TechRepublic

Displaying 1-25 of 25 results

  • White Papers // Sep 2014

    Ryan Cloud computing test

    Ryan Cloud computing test

    Provided By TechRepublic

  • White Papers // Dec 2013

    Modernized data Protection with Veam and HP Storage

    In this solution brief, HP and Veeam have teamed up to present an end-to-end storage and data protection solution optimized for virtual environments.A complete VM data protection recovery solution from HP and Veeam saves money by dramatically reducing the time it takes to back up and recover a VM. With...

    Provided By TechRepublic

  • White Papers // Nov 2013

    Tech Roundup: Big Data

    While Big Data as a technology may still be finding its way into the business world, it's already becoming the hottest trend for organizations looking for a competitive edge. But it will require is a better understanding of what big data is and isn't - only then an organization can...

    Provided By TechRepublic

  • White Papers // Nov 2013

    Tech Roundup: Big Data, An Untapped Resource

    Organizations worldwide are quickly realizing the value of gathering, processing, storing and taking action on large volumes of data. However, determining the right strategy to help sort through all of this information is not as simple as many companies would like it to be. In this intelligence report, you...

    Provided By TechRepublic

  • White Papers // Nov 2013

    Tech Roundup: How to Take Advantage of Big Data Analytics

    Imagine being able to take every piece of information created about your organization across any digital environment and being able to leverage it to be more competitive. How organizations plan and implement these initiatives will ultimately determine how successful they will be. And if your organization is looking for more...

    Provided By TechRepublic

  • White Papers // Jun 2013

    Tech Roundup: Combat complex security risks

    In today’s business, it’s rare for a week to go by without reports of a high-profile data breach or a denial-of-service attack. Organisations are susceptible to myriad of risks, and according to Gartner, they will spend $67.2 billion in 2013 to stay safe in this increasingly complex security landscape. But...

    Provided By TechRepublic

  • White Papers // May 2013

    Executive's guide to software-defined networking (AU)

    This guide explains what software-defined networking is, what benefits it offers, how it is currently being implemented, and what promise it holds for the future.

    Provided By TechRepublic

  • White Papers // May 2013

    4G: How worldwide LTE services stack up

    While a handful of countries have had commercial 4G LTE networks up and running for several years, for most of the world, fourth-generation mobile services are still a relatively new phenomena. And, thanks to the vagaries of spectrum auctions, geographically there's not much in the way of consistency. The importance...

    Provided By TechRepublic

  • White Papers // May 2013

    Document Management’s 10 Most Unwanted List

    The proliferation of scanned documents in today’s business environment has exploded. With the ubiquitous Multi-Function Printer (MFP), getting a scan is as easy and common place as making a copy. But how many scanned documents get “lost” because of incorrect tagging or limited filing protocols? This 10-page ebook provides the...

    Provided By TechRepublic

  • White Papers // Apr 2013

    Startup rockstars: A roundup of innovative newcomers

    Fame, quick profits, a career marked by creativity, pushing boundaries, popularity and chasing that one big deal that could change everything. You can see why there are parallels drawn between startup founders and rock stars. While the nexus of startup funding has traditionally been Silicon Valley, technology startup hubs outside...

    Provided By TechRepublic

  • White Papers // Sep 2011

    10 Firefox extensions that will enhance your Web surfing experience

    Because it is an open source project, the Firefox browser is continuously being improved and enhanced. These 10 Firefox extensions are just a few of the applications created for the platform by the community at large. One of the main benefits of all most all open source...

    Provided By TechRepublic

  • White Papers // Nov 2010

    Transmission Of Bank Liquidity Shocks In Loan And Deposit Markets: The Role Of Interbank Borrowing And Market Monitoring

    The authors examine the international transmission of bank liquidity shocks from multinational bank holding companies to their subsidiaries. This findings are consistent with the studies that document that parent bank fragility negatively affects lending by subsidiaries. They further find that reduction in foreign bank lending is stronger for those that...

    Provided By TechRepublic

  • White Papers // Sep 2010

    How Social Networks And Opinion Leaders Affect The Adoption Of A New Product

    Do word-of-mouth and other peer influence processes really affect when people adopt a new product? Can one identify the most influential customers and hence those who are good seeding points for a word-of-mouth marketing campaign? Can one also identify those customers most likely to be influenced by their peers? Working...

    Provided By TechRepublic

  • White Papers // May 2010

    Disentangling Wireless Sensing From Mesh Networking

    The resource demands of today's wireless mesh networking stacks hinder the progress of low-cost, low power wireless sensor nodes. Optimizing wireless sensors means reducing costs, increasing lifetimes, and locating sensors close to the action. Adding mesh networking functions like IP routing and forwarding increases RAM and ROM requirements and demands...

    Provided By TechRepublic

  • White Papers // Feb 2010

    R&D Services at Wipro Technologies: Outsourcing Innovation?

    The sourcing of any process is discussed along two dimensions - ownership, (i.e., Who Executed the Process) and geography (i.e., Where the Process was Executed). Off shoring involved the geographic distribution of a process, typically to a low-wage location, regardless of whether the process was developed in-house or executed by...

    Provided By TechRepublic

  • White Papers // Feb 2010

    The Costs Of Emerging Market Financial Crises: Output, Productivity And Welfare

    Financial crises in emerging market countries appear to be very costly: output falls are often dramatic, while a host of partial welfare indicators - from suicide rates to infant mortality - deteriorate as well. The magnitude of these costs is puzzling both from an accounting perspective - factor usage does...

    Provided By TechRepublic

  • White Papers // Jan 2010

    When Is The BA's Work Finally Finished?

    The business analyst's work is not finished when the requirements document is signed off. Although other experts are responsible for the project activities, the BA remains involved to ensure that decisions made have no adverse impact on the business stakeholders. As the project progresses, the BA should collaborate with the...

    Provided By TechRepublic

  • White Papers // Oct 2009

    The Role Of Managerial Overconfidence In The Design Of Debt Covenants

    The authors examine the influence of CEO behavioral characteristics on the design of debt covenants. They focus on CEO overconfidence, a trait that is prevalent among CEOs and has been shown to be associated with over-investment and value-destroying merger activity. They find that debtholders design covenants to mitigate the anticipated...

    Provided By TechRepublic

  • White Papers // Jun 2009

    Poster Abstract: Trace-Based Analysis of Wi-Fi Scanning Strategies

    The number of smartphones in use is overwhelmingly increasing every year. These devices rely on connectivity to the Internet for the majority of their applications. The ever-increasing number of deployed 802.11 wireless access points and the relatively high cost of other data services make the case for opportunistic communication using...

    Provided By TechRepublic

  • White Papers // Mar 2009

    Building and Managing a Performance CoE white paper.

    Learn how to build and manage a Performance Center of Excellence with minimal expense, risk, or disruption to current processes.

    Provided By TechRepublic

  • White Papers // Mar 2009

    Growth Opportunities, Investment-Specific Technology Shocks And The Cross-Section Of Expected Returns

    The market value of a firm can be decomposed into two fundamental parts: the value of assets in place and the value of future growth opportunities. The authors propose a theoretically motivated procedure for measuring heterogeneity in growth opportunities across rms. They identify firms with high growth opportunities based on...

    Provided By TechRepublic

  • White Papers // Feb 2009

    Understanding the Basic Configuration of the Adaptive Security Appliance (ASA)

    In the not so distant past, being a network security expert was a matter of attending a 5-day class and understanding the difference between trusted users and non-trusted ones. The security tools (both hardware and software) available to security administrators were limited. Today, there are many facets of network security....

    Provided By TechRepublic

  • White Papers // Nov 2005

    Successfully Deploy and Maintain VoIP with these Best Practices

    Your VoIP vendor choice will influence your deployment and maintenance processes, but following general VoIP best practices will also increase the project's success. You can separate and handle voice traffic through standard, vendor-neutral protocols and design practices. Furthermore, general layout and design models for integrated VoIP and data networks provide...

    Provided By TechRepublic

  • White Papers // Apr 2004

    The Benefits and Limitations of Knowledge Management in Global Software Development

    This paper explores the role of knowledge management practices and tools in global software development by empirical investigations. These investigations look at global software development processes by taking into special account multicultural factors and rely on both quantitative methods for project selection and qualitative methods for in depth study of...

    Provided By TechRepublic

  • White Papers // Dec 2003

    An Overview of Wi-Fi "Hotspot" Pricing Models

    The market for Wi-Fi access is growing quickly but is also highly fragmented. Many companies have announced strategies for providing Wi-Fi access, and thousands of individuals and small businesses are creating their own hotspots. There are dizzying arrays of companies that are in the business of providing some sort of...

    Provided By TechRepublic

  • White Papers // Nov 2005

    Successfully Deploy and Maintain VoIP with these Best Practices

    Your VoIP vendor choice will influence your deployment and maintenance processes, but following general VoIP best practices will also increase the project's success. You can separate and handle voice traffic through standard, vendor-neutral protocols and design practices. Furthermore, general layout and design models for integrated VoIP and data networks provide...

    Provided By TechRepublic

  • White Papers // Dec 2013

    Modernized data Protection with Veam and HP Storage

    In this solution brief, HP and Veeam have teamed up to present an end-to-end storage and data protection solution optimized for virtual environments.A complete VM data protection recovery solution from HP and Veeam saves money by dramatically reducing the time it takes to back up and recover a VM. With...

    Provided By TechRepublic

  • White Papers // Sep 2014

    Ryan Cloud computing test

    Ryan Cloud computing test

    Provided By TechRepublic

  • White Papers // Apr 2013

    Startup rockstars: A roundup of innovative newcomers

    Fame, quick profits, a career marked by creativity, pushing boundaries, popularity and chasing that one big deal that could change everything. You can see why there are parallels drawn between startup founders and rock stars. While the nexus of startup funding has traditionally been Silicon Valley, technology startup hubs outside...

    Provided By TechRepublic

  • White Papers // May 2013

    4G: How worldwide LTE services stack up

    While a handful of countries have had commercial 4G LTE networks up and running for several years, for most of the world, fourth-generation mobile services are still a relatively new phenomena. And, thanks to the vagaries of spectrum auctions, geographically there's not much in the way of consistency. The importance...

    Provided By TechRepublic

  • White Papers // May 2013

    Document Management’s 10 Most Unwanted List

    The proliferation of scanned documents in today’s business environment has exploded. With the ubiquitous Multi-Function Printer (MFP), getting a scan is as easy and common place as making a copy. But how many scanned documents get “lost” because of incorrect tagging or limited filing protocols? This 10-page ebook provides the...

    Provided By TechRepublic

  • White Papers // May 2013

    Executive's guide to software-defined networking (AU)

    This guide explains what software-defined networking is, what benefits it offers, how it is currently being implemented, and what promise it holds for the future.

    Provided By TechRepublic

  • White Papers // Jun 2013

    Tech Roundup: Combat complex security risks

    In today’s business, it’s rare for a week to go by without reports of a high-profile data breach or a denial-of-service attack. Organisations are susceptible to myriad of risks, and according to Gartner, they will spend $67.2 billion in 2013 to stay safe in this increasingly complex security landscape. But...

    Provided By TechRepublic

  • White Papers // Mar 2009

    Building and Managing a Performance CoE white paper.

    Learn how to build and manage a Performance Center of Excellence with minimal expense, risk, or disruption to current processes.

    Provided By TechRepublic

  • White Papers // Apr 2004

    The Benefits and Limitations of Knowledge Management in Global Software Development

    This paper explores the role of knowledge management practices and tools in global software development by empirical investigations. These investigations look at global software development processes by taking into special account multicultural factors and rely on both quantitative methods for project selection and qualitative methods for in depth study of...

    Provided By TechRepublic

  • White Papers // Nov 2013

    Tech Roundup: Big Data

    While Big Data as a technology may still be finding its way into the business world, it's already becoming the hottest trend for organizations looking for a competitive edge. But it will require is a better understanding of what big data is and isn't - only then an organization can...

    Provided By TechRepublic

  • White Papers // Nov 2013

    Tech Roundup: Big Data, An Untapped Resource

    Organizations worldwide are quickly realizing the value of gathering, processing, storing and taking action on large volumes of data. However, determining the right strategy to help sort through all of this information is not as simple as many companies would like it to be. In this intelligence report, you...

    Provided By TechRepublic

  • White Papers // Nov 2013

    Tech Roundup: How to Take Advantage of Big Data Analytics

    Imagine being able to take every piece of information created about your organization across any digital environment and being able to leverage it to be more competitive. How organizations plan and implement these initiatives will ultimately determine how successful they will be. And if your organization is looking for more...

    Provided By TechRepublic

  • White Papers // Sep 2011

    10 Firefox extensions that will enhance your Web surfing experience

    Because it is an open source project, the Firefox browser is continuously being improved and enhanced. These 10 Firefox extensions are just a few of the applications created for the platform by the community at large. One of the main benefits of all most all open source...

    Provided By TechRepublic

  • White Papers // Feb 2009

    Understanding the Basic Configuration of the Adaptive Security Appliance (ASA)

    In the not so distant past, being a network security expert was a matter of attending a 5-day class and understanding the difference between trusted users and non-trusted ones. The security tools (both hardware and software) available to security administrators were limited. Today, there are many facets of network security....

    Provided By TechRepublic

  • White Papers // Jan 2010

    When Is The BA's Work Finally Finished?

    The business analyst's work is not finished when the requirements document is signed off. Although other experts are responsible for the project activities, the BA remains involved to ensure that decisions made have no adverse impact on the business stakeholders. As the project progresses, the BA should collaborate with the...

    Provided By TechRepublic

  • White Papers // Feb 2010

    R&D Services at Wipro Technologies: Outsourcing Innovation?

    The sourcing of any process is discussed along two dimensions - ownership, (i.e., Who Executed the Process) and geography (i.e., Where the Process was Executed). Off shoring involved the geographic distribution of a process, typically to a low-wage location, regardless of whether the process was developed in-house or executed by...

    Provided By TechRepublic

  • White Papers // Dec 2003

    An Overview of Wi-Fi "Hotspot" Pricing Models

    The market for Wi-Fi access is growing quickly but is also highly fragmented. Many companies have announced strategies for providing Wi-Fi access, and thousands of individuals and small businesses are creating their own hotspots. There are dizzying arrays of companies that are in the business of providing some sort of...

    Provided By TechRepublic

  • White Papers // Jun 2009

    Poster Abstract: Trace-Based Analysis of Wi-Fi Scanning Strategies

    The number of smartphones in use is overwhelmingly increasing every year. These devices rely on connectivity to the Internet for the majority of their applications. The ever-increasing number of deployed 802.11 wireless access points and the relatively high cost of other data services make the case for opportunistic communication using...

    Provided By TechRepublic

  • White Papers // Sep 2010

    How Social Networks And Opinion Leaders Affect The Adoption Of A New Product

    Do word-of-mouth and other peer influence processes really affect when people adopt a new product? Can one identify the most influential customers and hence those who are good seeding points for a word-of-mouth marketing campaign? Can one also identify those customers most likely to be influenced by their peers? Working...

    Provided By TechRepublic

  • White Papers // Oct 2009

    The Role Of Managerial Overconfidence In The Design Of Debt Covenants

    The authors examine the influence of CEO behavioral characteristics on the design of debt covenants. They focus on CEO overconfidence, a trait that is prevalent among CEOs and has been shown to be associated with over-investment and value-destroying merger activity. They find that debtholders design covenants to mitigate the anticipated...

    Provided By TechRepublic

  • White Papers // Feb 2010

    The Costs Of Emerging Market Financial Crises: Output, Productivity And Welfare

    Financial crises in emerging market countries appear to be very costly: output falls are often dramatic, while a host of partial welfare indicators - from suicide rates to infant mortality - deteriorate as well. The magnitude of these costs is puzzling both from an accounting perspective - factor usage does...

    Provided By TechRepublic

  • White Papers // Mar 2009

    Growth Opportunities, Investment-Specific Technology Shocks And The Cross-Section Of Expected Returns

    The market value of a firm can be decomposed into two fundamental parts: the value of assets in place and the value of future growth opportunities. The authors propose a theoretically motivated procedure for measuring heterogeneity in growth opportunities across rms. They identify firms with high growth opportunities based on...

    Provided By TechRepublic

  • White Papers // Nov 2010

    Transmission Of Bank Liquidity Shocks In Loan And Deposit Markets: The Role Of Interbank Borrowing And Market Monitoring

    The authors examine the international transmission of bank liquidity shocks from multinational bank holding companies to their subsidiaries. This findings are consistent with the studies that document that parent bank fragility negatively affects lending by subsidiaries. They further find that reduction in foreign bank lending is stronger for those that...

    Provided By TechRepublic

  • White Papers // May 2010

    Disentangling Wireless Sensing From Mesh Networking

    The resource demands of today's wireless mesh networking stacks hinder the progress of low-cost, low power wireless sensor nodes. Optimizing wireless sensors means reducing costs, increasing lifetimes, and locating sensors close to the action. Adding mesh networking functions like IP routing and forwarding increases RAM and ROM requirements and demands...

    Provided By TechRepublic