solutions available, so it is critical to be able to separate fact from fiction when looking at the saturated market. Read this e-book to gain expert insights on the private cloud and learn best practices for building one in your organization.

 

What is service virtualization? by  IBM


August 07, 2012 - This brief webcast outlines how service virtualization allows you to simulate application dependencies, and thus begin testing earlier and faster. Watch now to learn from industry experts about the benefits that service virtualization can offer your business.

 

What is Tape Without Pain? by  Spectra Logic Corporation


November 04, 2010 - Spectra has extensive expertise with all forms of backup, and therefore understands the continuing and increasingly important role of tape in protecting data. To that end, Spectra Logic has set itself a goal: Tape Without Pain. Read this white paper to learn more about easing the tape backup process.

 

What is the difference between Workflow Engines and BPM Suites? by  Lombardi Software, An IBM Company


May 18, 2009 - To understand the power of a BPM initiative, this paper provides background on the workflow solutions of the 90's, documents a few important events that helped shape the market, and presents the elements of a successful BPM suite.

 

What is the Plantronics UC Toolkit? by  Plantronics


May 17, 2011 - In this video, learn why the UC Toolkit was created, how the UC Toolkit is structured, what resources are included, and how you can easily obtain it.

 

What is the Value of Unified Communications? by  Avaya


November 16, 2011 - The benefits of unified communications are apparent to network managers, but how can you figure out the value it will add to your organization?

 

What is Virtualization and how does it affect my Company? by  Dell, Inc.


October 31, 2011 - This white paper provides a detailed analysis into simplifying your server setup – putting all of your important business applications in one place with server virtualization. Find out what virtualization can do for your business.

 

What Is Your Mobile Content Policy? A Checklist for Content Risk Mitigation by  SAP AG


July 19, 2013 - This helpful paper discusses how to approach secure content management in the age of mobility, examining how to implement secure mobile content risk mitigation and what you can do to ensure your mobile data stays in the right hands.

 

What IT Managers Need to Know About IP Surveillance by  D-Link


June 15, 2010 - The video surveillance market is in the throes of transition. IP surveillance is rapidly taking over from traditional analog CCTV. Within the next three years more than half the surveillance cameras used in North America will be IP cameras, according to the research firm Frost & Sullivan. Read this whitepaper to learn more.

 

What it takes to deploy and manage a private cloud with Oracle VM by  Oracle Corporation


March 13, 2013 - This white paper presents a day-in-a-life story of how Oracle VM brings many of the components of a private cloud together and simplifies virtualized application deployment and management.

 

What Makes the Right Cloud-Based HD Video Collaboration Better? by  LifeSize


October 03, 2011 - A new alternative to on-premise videoconferencing—cloud-based video collaboration—can reduce the upfront capital expenditures long associated with videoconferencing as well as make video collaboration much easier to use.

 

What Management Must Know About Forecasting by  SAS


October 04, 2010 - Forecasts never seem to be as accurate as you would like them, or need them, to be. This white paper explores why forecasting is often poorly done and provides some ways to improve it. Continue reading to learn what management must know about forecasting.

 

What manufacturers should know before moving to the cloud by  IQMS


January 08, 2013 - Taking advantage of SaaS and PaaS cloud computing options can help you reduce software costs. But before you dive in, there are few things you should consider. In this e-guide, Forrester Research senior analyst Glenn O'Donnell, IDC Manufacturing Insights vice president Bob Parker, and other industry experts share their insights.

 

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications by  Imperva


December 31, 2013 - Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.

 

What Oracle Solaris Brings to Oracle Exalogic Elastic Cloud by  Oracle Corporation


December 31, 2011 - <p>This white paper presents a system, designed to revolutionize data center consolidation, enabling enterprises to bring together disparate, mission-critical workloads with maximum reliability and security. Learn how this system, consisting of software, firmware and hardware, can reduce application implementation costs and more.</p>

 

What Private Cloud Vendors Won’t Tell You by  SunGard Availability Services


January 25, 2012 - Though the private cloud seems to be the optimal cloud option, the road to it is by far the bumpiest. Building a private cloud for your organization requires much more than just the construction of the new infrastructure. Are you aware of all the steps you must take before you can begin? Gain expert advice on all things private cloud inside.

 

What role does BPM play and how can it help you improve your business operations? by  OpenText


December 31, 2013 - Your business processes are fundamentally linked to operations and overall performance. Achieving efficient, flexible, and agile processes involves collaboration between business and IT -- which is where many businesses fall short. Fortunately, business process management (BPM) can address all of these issues.

 

What Security Threats Can We Expect in 2012? by  Websense, Inc.


December 15, 2011 - View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more.

 

What Senior Management Needs to Know and Do About the Customer Experience by  Verint Systems


October 28, 2011 - Enhance your company's customer experience with this advice from Kathleen M. Peterson, Founder and Chief Vision at Officer Power House Consulting.

 

What Services Managers Need To Know To Drive the Cloud by  Oracle Corporation


December 31, 2013 - Many companies are not organized for cloud success. This white paper outlines research findings that conclude that the cloud can be integrated, and it is better to start with a plan rather than trying mend solutions after problems arise. Read on to discover how to successfully plan for cloud integration.

 

What sets SAP HANA apart from other platforms by  Hewlett-Packard Limited


March 12, 2014 - When it comes down to it, businesses can work with their services provider to identify key components for the business case for SAP HANA and drive tremendous business value—view the following videocast to find out how.

 

What Smart Businesses Know About DevOps by  CA Technologies.


September 30, 2013 - Consult this informative research paper to explore to results of a survey of over 1,300 senior IT decision makers to see what they had to say about the tools and processes necessary to implement DevOps.

 

What SMBs Should Look for in an Applicant Tracking System by  Taleo


December 31, 2008 - The goal of this paper is to enumerate many of the qualities that SMBs seek in an applicant tracking system and prepare you to choose a system that will make your recruiting efforts more successful.

 

What Storage and Network Convergence Really Means by  SearchNetworking.com


March 02, 2011 - Many network equipment providers are advocating converged networks that bridge storage, data center servers and networking into one fabric with combined protocols. But is it really necessary to implement convergence throughout the network?

 

What storage and network convergence really means - Europe by  SearchNetworking.com


April 01, 2011 - This issue will investigate how users are addressing convergence in the field, and what their outlook is for the future.

 

What Technology Buyers Want You to Know About Online Content by  KnowledgeStorm, Inc


December 13, 2005 - A new study, Define What's Valued Online, confirms what many technology marketers have instinctively suspected all along: Buyers of technology products consider Internet research essential to their ability to do their jobs. Learn about basic changes you can make to improve your online content.

 

What the $#@! is Parallelism, Anyhow? by  Intel


October 28, 2009 - It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.

 

What to Consider when Dealing with Desktop Virtualization over the WAN by  F5 Networks


October 04, 2011 - Desktop virtualization deployments must be in sync with networking and security decisions to ensure an optimal user experience for WAN users. Hear what industry experts Brian Madden and Gabe Knuth have to say about specific desktop virtualization networking issues and application performance.

 

What to Do When You Have an IP Address but No Internet Connection by  Global Knowledge


February 21, 2014 - When we have an IP address but can't connect to the Internet, we need basic troubleshooting skills to verify both connections and configuration. Download this resource to learn about the local network, parts of IP addressing, and DHCP basics for resolving these types of connectivity issues.

 

What to Do, What Not to Do in Enterprise Data Governance by  SearchDataManagement


March 14, 2014 - This three-part guide, written for IT and data management professionals as well as business executives, will provide readers with tips and advice on how to avoid the missteps that can lead to enterprise data governance failures.

 

What to Expect from Gigabit Wireless LAN by  Aerohive Networks


June 07, 2011 - This e-guide, presented by SearchNetworking.com, provides an inside look at gigabit wireless LAN and explores the truth surrounding 802.11ac and throughput, as well as what to expect with 802.11ad.

 

What To Expect From Integrated Data Center Infrastructure by  CA Technologies.


August 13, 2013 - Integrated data center infrastructure can offer IT professionals simplified management and scalability. In this e-guide, our experts look at the integrated infrastructure platforms available and the factors IT pros should consider before taking a single-vendor approach.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts