Emerging Tech

We've got all you need for evaluating and implementing new tech.

  • White Papers // Aug 2014

    Algorithmics: Curve Fitting for Calculating Solvency Capital Under Solvency II - Practical Insights and Best Practices from Leading European Insurers

    The purpose of this paper is to provide an insight into how some of Europe's leading insurers are applying Curve Fitting in practice, the benefits that are being derived and some of the practical challenges that need to be addressed.

    Sponsored By IBM

  • Research // Nov 2014

    2014 is the Year of the All-Flash Array

    Flash is a disruptive technology that has already revolutionized mobile computing once with NAND flash in digital audio players, mobile phones and a handful of other personal devices back in the '90s, but a new revolution in the enterprise storage ecosystem is in the works. All-flash arrays (AFAs) are a...

    Sponsored By Pure Storage

  • White Papers // Nov 2014

    EMA Report: IBM Security QRadar Incident Forensics vs. Other Industry Tools

    In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92. Read More..

    Sponsored By IBM

  • White Papers // Jun 2014

    Essential Elements of Data Center Facility Operations

    70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Facility Operations Maturity Model for Data Centers

    An operations & maintenance (O&M) program determines to a large degree how well a data center lives up to its design intent. The comprehensive data center facility operations maturity model (FOMM) presented in this paper is a useful method for determining how effective that program is, what might be lacking,...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    2013 CISO Assessment Survey Paper

    Get the latest on a new standard for security leaders. The 2013 Assessment is based on interviews with security leaders on leading business practices, technologies and measurement. Download this assessment to learn about: Leading business practices. Technologies – including Cloud and Mobile. Business Measurement.

    Sponsored By IBM

  • Webcasts // Feb 2015

    Apps to the Future Predicting Enterprise Mobility in 2015

    Discover how to take your business MobileFirst and learn key trends around mobile enterprise apps from IDC’s latest FutureScape Report; including Top EMM and mobile security predictions, Key enterprise mobility management and how enterprise mobility stakeholders can enable secure mobile enterprise apps in 2015 and beyond. Watch Now..

    Sponsored By IBM

  • White Papers // Sep 2014

    Industry Experts Speak Out on Advanced Evasion Techniques

    McAfee, part of Intel Security, spoke with eight experts about Advanced Evasion Techniques (AETs) and how they are hurting the networks, and pockets, of major corporations.

    Sponsored By Intel Security McAfee

  • White Papers // Feb 2015

    Enterprise Tech: Pick Your Cloud, Control Your Data.

    The report looks at the operational and financial benefits that companies can expect to see through Cloud services. By capitalizing on private cloud and by using cloud services companies can have the flexibility to grow, maintain control of their data without expanding their data centers. They can also be more...

    Sponsored By NetApp

  • White Papers // Dec 2014

    Maximizing Your Opportunity by Extending The IBM System Z Environment To Support Mobility

    This IDC Reports looks at how System Z, IBM’s mainframe environment, is used by enterprises to handle large volumes of critical data in a highly secure, available environment. Today, many of the applications and services on these environments are backoffice environments with green-screen interfaces, but as mobile becomes an increasingly...

    Sponsored By IBM

  • Videos // Oct 2014

    Paddy Power - Accelerates Insight into Big Data to Mitigate Risk and Support Regulatory Compliance

    Paddy Power an international betting and gaming group headquartered in Dublin, Ireland ensures 24/7 availability and performance by undertaking a complete overhaul of its IT infrastructure, building a super-scalable architecture with IBM® Informix® software at its core.

    Sponsored By IBM

  • White Papers // Jan 2015

    Seven Signs You're on the Road to Real-Time ERP

    A step-change in the pace of business today brings enterprise resource planning (ERP) systems face-to-face with the largest transformation in their role since they were first introduced in the early 1990s. The rise of a new generation of business automation demands real-time information processing and visibility on a scale that...

    Sponsored By NetSuite

  • White Papers // Feb 2015

    Information Governance Confidence Calculator: Measuring Trust in Big Data

    This Aberdeen research report details the research and methodology of the Information Confidence Calculator (ICC). The ICC is a tool to score and visualize trust in customer data used for various types of decisions. This report introduces the ICC and offers guidance on how to use the tool and your...

    Sponsored By IBM

  • Videos // Nov 2014

    Predictive Modelling with Azure ML studio

    This video walks through steps to building, scoring and evaluating a predictive model in Azure Machine Learning. Azure Machine Learning features a pallets of modules to build a predictive model, including state of the art ML algorithms such as Scalable boosted decision trees, Bayesian Recommendation systems, Deep Neural Networks and...

    Sponsored By Microsoft

  • Downloads // Nov 2014

    Microsoft Azure: One Month Free Trial

    Windows Azure is Microsoft’s cloud platform. It has been ranked by Gartner as an industry leader for both infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS). This powerful combination of managed and unmanaged services lets you build, deploy, and manage applications any way you like for unmatched productivity. Download the Azure free one...

    Sponsored By Microsoft

  • Podcasts // Dec 2014

    Webinar: How Zerox Leverages User Activity Monitoring

    Learn how Xerox has taken a new approach to improve information security by leveraging user activity monitoring. Join Arvo Bowen for a live webcast on January 21 at 11am EST. See how Xerox identifies user-based risks before they become a security incident.

    Sponsored By ObserveIT

  • White Papers // Nov 2014

    The Future of Work

    The proliferation of smartphones and tablets has led consumers to adopt new behaviours, and develop expectations around what experiences mobile computing can offer. Coupled with the increasing adoption of cloud services and applications, there is simply an expectation that the content we want should be available on whichever device or...

    Sponsored By Samsung UK

  • White Papers // Feb 2015

    9 (+1) Ways IT Automation Will Make Your Organization More Successful

    With the right automation in place, your IT infrastructure can become a strategic asset to get your company out ahead of competitors. Thoughtfully chosen automation tools can enable IT operations to manage IT infrastructure for: higher availability and reliability; faster recovery from outages; better scalability; better auditability; more frequent delivery...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    IBM Security Services Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents.

    Sponsored By IBM

  • White Papers // Feb 2015

    Next Generation Criminal Fraud Detection

    With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there...

    Sponsored By IBM

  • Videos // Feb 2015

    Prevent Insider Threats with IBM Security Privileged Identity Manager (PIM)

    See how IBM Security Privileged Identity Manager's Privileged Session Recorder option helps detect and block insider threats by recording and storing every action made in a privileged user's session.

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security AppScan Dynamic Analyzer

    IBM Security AppScan® Dynamic Analyzer is designed to help secure your organization’s web applications deployed on IBM Bluemix™ by detecting dozens of today’s most pervasive published security vulnerabilities. It provides a progressive, self-controlled web application security approach.As part of the application development lifecycle, IBM Security AppScan Dynamic Analyzer helps eliminate...

    Sponsored By IBM

  • White Papers // Feb 2015

    A Roadmap to Converged Infrastructure

    Take a trip through the steps of creating and implementing a converged infrastructure. Simplify your management and support resources into one platform with zero worries. Give yourself the ability to manage all your processes with single-pane visibility, keeping the technology costs low and the complexity lower. Let’s Go!

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    The Future of Convergence Is Here

    Discover the major problems that have been facing today’s IT world. The changing landscape of IT over the past decade has seen more and more computer, network and storage solutions, creating a complicated web of siloed technologies that drive up costs and create headaches for those in charge of support....

    Sponsored By Hitachi Data Systems

  • White Papers // May 2014

    Not Yet Real-Time

    From “Making the Real-Time Enterprise a Reality,” a report by Harvard Business Review Analytic Services.

    Sponsored By SAP

  • White Papers // May 2014

    The Right Data at the Right Time

    From “Making the Real-Time Enterprise a Reality,” a report by Harvard Business Review Analytic Services.

    Sponsored By SAP

  • White Papers // May 2014

    Real-Time Bolsters Business Performance

    From “Making the Real-Time Enterprise a Reality,” a report by Harvard Business Review Analytic Services.

    Sponsored By SAP

  • White Papers // May 2014

    Real-Time Insights to Forge Deeper Relationships with Your Customers

    The next step in the evolution of SAP HANA is becoming the foundation for a new generation of real-time applications such as SAP Customer Engagement Intelligence. This application enables highly targeted marketing campaigns and fosters deeper relationships with customers, giving you a better understanding of their needs.

    Sponsored By SAP

  • Case Studies // Jan 2014

    Customer Success Story of University of Central Lancashire:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Learn how the University of Central Lancashire, a leading UK institution, is successfully and securely integrating popular Apple products alongside Windows devices in a cross-platform campus environment.

    Sponsored By Acronis

  • Videos // Jan 2015

    Bluemix Mobile Quality Assurance: Continuous Quality for Mobile Apps - Reduce Your Time-to-Feedback

    Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development. Watch Now..

    Sponsored By IBM

  • White Papers // Feb 2015

    Don't Let Your DDoS Defense Fall Behind

    Distributed Denial of Service (DDoS) attacks have evolved in both intensity and intent. At first, they were used to temporarily interrupt online businesses in order to gain attention to a group or cause. Now, DDoS attacks are up to 100 times larger and are often used as smokescreens to distract...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Video: Rodney Joffe Explores Cybercrime’s Underground Economy

    More and more criminals are using DDoS attacks as a distraction or "smokescreen" for other cybercrimes like theft of data or even funds. Watchin this video for a behind-the-scenes tour of what this "underground economy" of the Internet really looks like a place where criminals sell stolen credit cards and...

    Sponsored By Neustar

  • White Papers // Feb 2015

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey....

    Sponsored By Neustar

  • Videos // Apr 2014

    SmartCloud Managed Backup Portal Demo

    As your business expands, your data footprint grows even faster. The information you collect is valuable for better business insights and analytics. But with more data comes more responsibility to protect and secure it. IBM SmartCloud Managed Backup Service can provide you with the scalability to back up increasing amounts...

    Sponsored By IBM

  • White Papers // Aug 2014

    12 Essential Tasks of Active Directory Domain Services

    Discover the 12 major tasks of Active Directory Domain Services (AD DS) administration and management, and how delegation can be an excellent way for administrators to reduce the their workload and streamline management of their AD DS infrastructures. Read the white paper and learn how the implementation of proper...

    Provided By Dell Software

  • White Papers // Mar 2014

    Artificial Intelligence: Imagine a World in Which People Talk to Machines

    So far as the laws of mathematics refer to reality, they are not certain. And so far as they are certain, they do not refer to reality. Communication is the basic phenomena in the nature. By vary means, all species communicate to each other. The languages are nothing but a...

    Provided By Academic Science

  • White Papers // May 2014

    Cisco WebEx Meeting Center

    Cisco WebEx Meeting Center is the easy-to-use, low-cost way to share ideas with anyone, anywhere, anytime, from any device. Collaborate over the web with remote employees, customers, and suppliers. Deliver presentations, demonstrate applications and update spreadsheets. Save time and money on travel — conduct regular meetings...

    Provided By Cisco Systems

  • White Papers // Mar 2014

    Empowering Modern Finance - The CFO as Technology Evangelist

    The CFO as Technology Evangelist is a research report commissioned by Oracle and Accenture, in collaboration with Longitude Research, that explores how modern CFOs and finance executives are adopting emerging technologies within their finance functions to enable the development of new capabilities and to transform the role of finance.

    Provided By Oracle

  • Downloads // Jul 2006

    Download Savvion's Free Business Process Modeling Software

    The first step in improving your business processes is to articulate precisely where bottlenecks exist, and the most efficient way to do that is by simulating your existing processes using business process modeling software. To help you get started, Savvion offers its Process Modeler, a component of Savvion BusinessManager,...

    Provided By Savvion

  • White Papers // Apr 2014

    Top 5 Reasons to Deploy Desktops as a Service

    No, the personal computer isn't dead, but it looks a whole lot different than it did just a few years ago. Even though organizations need to upgrade or replace many of their client systems, those physical units increasingly are being replaced by virtual machines. Desktops as a service (DaaS) may...

    Provided By Desktone