Collaboration

Using the latest vendor white papers, learn how to use unified comms, social business and project management to get more accomplished.

  • White Papers // Mar 2015

    Infrastructure Matters: Data Analytics Overview

    Today’s real-time data platforms are helping leading organizations to better utilise information that has always resided within the business, as well as the growing volumes of new data. Read More..

    Sponsored By Fujitsu

  • Webcasts // Mar 2015

    Live Webcast: Digital Engineering for the Oil and Gas Industry

    As the industry advances in its exploration for new stocks of crude and gas, we are seeing new complexities that impact engineering designs and also create a demand for designs that contribute to improved operations at greater depths. This webcast will illustrate how a multi-vendor, globally distributed engineering project utlilized...

    Sponsored By IBM

  • Webcasts // Mar 2015

    Webcast: Digital Engineering for the Oil and Gas Industry

    As the industry advances in its exploration for new stocks of crude and gas, we are seeing new complexities that impact engineering designs and also create a demand for designs that contribute to improved operations at greater depths. This webcast will illustrate how a multi-vendor, globally distributed engineering project utlilized...

    Sponsored By IBM

  • White Papers // Mar 2015

    IBM Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents. Read More..

    Sponsored By IBM

  • White Papers // Feb 2015

    Splunk Boosts Day-to-Day Operational Intelligence, Secures its IP with Box

    Known for extracting meaning and 'operational intelligence' out of mountains of customer machine data, San Francisco-based Splunk knew it had a challenge. The big data software company needed a better and more secure way to track its intellectual property (IP). Previously, Splunk's documents were stored in several consumer cloud services....

    Sponsored By Box

  • White Papers // Feb 2015

    Data Protection : Quality Plus Fast ROI

    Too many organizations today struggle with backup and recovery solutions that not only fail in their primary mission of reducing the risk of data loss but also cost far too much. Find out how Dell Data Protection from Dell Software can help deliver a sound return on investment, while dramatically...

    Sponsored By Dell Software

  • White Papers // Feb 2015

    The State of Modern Product Delivery

    Are you delivering products that your customers really need, or what they say they want? According to fresh research from Jama and Forrester Consulting, 50% of business leaders are giving customers what they think they want but that fail to meet their real needs. Knowing the difference can be what...

    Sponsored By Jama Software

  • Webcasts // Feb 2015

    Live Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • White Papers // Feb 2015

    Revolutionizing the Future Workplace

    A variety of technological, demographic and cultural forces are converging at this unique moment in history and stand poised to revolutionize the workplace of the future. Customers are demanding the ability to access the marketplace from anywhere, anytime and on any device; newer employees now expect the flexibility to collaborate...

    Sponsored By Polycom, Inc.

  • White Papers // Feb 2015

    Six Steps to Creating a Highly Collaborative Video Culture

    Polycom and Quocirca surveyed over 800 business video conferencing users around the world on the state of video adoption. The global findings have identified the top six key things to consider when creating a highly collaborative video culture. And it is not just about reducing travel!Download this infographic to discover...

    Sponsored By Polycom, Inc.

  • Webcasts // Feb 2015

    On-demand Webcast: How to Succeed Under Pressure for High-Performance - Sales Succeeding Under Pressure

    Selling is not easy, especially under pressure. Pressure changes how the brain functions; it diminishes our ability to think, make decisions and connect with others. That’s why the ability to manage pressure is one of the things that sets high-performing sales people and sales leaders apart. And it’s one of...

    Sponsored By Citrix Online

  • White Papers // Feb 2015

    Why OpenStack for Private Cloud?

    Today's dynamic business requirements cannot be effectively served by traditional segmented and siloed IT infrastructures. This technical bulletin discusses how the OpenStack project was created to respond to new requirements for an open, massively scalable, cloud operating system capable of supporting today's dynamic "cloud-aware" applications. Co-sponsored by Red Hat:

    Sponsored By Dell

  • White Papers // Feb 2015

    When Millions Need Access: Identity MGMT in an Interconnected World

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Feb 2015

    2013 IBM Chief Information Security Officer Assessment

    Building on the 2012 Finding a Strategic Voice IBM study, CAI interviewed 41 executives with information security responsibilities to identify behavior and practices that could strengthen the role and influence of security leaders.

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security Services Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents.

    Sponsored By IBM

  • White Papers // Feb 2015

    Financial Malware Explained

    Cybercriminals rely upon increasingly sophisticated techniques to steal the credentials of online banking customers, and then reuse them to take over the victim’s account and perform fraudulent transactions such as transferring money to new destinations. IBM Security Trusteer solutions offer multiple layers of protection across devices and the fraud lifecycle....

    Sponsored By IBM

  • Videos // Feb 2015

    Prevent Insider Threats with IBM Security Privileged Identity Manager (PIM)

    See how IBM Security Privileged Identity Manager's Privileged Session Recorder option helps detect and block insider threats by recording and storing every action made in a privileged user's session.

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security Identity Governance

    IBM Security Identity Governance is designed to help organizations effectively manage identities and application access by bridging the gaps across compliance, business and IT infrastructure operations. As a result, organizations can help reduce the risk of fraud, conflicts of duties and human error in business processes.

    Sponsored By IBM

  • White Papers // Feb 2015

    Using Data Replication to Upgrade Your Oracle Database with Minimal Downtime and Risk

    Phasing out older hardware, operating systems or eliminating outdated versions of Oracle® that may require expensive extended support contracts can be an effective way to control operational costs, but can also present a new set of challenges. Learn how you can ensure migration success by following the established best practices...

    Sponsored By Dell Software

  • White Papers // Feb 2015

    Improving analytics and reporting with near real-time data replication

    Your business relies on data analytics for business intelligence, but if the data isn’t up to date, the analytics are worthless. In this technical brief, see how to replicate real-time data, whether it’s onsite, remote or cloud.

    Sponsored By Dell Software

  • White Papers // Feb 2015

    IBM X-Force Threat Intelligence Quarterly - 4Q 2014

    Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security AppScan Dynamic Analyzer

    IBM Security AppScan® Dynamic Analyzer is designed to help secure your organization’s web applications deployed on IBM Bluemix™ by detecting dozens of today’s most pervasive published security vulnerabilities. It provides a progressive, self-controlled web application security approach.As part of the application development lifecycle, IBM Security AppScan Dynamic Analyzer helps eliminate...

    Sponsored By IBM

  • White Papers // Feb 2015

    Protecting Your Critical Data with Integrated Security Intelligence

    By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.

    Sponsored By IBM

  • White Papers // Feb 2015

    2014 State of DevOps Report

    The 2014 State of DevOps Report by Puppet Labs, IT Revolution Press and ThoughtWorks is an analysis of more than 9,200 survey responses from technical professionals around the world, making this the largest and most comprehensive DevOps study to date. As the first scientific study of the relationship between...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    Technical Overview: Cloudant Spatial

    Cloudant Geospatial is a fully managed cloud service that helps deliver advanced geospatial with built-in high availability, global data distribution, and horizontal scaling capabilities. Read More..

    Sponsored By IBM

  • White Papers // Feb 2015

    Technical Overview: Anatomy of the Cloudant DBaaS

    Deciding which data management platform will provide the best performance takes a lot of research and planning. A Database as a Service (DBaaS) solution like Cloudant helps accelerate the process. Read More..

    Sponsored By IBM

  • White Papers // Feb 2015

    Information Governance Confidence Calculator: English

    Confidence in information is vital for business users who make impactful decisions based on analytical insights. While easy to define, confidence has proven difficult to measure and visualize. To address this need, Aberdeen Group has developed the Information Confidence Calculator (ICC).

    Sponsored By IBM

  • White Papers // Feb 2015

    Information Governance Confidence Calculator: Measuring Trust in Big Data

    This Aberdeen research report details the research and methodology of the Information Confidence Calculator (ICC). The ICC is a tool to score and visualize trust in customer data used for various types of decisions. This report introduces the ICC and offers guidance on how to use the tool and your...

    Sponsored By IBM

  • White Papers // Feb 2015

    Information Governance Best Practices: Adopt a Use Case Approach

    When should you implement integration governance? According to this Gartner research note, you should start now if you are an IT professional considering an initiative like master data management (MDM), e-discovery, information archiving or cloud migration should start implementing information governance now.

    Sponsored By IBM

  • White Papers // Feb 2015

    Don't Let Your DDoS Defense Fall Behind

    Distributed Denial of Service (DDoS) attacks have evolved in both intensity and intent. At first, they were used to temporarily interrupt online businesses in order to gain attention to a group or cause. Now, DDoS attacks are up to 100 times larger and are often used as smokescreens to distract...

    Sponsored By Neustar

  • White Papers // Jan 2015

    Enabling the Modern Business through IT

    CIOs today are asked to drive transformational change, get the most out of your current IT investments with even higher performance, and be the strategic advisor to your business partners. What if you could transform your company’s future by increasing the flexibility and agility of your IT infrastructure to support...

    Sponsored By NetSuite

  • Webcasts // Jan 2015

    Live Webcast: 5 Soft Skills for Customer Support

    Join us for this LIVE event! Tuesday, March 17 10 AM (PST) / 1 PM (EST) Brilliant troubleshooting isn’t nearly enough to make tech support successful. You can fix every bug, solve every problem and still have unhappy clients. More than just the technology, you need to support the people....

    Sponsored By Citrix Online

  • Webcasts // Jan 2015

    On-Demand Webcast: Leading Innovation: How to Jumpstart Your Organization's Growth Engine

    Productivity is no longer enough. Today, growth means pushing strategic innovation initiatives across the enterprise – to everyone, everywhere, every day. Join Jeff DeGraff, professor of management and organizations at the University of Michigan’s Ross School of Business, as he presents a simple approach for leaders to recognize, develop...

    Sponsored By Citrix Online

  • White Papers // Jan 2015

    Aberdeen report: Secrets to Better Engage the Mobile Consumer

    Aberdeen research report on mobile customer engagement.

    Sponsored By IBM

  • White Papers // Jan 2015

    Four Key Trends Impacting Mobile Infrastructure - Review

    As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst...

    Sponsored By IBM

  • White Papers // Jan 2015

    Gartner Report: Magic Quadrant for Managed Mobility Services

    Of the 14 top managed mobility services providers Gartner examined and reviewed by both completeness of vision and ability to execute, only IBM was positioned in the Leaders Quadrant in their latest Magic Quadrant report. Read the analyst report to learn more. We continue to address the growing needs of...

    Sponsored By IBM

  • Webcasts // Dec 2014

    On-Demand Webcast: Social Media Customer Service: How to Deal with It. How to Take Advantage of It.

    Once upon a time, a happy customer would tell six of his friends about your company. And an unhappy customer would tell eight, maybe 12 of his friends about your company. Then, along came social media. With the click of a button, complimentary shout-outs and scathing complaints alike could reach...

    Sponsored By Citrix Online

  • White Papers // Dec 2014

    IBM System Z in a mobile World

    Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational innovation rather than incremental innovation. Mobile really is a disruptive innovation. Read More..

    Sponsored By IBM

  • Downloads // Dec 2014

    Manage & Resolve IT Service Requests with SolarWinds® Help Desk Essentials

    SolarWinds Help Desk Essentials is a 2-in-one combo of IT help desk & remote support software that allows you to easily manage service requests, discover & manage IT assets, remotely connect to end-user PCs for troubleshooting & IT support. Centralized ticketing management, automatic email-to-ticket conversion, and customizable rules for ticket...

    Sponsored By SolarWinds

  • White Papers // Dec 2014

    IDC Report: The Business Value of IBM zEnterprise System Deployments

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Sponsored By IBM