Emerging Tech

We've got all you need for evaluating and implementing new tech.

  • White Papers // Feb 2015

    Enterprise Tech: Pick Your Cloud, Control Your Data.

    The report looks at the operational and financial benefits that companies can expect to see through Cloud services. By capitalizing on private cloud and by using cloud services companies can have the flexibility to grow, maintain control of their data without expanding their data centers. They can also be more...

    Sponsored By NetApp

  • White Papers // Nov 2014

    EMA Report: IBM Security QRadar Incident Forensics vs. Other Industry Tools

    In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92. Read More..

    Sponsored By IBM

  • Webcasts // Feb 2015

    Apps to the Future Predicting Enterprise Mobility in 2015

    Discover how to take your business MobileFirst and learn key trends around mobile enterprise apps from IDC’s latest FutureScape Report; including Top EMM and mobile security predictions, Key enterprise mobility management and how enterprise mobility stakeholders can enable secure mobile enterprise apps in 2015 and beyond. Watch Now..

    Sponsored By IBM

  • White Papers // Jun 2014

    2013 CISO Assessment Survey Paper

    Get the latest on a new standard for security leaders. The 2013 Assessment is based on interviews with security leaders on leading business practices, technologies and measurement. Download this assessment to learn about: Leading business practices. Technologies – including Cloud and Mobile. Business Measurement.

    Sponsored By IBM

  • White Papers // Dec 2014

    Maximizing Your Opportunity by Extending The IBM System Z Environment To Support Mobility

    This IDC Reports looks at how System Z, IBM’s mainframe environment, is used by enterprises to handle large volumes of critical data in a highly secure, available environment. Today, many of the applications and services on these environments are backoffice environments with green-screen interfaces, but as mobile becomes an increasingly...

    Sponsored By IBM

  • White Papers // Feb 2015

    Information Governance Confidence Calculator: Measuring Trust in Big Data

    This Aberdeen research report details the research and methodology of the Information Confidence Calculator (ICC). The ICC is a tool to score and visualize trust in customer data used for various types of decisions. This report introduces the ICC and offers guidance on how to use the tool and your...

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security AppScan Dynamic Analyzer

    IBM Security AppScan® Dynamic Analyzer is designed to help secure your organization’s web applications deployed on IBM Bluemix™ by detecting dozens of today’s most pervasive published security vulnerabilities. It provides a progressive, self-controlled web application security approach.As part of the application development lifecycle, IBM Security AppScan Dynamic Analyzer helps eliminate...

    Sponsored By IBM

  • Videos // Jan 2015

    Bluemix Mobile Quality Assurance: Continuous Quality for Mobile Apps - Reduce Your Time-to-Feedback

    Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development. Watch Now..

    Sponsored By IBM

  • White Papers // Feb 2015

    9 (+1) Ways IT Automation Will Make Your Organization More Successful

    With the right automation in place, your IT infrastructure can become a strategic asset to get your company out ahead of competitors. Thoughtfully chosen automation tools can enable IT operations to manage IT infrastructure for: higher availability and reliability; faster recovery from outages; better scalability; better auditability; more frequent delivery...

    Sponsored By Puppet Labs

  • White Papers // Sep 2014

    Industry Experts Speak Out on Advanced Evasion Techniques

    McAfee, part of Intel Security, spoke with eight experts about Advanced Evasion Techniques (AETs) and how they are hurting the networks, and pockets, of major corporations.

    Sponsored By Intel Security McAfee

  • White Papers // Nov 2014

    The Future of Work

    The proliferation of smartphones and tablets has led consumers to adopt new behaviours, and develop expectations around what experiences mobile computing can offer. Coupled with the increasing adoption of cloud services and applications, there is simply an expectation that the content we want should be available on whichever device or...

    Sponsored By Samsung UK

  • White Papers // Mar 2015

    Life Hacker: Making Mobility Real –eBook

    Let Life Hacker take you through the questions most frequently asked when talking about mobility in organisations around the world. This eBook, chapter by chapter, will examine: • Why Mobility Policy are now a must have • How to remain secure in this world of BYOD • What Mobile...

    Sponsored By Dell and Intel

  • White Papers // Mar 2015

    Enterprise Mobility Management Smackdown

    Are you looking for an independent overview of the Enterprise Mobility Management (EMM) solutions and curious about the different features and functions each EMM vendor is offering?If so, this is a report you MUST read!

    Sponsored By Dell and Intel

  • White Papers // Mar 2015

    Technology Business Research: Notebook Reliability

    TBR discusses the reliability found in Dell Notebooks today. This report breaks down the areas most critical to customer satisfaction and how Dell is able to consistently deliver across these criteria. Realise the potential that Dell products can offer your work force.

    Sponsored By Dell and Intel

  • White Papers // Feb 2015

    A Roadmap to Converged Infrastructure

    Take a trip through the steps of creating and implementing a converged infrastructure. Simplify your management and support resources into one platform with zero worries. Give yourself the ability to manage all your processes with single-pane visibility, keeping the technology costs low and the complexity lower. Let’s Go!

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    The Future of Convergence Is Here

    Discover the major problems that have been facing today’s IT world. The changing landscape of IT over the past decade has seen more and more computer, network and storage solutions, creating a complicated web of siloed technologies that drive up costs and create headaches for those in charge of support....

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey....

    Sponsored By Neustar

  • White Papers // Feb 2015

    Video: Rodney Joffe Explores Cybercrime’s Underground Economy

    More and more criminals are using DDoS attacks as a distraction or "smokescreen" for other cybercrimes like theft of data or even funds. Watchin this video for a behind-the-scenes tour of what this "underground economy" of the Internet really looks like a place where criminals sell stolen credit cards and...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Don't Let Your DDoS Defense Fall Behind

    Distributed Denial of Service (DDoS) attacks have evolved in both intensity and intent. At first, they were used to temporarily interrupt online businesses in order to gain attention to a group or cause. Now, DDoS attacks are up to 100 times larger and are often used as smokescreens to distract...

    Sponsored By Neustar

  • Videos // Apr 2014

    SmartCloud Managed Backup Portal Demo

    As your business expands, your data footprint grows even faster. The information you collect is valuable for better business insights and analytics. But with more data comes more responsibility to protect and secure it. IBM SmartCloud Managed Backup Service can provide you with the scalability to back up increasing amounts...

    Sponsored By IBM

  • White Papers // Feb 2015

    Next Generation Criminal Fraud Detection

    With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there...

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security Services Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents.

    Sponsored By IBM

  • Videos // Feb 2015

    Prevent Insider Threats with IBM Security Privileged Identity Manager (PIM)

    See how IBM Security Privileged Identity Manager's Privileged Session Recorder option helps detect and block insider threats by recording and storing every action made in a privileged user's session.

    Sponsored By IBM

  • Videos // Oct 2014

    Paddy Power - Accelerates Insight into Big Data to Mitigate Risk and Support Regulatory Compliance

    Paddy Power an international betting and gaming group headquartered in Dublin, Ireland ensures 24/7 availability and performance by undertaking a complete overhaul of its IT infrastructure, building a super-scalable architecture with IBM® Informix® software at its core.

    Sponsored By IBM

  • Videos // Nov 2014

    Predictive Modelling with Azure ML studio

    This video walks through steps to building, scoring and evaluating a predictive model in Azure Machine Learning. Azure Machine Learning features a pallets of modules to build a predictive model, including state of the art ML algorithms such as Scalable boosted decision trees, Bayesian Recommendation systems, Deep Neural Networks and...

    Sponsored By Microsoft

  • Downloads // Nov 2014

    Microsoft Azure: One Month Free Trial

    Windows Azure is Microsoft’s cloud platform. It has been ranked by Gartner as an industry leader for both infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS). This powerful combination of managed and unmanaged services lets you build, deploy, and manage applications any way you like for unmatched productivity. Download the Azure free one...

    Sponsored By Microsoft

  • White Papers // Jan 2015

    Seven Signs You're on the Road to Real-Time ERP

    A step-change in the pace of business today brings enterprise resource planning (ERP) systems face-to-face with the largest transformation in their role since they were first introduced in the early 1990s. The rise of a new generation of business automation demands real-time information processing and visibility on a scale that...

    Sponsored By NetSuite

  • White Papers // Mar 2015

    IDC: Capturing the $1.6 Trillion Data Dividend

    In recent years, the promise and, in some cases, the hype of big data have produced plenty of critics who doubt the benefits of big data or point to the potential pitfalls facing organisations engaged in big data and analytics projects. This white paper provides the results of an IDC...

    Sponsored By Microsoft

  • White Papers // Mar 2015

    IBM Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents. Read More..

    Sponsored By IBM

  • White Papers // Mar 2015

    IBM X-Force Threat Intelligence Quarterly, 4Q 2014

    As the end of the year draws near, the IBM® X-Force® research and development team takes a closer look at the security trends shaping our world. In particular, this report examines how the Internet continues to connect more people,places and things, resulting in a new range of security risks. Read...

    Sponsored By IBM

  • White Papers // Mar 2015

    Infrastructure Matters: Virtualisation Overview

    Whether you are operating a mature strategy or just starting out on your virtualisation journey, our services are designed to ensure your ICT benefits from simpler scalability,reliability and performance. Read More..

    Sponsored By Fujitsu

  • White Papers // Feb 2015

    Meeting Your Data-Sharing Needs Now that Oracle Streams is Deprecated

    As an embedded technology, Oracle Streams adds significant value over manual information-sharing. However, it falls short in critical areas such as maximizing continuous performance and availability in production environments. Moreover, Oracle’s decision to deprecate Streams means there will be no future releases, enhancements or support available. So what’s the best...

    Sponsored By Dell Software

  • White Papers // Mar 2015

    Top reasons to subscribe: It’s easier than ever to get-and stay current on-AutoCAD LT software

    Discover the reasons why so many design, engineering, and architectural professionals around the world are choosing Autodesk for all their design software needs. This report will show you how to get more flexibility, benefits and capabilities for less.

    Sponsored By Autodesk_2015

  • White Papers // Mar 2015

    The new way to buy for Ultimate Flexibility!

    Learn more about Autodesk's new type of subscription that allows you to fit your subscriptions to the task that needs to be done rather than the other way around. Realise the freedom of the new pay-as-you-go, quarterly and annual subscriptions offers from Autodesk.

    Sponsored By Autodesk_2015

  • White Papers // Aug 2014

    12 Essential Tasks of Active Directory Domain Services

    Discover the 12 major tasks of Active Directory Domain Services (AD DS) administration and management, and how delegation can be an excellent way for administrators to reduce the their workload and streamline management of their AD DS infrastructures. Read the white paper and learn how the implementation of proper...

    Provided By Dell Software

  • White Papers // Mar 2014

    Artificial Intelligence: Imagine a World in Which People Talk to Machines

    So far as the laws of mathematics refer to reality, they are not certain. And so far as they are certain, they do not refer to reality. Communication is the basic phenomena in the nature. By vary means, all species communicate to each other. The languages are nothing but a...

    Provided By Academic Science

  • White Papers // Mar 2014

    Empowering Modern Finance - The CFO as Technology Evangelist

    The CFO as Technology Evangelist is a research report commissioned by Oracle and Accenture, in collaboration with Longitude Research, that explores how modern CFOs and finance executives are adopting emerging technologies within their finance functions to enable the development of new capabilities and to transform the role of finance.

    Provided By Oracle

  • Downloads // Jul 2006

    Download Savvion's Free Business Process Modeling Software

    The first step in improving your business processes is to articulate precisely where bottlenecks exist, and the most efficient way to do that is by simulating your existing processes using business process modeling software. To help you get started, Savvion offers its Process Modeler, a component of Savvion BusinessManager,...

    Provided By Savvion

  • Research // Nov 2014

    2014 is the Year of the All-Flash Array

    Flash is a disruptive technology that has already revolutionized mobile computing once with NAND flash in digital audio players, mobile phones and a handful of other personal devices back in the '90s, but a new revolution in the enterprise storage ecosystem is in the works. All-flash arrays (AFAs) are a...

    Provided By Pure Storage

  • White Papers // Aug 2014

    Algorithmics: Curve Fitting for Calculating Solvency Capital Under Solvency II - Practical Insights and Best Practices from Leading European Insurers

    The purpose of this paper is to provide an insight into how some of Europe's leading insurers are applying Curve Fitting in practice, the benefits that are being derived and some of the practical challenges that need to be addressed.

    Provided By IBM