Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Sponsored By Global Knowledge

  • Research // Sep 2014

    ZK Research 2014 - Best Practices for Building a Mobility Strategy

    Granting you employees mobile access can have major business benefits. But realizing those benifits is no longer only about providing simple device access. Now it's about facilitating great user experiences, increasing productivity and maintaining the security of your business through it all. Download this new ZK Research white paper and...

    Sponsored By Cisco Systems

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Sponsored By IBM

  • White Papers // Jun 2014

    SDN: How It Will Affect You and Why You Should Care

    You may have heard about software-defined networking (SDN) and its cousin network functions virtualization (NFV). These emerging technologies are likely to revolutionize the IT industry as well as your job. This white paper introduces you to SDN and NFV, examines their impact on you as well as the industry, and...

    Sponsored By Global Knowledge

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Sponsored By Cisco Systems

  • White Papers // Apr 2014

    The 5 Technology Trends You Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • White Papers // Sep 2014

    The Packet Delivery Process: Remotely Connected Hosts

    Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    The Packet Delivery Process: Locally Connected Hosts

    Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    How We Define a Network is about to Change, Again

    VMware NSX does for networks and physical network components what virtual machines did for data centers and physical servers. It allows you to use them in very different and more flexible ways. In this white paper, you’ll learn how VMware NSX changes the way you build, manage, and secure your...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Osterman Report: Office 365 for the Enterprise

    Osterman Research outlines how third parties are required to strengthen security, compliance and control.

    Sponsored By Mimecast

  • White Papers // Jul 2014

    IaaS Public Clouds and the Perceived Security Threat

    Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We...

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    SDN and Cloud Computing

    After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes...

    Sponsored By Global Knowledge

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Considerations for Owning vs. Outsourcing Data Center Physical Infrastructure

    When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be...

    Sponsored By APC by Schneider Electric

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Sponsored By Cisco Systems

  • White Papers // Sep 2014

    Security and the Rise of Machine-to-Machine (M2M) Communications

    Increased interconnectivity via machine-to-machine (M2M) communications, the IoE, and smart systems holds profound implications for how business trends continue to evolve. In terms of M2M growth, key developments in security will be essential, from the design and manufacture of devices to more robust cloud security and ensuring the integrity of...

    Sponsored By Global Knowledge

  • Webcasts // Nov 2014

    On-demand Webcast: SaaS Apps? BYOD? Take Cloud Control

    Centrify User Suite Puts IT Back in the Driver’s Seat Cloud apps continue to find their way into enterprises, promising productivity but often causing headaches. Each app has its own set of login credentials for people to forget or re-use, IT has no centralized way to grant and revoke access...

    Sponsored By Centrify

  • White Papers // Jun 2014

    Improve your Unified Communications ROI

    IT decision makers concentrate hard on vintegrating real-time tools like instant messaging and voice and video conferencing with voicemail, email and text messages, they neglect the emotional and informational needs of the end user. The result? Your company has made a significant investment on a flawless UC platform and cutting...

    Sponsored By Plantronics

  • White Papers // Jun 2014

    Classification of Data Center Infrastructure Management (DCIM) Tools

    Data centers today lack a formal system for classifying software management tools. As a result, confusion exists regarding which management systems are necessary and which are optional for secure and efficient data center operation. This paper divides the realm of data center management tools into four distinct subsets and compares...

    Sponsored By APC by Schneider Electric

  • White Papers // Sep 2014

    ForgeRock Open Identity Stack

    Identity and Access Management (IAM) services were traditionally built for a company's internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as...

    Sponsored By ForgeRock

  • White Papers // Sep 2014

    10 Essential Elements for a Secure Mobility Strategy

    With enhanced mobility and work flexibility comes increased information security risk. Explore the security implications and capabilities of the major mobile OS platforms and learn more about best practices to fortify security while supporting new levels of productivity.

    Sponsored By Citrix Online

  • White Papers // Jul 2014

    2014 Survey Report - Remote Collaboration Challenges & Strategies to Overcome

    Polycom surveyed 5,000 business professionals from all job levels around the world that focused on collaboration challenges to support a mobile and flexible working environment. Download this survey to learn what these Senior IT professionals say are their biggest remote collaboration challenges and discover the strategies they deploy to...

    Sponsored By Polycom, Inc.

  • White Papers // May 2014

    Real-Time Business Demo Tool

    Our interactive Real-Time Business Demo Tool demonstrates the new user experience of the SAP Business Suite software, powered by the SAP HANA platform, which delivers instant insight to all lines of business.

    Sponsored By SAP

  • White Papers // Jun 2014

    Economizer Modes of Data Center Cooling Systems

    In certain climates, some cooling systems can save over 70% in annual cooling energy costs by operating in economizer mode, corresponding to over 15% reduction in annualized PUE. However, there are at least 17 different types of economizer modes with imprecise industry definitions making it difficult to compare, select, or...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Fundamentals of Managing the Data Center Life Cycle for Owners

    Just as good genes do not guarantee health and well-being, a good design alone does not ensure a data center is well-built and will remain efficient and available over the course of its life span. For each phase of the data center’s life cycle, proper care and action must be...

    Sponsored By APC by Schneider Electric

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Sponsored By Palo Alto Networks

  • Downloads // May 2014

    Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

    Sponsored By SolarWinds

  • White Papers // Jul 2014

    10 Critical Requirements for Cloud Applications

    Many Organizations are freeing up their valuable resources for strategic activities by deploying cloud applications that are less costly and complex. So the need to differentiate between the real cloud providers and applications from the imposters has become crucial. The purpose of this document is to help technology and business...

    Sponsored By Workday

  • White Papers // Jan 2015

    New age security threats require new age solutions. Fixing security requires a fresh approach.

    Current endpoint software security software is resource heavy and therefore slow. With the growing number of exploits and mobile attacks available to modern cybercriminals, real-time, actionable threat intelligence within a global context is more important than ever for securing organizations. Find out how to face these challenges in this information...

    Sponsored By Webroot

  • White Papers // Jun 2014

    Securing and controlling data in the cloud

    The Securing and Controlling Data in the Cloud white paper evaluates the • benefits of cloud computing, • the security challenges posed by the cloud, • provides recommendations to secure and control sensitive data in cloud environments.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Securing Big Data

    This White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal and within acceptable norms of performance vs. security tradeoffs.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Secure sensitive data encryption tech guide

    This report surveys the various encryption approaches for securing data at rest to understand what the technology does along with where each provides an optimal fit. After comparing the various encryption technologies, this paper explains why file level transparent data encryption provides the optimal balance of data type coverage, security,...

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Enterprise encryption architecture

    This white paper Enterprise Encryption Architecture explores data security threats and provides some encryption strategies in order to protect private and confidential information.

    Sponsored By Vormetric

  • White Papers // Nov 2014

    Unleashing IT ACI Special Edition Article

    Virtualization, cloud, and mobility are opening new avenues in the IT world and could require infrastructure changes. The new Cisco® Application Centric Infrastructure (Cisco ACI™) is the future of networking with a holistic architecture, centralized automation, and policy-driven application profiles. Featured customers weigh in on their decision to implement Cisco...

    Sponsored By Cisco

  • White Papers // Jul 2014

    Top Ten Compensation Mistakes Made by Small Businesses

    We know it is easy for small businesses to fall into the trap of treating compensation performance as ""something to worry about when we get bigger."" The fact is, organizations of all sizes need to attract, retain and motivate employees, and compensation is a critical element in any strong talent...

    Sponsored By IBM

  • White Papers // Sep 2014

    Checklist for Cloud Mobility Readiness

    Are you trying to determine the readiness of your enterprise’s content mobility solution? Today’s mobile worker want real-time, remote and secure access to your enterprise’s fast-growing information. To ensure the right data is in the right place at the right time, your organization needs a solution that provides your workforce...

    Sponsored By Hitachi

  • White Papers // Nov 2014

    IDC Report - Business Value of Managed Services

    Research shows that today's business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this IDC analyst...

    Sponsored By IBM

  • White Papers // Aug 2014

    Countering Cyber Threats by Modeling "Normal" Website Behavior

    This white paper chronicles the evolution of web and mobile threats, the economic impact of cybercrime and business logic abuse, and how organizations could be leveraging the data in their network to foil the top attacks with behavioral analytics.

    Sponsored By RSA

  • Downloads // Aug 2014

    Improving Customer Service with First-Class Remote Support

    Want to provide excellent customer support, while minimizing operational costs? Organizations like you are turning to remote support solutions to connect to various devices and pull system diagnostics, push configurations and view the device to deliver personalized, hands-on support. Rescue from LogMeIn, provides a sophisticated set of core...

    Sponsored By LogMeIn Rescue

  • White Papers // Sep 2014

    An Automated, Application-Aware Foundation for the Modern Enterprise

    Enterprises have seen massive change over the last decade, but one thing has remained consistent: the Enterprise Network. This article provides insight on an adaptable and programmable network platform to stay ahead of enterprise trends such as BYOD, Cloud Adoption and Xaas

    Sponsored By Cisco Systems