Browser

The browser wars are not about to ease up anytime soon. Keep up with the latest vulnerabilities of browsers and learn about the advantages of newer ones here.

  • White Papers // Aug 2014

    Identity Management in an interconnected world: When Millions need access

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Aug 2014

    How SMBs Can Stop Malvertising

    Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    IBM PureApplication System for IBM WebSphere Application Server Workloads

    Businesses that depend on web applications look to increase efficiency and reduce complexity, but many tasks required for application development and deployment are time-consuming and costly. IBM PureApplication System for IBM WebSphere Application Server can address these challenges.

    Sponsored By IBM

  • White Papers // Aug 2014

    Structuring IT for Integrated Systems - Forrester

    To meet business demands for more solutions faster at lower costs, IT leaders are transforming their systems, organizations, people, and processes. Much faster delivery of solutions is only half of the challenge; systems and business process integrity must complete the picture. Read this Forrester WhitePaper to understand how IBM is...

    Sponsored By IBM

  • White Papers // Aug 2014

    IDC 2014 WW MarketScape Report for Federated Identity Management and SSO

    In this report, industry analyst firm IDC assesses various IAM vendors and ranks IBM as the worldwide leader for federated identity management and single sign-on (SSO).

    Sponsored By IBM

  • White Papers // Jul 2014

    Three Key Principles to Accelerating Web Applications

    Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of...

    Sponsored By F5

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Anticipate, engage and deliver exceptional web experiences.

    IBM Customer Experience Suite and IBM Intranet Experience Suite help organizations delight customers through a consistently exceptional web experience and empower employees with the social business tools they need to drive better business results. IBM Customer Experience Suite features rich, integrated capabilities for managing web content, real-time social communications, robust...

    Sponsored By IBM

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Qantas supports business transformation with CA Clarity On Demand

    Business: Qantas is Australia’s largest domestic and international airline, carrying nearly 20% of all passengers travelling in and out of the country. Challenge: to maintain its competitive advantage in the increasingly difficult aviation industry, Qantas embarked on a major transformation programme to position the company for a strong and sustainable...

    Sponsored By CA Technologies

  • White Papers // May 2014

    A Cohesive Approach to a Complex Market

    The mobile enterprise is becoming more complex with the consumerization of IT, the mobile app explosion and cloud computing. In this report, IDC covers key trends and what companies should look for in a partner that can help them manage it all.

    Sponsored By SAP

  • White Papers // May 2014

    Whitepaper: 10 Critical Requirements

    Growing interest in cloud computing has prompted almost every enterprise software vendor to claim it's "in the cloud." However, in the industry's rush to fulfill demand, some vendors may skip requirements that are essential. Read this whitepaper to learn the 10 critical requirements of any successful cloud application.

    Sponsored By Workday

  • White Papers // Apr 2014

    U.S. Department of Agriculture Stays at the Forefront of Mobilization with Acronis Access

    The United States Department of Agriculture (USDA) works to support the American agricultural economy to strengthen rural communities; to protect and conserve America’s natural resources; and to provide a safe, sufficient, and nutritious food supply for the American people. The USDA is composed of 17 separate agencies with an additional...

    Sponsored By Acronis

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Forrester Report: Measuring Mobile Apps

    Developers need to improve their mobile measurement savvy. Many application development professionals have little to no skills in collecting real-time and operational metrics; that’s usually been the province of infrastructure and operations pros. But such thinking is both antiquated and dangerous. As requirements elicitation shifts from long textual requirements documents...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2014

    Maximizing mobile efficiency and productivity

    BYOD programs help employees be more productive, but how is your mobile strategy affecting your IT department? Read this new white paper to learn how Dell Mobility Solution Sets can help you optimize your IT infrastructure, maintain data security, streamline administration, and develop and modernize apps for your mobile workforce.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Unchain Your Network with Application Intelligence and Control

    This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.

    Sponsored By Dell Software

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • White Papers // Jan 2014

    Enterprise Mobility for Dummies

    Enterprise mobility concerns employees at every level. As you plan for 2014, let this eBook show you how easy it can be to mobilize -- and transform -- your enterprise. From application development and deployment to management and security, any company can do it. This eBook is your guide to...

    Sponsored By SAP

  • White Papers // Feb 2013

    Managing Identities and Access in the Cloud

    The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption. From a...

    Sponsored By IBM

  • White Papers // Jul 2014

    Top 5 Cloud Coding Mistakes in Java Applications

    Cloud Technology Partners has leveraged PaaSLane to assess thousands of applications for cloud readiness and accelerate cloud migration. Over and over, the results are often familiar. In this paper we will cover the top 5 cloud-readiness issues we discover repeatedly in Java-based enterprise applications.

    Provided By Cloud Technology Partners

  • White Papers // Jul 2014

    Simplifying cloud management and data center automation

    This white paper explores the value of standardizing and automating cloud services with a flexible platform, such as IBM Cloud Orchestrator. Learn how to orchestrate the development, deployment and management of cloud services - helping to reduce IT costs and accelerate service delivery.

    Provided By IBM

  • White Papers // Jun 2014

    IBM MobileFirst Collaboration Services service profile

    In an increasingly mobile and far-flung business world, unified communications and collaboration (UCC) is becoming a must-have capability. By converging voice, data and video communications, UCC provides instant messaging, softphones, online meetings and other capabilities to improve productivity while reducing costs for travel and telecommunications. Read this service profile to...

    Provided By IBM

  • White Papers // Jun 2014

    2014 Global Cost of Data Breach Study

    How much can a data breach cost? And are you doing enough to prevent it from happening to you? The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations. Read this critical research to...

    Provided By IBM

  • Analyst Briefings // Jun 2014

    Critical Data Protection Program by IBM Security Services

    Critical data is the small but most important portion of data vital to business survival and success. It includes sensitive financial and customer data, data that enables critical business processes, and proprietary data such as trade secrets, intellectual property, research and development, and confidential business plans and communications, learn how...

    Provided By IBM

  • White Papers // Jun 2014

    IBM Security Services 2014 Cyber Security Intelligence Index

    When IBM talked to 1,000 clients about security attacks that occurred in 2013, three things became abundantly clear: criminals are relentless, every business—across every industry—is affected, and your perimeter may have already been breached. Read the white paper to learn the findings from the analysis of billions of security events...

    Provided By IBM

  • White Papers // Jun 2014

    Fast and Furious: How to Get The Best Digital Customer Experience.

    A smartphone in every pocket and ubiquitous wireless have combined to change the way consumers do pretty much everything. From researching to shopping to buying to communicating about the entire experience in the moment. The challenge for IT is in developing engagement opportunities that make sense on the mobile platform,...

    Provided By Century Link & HP

  • Downloads // Jun 2014

    Citrix NetScaler VPX - 90 Day Trial

    Try the Citrix NetScaler VPX for 90 days and see for yourself the benefits for web app acceleration, availability and security. Key benefits of NetScaler VPX Freedom to choose your platform - Virtual appliance runs on Citrix XenServer, Microsoft or VMware Simple to install and manage - The...

    Provided By Citrix

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US

  • White Papers // Jun 2014

    Osterman Report: Office 365 for the Enterprise

    Osterman Research outlines how third parties are required to strengthen security, compliance and control.

    Provided By Mimecast

  • White Papers // May 2014

    EMC VNXe: Enterprise Features, Entry-level Simplicity

    The need for advanced IT capabilities isn’t limited to big companies. Competent IT is an important philosophy these days, and organizations of all sizes are coming to depend on the functional capability, good economic value, and the competitive advantage that technology can provide. EMC’s new VNXe provides functional capabilities typically...

    Provided By EMC

  • White Papers // May 2014

    Convergence with Vblock Systems: A Value Measurement

    Today, IT managers focus intently on rapidly deploying business services on demand and at scale, without triggering an explosion in capital and operating expenses. One of the most significant solutions that IT organizations are deploying to meet their needs are converged systems that integrate compute, storage, and network resources; virtualization...

    Provided By EMC

  • White Papers // May 2014

    A Survival Guide for Data in the Wild

    All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices—usually a laptop, a tablet, and a smartphone—that they use both inside and outside of the office. And outside the corporate firewall, it’s a wild world. With so...

    Provided By Druva Software

  • White Papers // May 2014

    Requirements and Risk Management

    First and foremost one needs to learn what is meant by “requirements” in a security and engineering context, why requirements are useful for managing risk and what IOT requirements may look like. Risks will manifest themselves in relation to “requirements” or project goals: what do you need to get from...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Economic of Service Orientation

    The goal of service orientation is to attain a structural cost reduction in the delivery of IT services through reuse and standardization. However, the transition from a traditional system to one based on services requires breaking monolithic applications into standard services, often with Web front ends to facilitate reuse not...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Emergence of Virtual Service Oriented Grids

    In the ever changing world of development and IT, understanding the possibilities new paradigms present and their capacity to change the way business is done is imperative. In much the same way the Internet changed business forever, virtual service oriented grid computing has the potential to force change once again....

    Provided By Intel Corporation

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Sponsored By Global Knowledge

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • White Papers // Apr 2014

    Maximizing mobile efficiency and productivity

    BYOD programs help employees be more productive, but how is your mobile strategy affecting your IT department? Read this new white paper to learn how Dell Mobility Solution Sets can help you optimize your IT infrastructure, maintain data security, streamline administration, and develop and modernize apps for your mobile workforce.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Sponsored By Coverity

  • White Papers // Feb 2014

    Unchain Your Network with Application Intelligence and Control

    This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Anticipate, engage and deliver exceptional web experiences.

    IBM Customer Experience Suite and IBM Intranet Experience Suite help organizations delight customers through a consistently exceptional web experience and empower employees with the social business tools they need to drive better business results. IBM Customer Experience Suite features rich, integrated capabilities for managing web content, real-time social communications, robust...

    Sponsored By IBM

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jun 2014

    Qantas supports business transformation with CA Clarity On Demand

    Business: Qantas is Australia’s largest domestic and international airline, carrying nearly 20% of all passengers travelling in and out of the country. Challenge: to maintain its competitive advantage in the increasingly difficult aviation industry, Qantas embarked on a major transformation programme to position the company for a strong and sustainable...

    Sponsored By CA Technologies

  • White Papers // May 2014

    A Cohesive Approach to a Complex Market

    The mobile enterprise is becoming more complex with the consumerization of IT, the mobile app explosion and cloud computing. In this report, IDC covers key trends and what companies should look for in a partner that can help them manage it all.

    Sponsored By SAP

  • White Papers // Jan 2014

    Enterprise Mobility for Dummies

    Enterprise mobility concerns employees at every level. As you plan for 2014, let this eBook show you how easy it can be to mobilize -- and transform -- your enterprise. From application development and deployment to management and security, any company can do it. This eBook is your guide to...

    Sponsored By SAP

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • White Papers // May 2014

    Whitepaper: 10 Critical Requirements

    Growing interest in cloud computing has prompted almost every enterprise software vendor to claim it's "in the cloud." However, in the industry's rush to fulfill demand, some vendors may skip requirements that are essential. Read this whitepaper to learn the 10 critical requirements of any successful cloud application.

    Sponsored By Workday

  • White Papers // Apr 2014

    U.S. Department of Agriculture Stays at the Forefront of Mobilization with Acronis Access

    The United States Department of Agriculture (USDA) works to support the American agricultural economy to strengthen rural communities; to protect and conserve America’s natural resources; and to provide a safe, sufficient, and nutritious food supply for the American people. The USDA is composed of 17 separate agencies with an additional...

    Sponsored By Acronis

  • White Papers // Apr 2014

    Forrester Report: Measuring Mobile Apps

    Developers need to improve their mobile measurement savvy. Many application development professionals have little to no skills in collecting real-time and operational metrics; that’s usually been the province of infrastructure and operations pros. But such thinking is both antiquated and dangerous. As requirements elicitation shifts from long textual requirements documents...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2013

    Managing Identities and Access in the Cloud

    The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption. From a...

    Sponsored By IBM

  • White Papers // Aug 2014

    IDC 2014 WW MarketScape Report for Federated Identity Management and SSO

    In this report, industry analyst firm IDC assesses various IAM vendors and ranks IBM as the worldwide leader for federated identity management and single sign-on (SSO).

    Sponsored By IBM

  • White Papers // Aug 2014

    How SMBs Can Stop Malvertising

    Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Identity Management in an interconnected world: When Millions need access

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Jul 2014

    Three Key Principles to Accelerating Web Applications

    Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of...

    Sponsored By F5

  • White Papers // Aug 2014

    IBM PureApplication System for IBM WebSphere Application Server Workloads

    Businesses that depend on web applications look to increase efficiency and reduce complexity, but many tasks required for application development and deployment are time-consuming and costly. IBM PureApplication System for IBM WebSphere Application Server can address these challenges.

    Sponsored By IBM

  • White Papers // Aug 2014

    Structuring IT for Integrated Systems - Forrester

    To meet business demands for more solutions faster at lower costs, IT leaders are transforming their systems, organizations, people, and processes. Much faster delivery of solutions is only half of the challenge; systems and business process integrity must complete the picture. Read this Forrester WhitePaper to understand how IBM is...

    Sponsored By IBM

  • Downloads // Mar 2007

    Convert an XML file into an Excel spreadsheet with this technique

    Developers often deal with information that is in no way user-friendly without really thinking about how a user would handle it. XML is a prime example --- most users don't know what to make of it. One way to present XML information to a user is by converting...

    Provided By Edmond Woychowsky

  • White Papers // Jun 2007

    A Step-by-Step Guide to Starting Up SaaS Operations

    Faced with intensifying competition, as well as a desire for more stable revenue streams, software companies are increasingly turning to the Software as a Service (SaaS) delivery model. Software companies are facing the complex issues involved with building the service delivery capabilities necessary to support SaaS offerings. Building an...

    Provided By OpSource

  • Downloads // Jun 2010

    Remove the Internet Explorer Content Advisor Password

    Users wanting to disable the Internet Explorer Content Advisor will sometimes find they have forgotten the required password. Fortunately, this annoying little problem can be solved quickly with a Windows Registry edit. This download is also available as an entry in the TechRepublic Microsoft Windows Blog.

    Provided By Mark W. Kaelin

  • White Papers // Jun 2014

    Osterman Report: Office 365 for the Enterprise

    Osterman Research outlines how third parties are required to strengthen security, compliance and control.

    Provided By Mimecast

  • White Papers // Nov 2012

    Improving Mobile Device Security and Management with Active Directory

    As more and more workers bring personal devices to work for increased productivity and mobile access organizations must quickly respond to the security and compliance risks posed by largely unmanaged access to corporate information. Enterprises can expect to see tablet sales alone increase by 250% in 2012, primarily iPads, which...

    Provided By Centrify

  • White Papers // Mar 2014

    The Value of Social Data

    Social media provides a wealth of data that can tell you a lot about your brand and your consumers - providing you can effectively act upon that data. According to Digiday, ""48% of digital marketing executives say they focus 'relentlessly' on building customer insights, yet few are executing those strategies...

    Provided By Oracle

  • White Papers // Sep 2010

    Optimizing FTP File Transfers With BIG-IP WAN Optimization Module

    File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over a TCP/IP-based network, such as the Internet. FTP is built on client-server architecture and utilizes separate control and data connections between the client and server applications. FTP can be used with user-based password authentication...

    Provided By F5 Networks

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • Downloads // May 2014

    Enable BYOD, Lower IT Workload, Zero Client Installations – Simple!

    With the growing diversity of end-user devices and the need to reduce IT overhead, organizations need to empower users with secure, browser-based access to Windows Applications and Desktops from any device, anywhere - simply and cost-effectively. Ericom AccessNow™ enables browser-based access to Windows applications and desktops hosted on Terminal...

    Provided By Ericom Software

  • Case Studies // Feb 2014

    University of Maryland Case Study

    To enhance IT services for faculty and staff across the United States, University of Maryland University College (UMUC) needed to replace out-of-lifecycle desktop hardware and software quickly and efficiently, and with minimal risk of downtime to staff services. Read this case study to learn how UMUC leveraged new technology and...

    Provided By Dell & Microsoft

  • White Papers // Apr 2014

    Lessons from Successful Mobile Initiatives

    The best mobile applications are familiar, require no formal training, and make it easy to collaborate with colleagues. They aren’t crippled versions of web applications. Rather, they’re enhanced versions. They do things that can’t be done on a desktop like geo-tagging and auto-routing because they’re presence and location-aware. This paper...

    Provided By ServiceNow

  • White Papers // Jun 2014

    IBM Security Services 2014 Cyber Security Intelligence Index

    When IBM talked to 1,000 clients about security attacks that occurred in 2013, three things became abundantly clear: criminals are relentless, every business—across every industry—is affected, and your perimeter may have already been breached. Read the white paper to learn the findings from the analysis of billions of security events...

    Provided By IBM

  • White Papers // Oct 2008

    Analysis of Transparent Mode IEEE 802.16j System Performance With Varying Numbers of Relays and Associated Transmit Power

    In this paper, the system capacity of IEEE 802.16j systems operating in transparent mode is investigated under varying numbers of relays and associated transmit power. The study is based on an extended variant of an analytical model defined in previous work and used to determine the throughput gain that can...

    Provided By University College Dublin

  • White Papers // Sep 2010

    Top Email Trends of 2010: What to Watch and Why

    Email excellence is a moving target. Improve your aim and stay on top of the trends. Download Top Email Trends of 2010 to find out what you should watch for and why, and to review the top trends every email marketer must understand in order to remain effective and relevant...

    Provided By Unica

  • White Papers // Sep 2010

    Three Mobile Email Marketing Challenges - and What You Can Do About Them

    Marketers have been limited to bland options for sending communications to consumers on their mobile phones. With the introduction of Apple's iPhone and operating systems like Google's Android and Palm's Pre/Pixi, now offering similarly rich user experiences, you have the opportunity to reach your customers, anywhere, any time, on their...

    Provided By Unica

  • White Papers // Sep 2010

    To SaaS or Not to SaaS: Making Your Digital Measurement Count

    There are many good reasons to choose software or SaaS for your web analytics deployment. Download: To SaaS or Not to SaaS: Making Your Digital Measurement Count, written by web analytics guru Eric Peterson, and learn which solution is best for you. Ensure you are asking the right questions to...

    Provided By Unica