Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Sponsored By IBM

  • eBooks // Feb 2014

    Systems Engineering for Dummies

    This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products. If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for...

    Sponsored By IBM

  • White Papers // Jan 2014

    Surviving the technical security crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Sponsored By IBM

  • White Papers // Dec 2013

    3 ways clinicians can leverage a patient portal to craft a healthcare community

    You probably have several goals for your patient portal of choice. Is “community” one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process.

    Sponsored By Healthtech Holdings

  • Case Studies // Feb 2014

    Quadmark: A case study on switching to Google Apps

    Read how Quadmark, the global consulting and training organisation, with over 100 employees globally embarked on a rebranding and expansion plan including a streamline of IT infrastructure. This included switching it’s email server from Exchange to Gmail and adopting Google Apps.

    Sponsored By Google

  • eBooks // Mar 2014

    Business Value Drivers in Digital Commerce: Key Capabilities for Growing Revenue eBook

    This report will look at how leading organizations influence average order value, customer frequency, and customer satisfaction through customer engagement, precision marketing, and exceptional fulfillment practices. Aberdeen will examine the key drivers and pain points organizations face in relation to their digital strategy and the key differentiating strategies, capabilities, and...

    Sponsored By IBM

  • White Papers // Nov 2013

    Keep only the data you want

    In today’s information economy, organizations are facing unfathomable data growth rates. In fact, Aberdeen Group estimates that data is growing at a rate of 56% year over year. And now, the big data phenomenon means data is growing in every single operational and analytic application. In fact, data is growing...

    Sponsored By IBM

  • White Papers // Oct 2013

    IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks, such as: ...

    Sponsored By Kaspersky Lab

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Sponsored By Dell Software

  • White Papers // Jan 2014

    Empowering Your Mobile Workers White Paper

    A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Today’s most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company’s IT strategy has to be ready to support them with easy, reliable,...

    Sponsored By Box

  • White Papers // Jan 2014

    The role of the network in cloud computing

    For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.

    Sponsored By IBM

  • White Papers // Mar 2013

    Businesses are ready for a new approach to IT

    With IBM PureSystems, you can consolidate workloads to reduce the total cost of ownership for your IT infrastructure. Simplify your IT infrastructure and reduce data center complexity. Deliver new services more rapidly and add capacity cost-effectively.

    Sponsored By IBM

  • White Papers // Apr 2013

    The future of email and application is social.

    This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

    Sponsored By IBM

  • Webcasts // Feb 2014

    On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

    Sponsored By Centrify

  • eBooks // Oct 2013

    Top 6 Project Breakdowns (and How to Fix Them)

    Project management is either one of those things that you are really good at, and you can breeze right through without any issues, or it's something that drives you crazy. Every business owner has experienced some form of project failure, but why? Study the top reasons that projects fail to...

    Sponsored By ConnectWise

  • White Papers // Feb 2014

    Research: Google Apps for Business ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled "Cloud Business Email - Market Quadrant 2013", the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati's findings can be downloaded here.

    Sponsored By Google

  • White Papers // Apr 2013

    Getting the Most Out of Your Next-Generation Firewall

    Network administrators are encountering the highest levels of change in history as they attempt to balance security with productivity. Rapidly evolving business trends are challenging them to provide widespread but safe Internet access, allowing employees to use legitimate business applications while using their device of choice. Applications have evolved to...

    Sponsored By Cisco

  • White Papers // Jan 2014

    Virtual Desktops in the Cloud: Changing the Face of Desktop Security

    Desktops, virtualization and security: To many, these three terms may seem mutually exclusive as they are by historical perspective and traditional consideration, in opposition to one another. Desktops offer individuality, personalization and are based on distributed users. Virtualization is associated with flexibility, mobility and cost effectiveness. Security is perceived as...

    Sponsored By Desktone

  • White Papers // Apr 2013

    Mobile Content, Collaboration & IDC's 3rd IT Platform: The Next Frontier for the Mobile Enterprise

    IDC focuses this article on talks about the new IT platform. This 3rd IT Platform will be the new wave for the about the next 25 years, so they urge all current companies to embrace it themselves. They also talk about how mobile is a huge part of this...

    Sponsored By Box

  • Podcasts // Jan 2014

    Stepping Into the Cloud: A Practical Guide to Launching a Successful Cloud Strategy

    Frost & Sullivan’s video “Stepping into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy” offers practical guidance for migrating your company to the cloud -- at your own pace and on your own schedule. Take the first step today.

    Sponsored By IBM

  • White Papers // Jan 2014

    Unified Communications

    Organizations are largely relying on TCO and ROI models in determining whether or not to invest in a unified communications (UC) solution. But what other factors are they considering? Read the white paper “Mobility And Business Outcomes Are Driving The Adoption Of Unified Communications” to get a clear picture of...

    Sponsored By IBM

  • Downloads // Oct 2013

    Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • Case Studies // Mar 2014

    Comparative Guide: Hitachi Unified Storage VM

    IT decision-makers often struggle to achieve a balanced information infrastructure that meets all their needs. Historically, they have chosen between low initial costs and higher efficiencies or market advantages. A platform that combines enterprise virtualization, data unification and efficient packaging enables businesses to extract increasing value from their data for...

    Sponsored By Hitachi Data Systems

  • Case Studies // Mar 2014

    Cisco Annual Security Report 2014 (CASR)

    You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the...

    Sponsored By Sourcefire, Inc.

  • White Papers // Dec 2013

    Patient Portals: A Platform for Connecting Communities of Care

    Connecting patient health data across the care continuum is essential to achieve improved care, increased access to personal health records and lowered costs. A successful approach rests in having the hospital serve as the connectivity hub for bringing patients, care givers and healthcare professionals together in a secure, online environment....

    Sponsored By Healthtech Holdings

  • White Papers // Mar 2013

    IDC Analyst Paper - Expert Integrated Systems: A Next Generation Computing Platform

    This white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform....

    Sponsored By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile device environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This...

    Sponsored By IBM

  • White Papers // Feb 2014

    Manage Identity and Access for Continuous Compliance and Reduced Risk.

    As organizations strive to securely deliver high-quality, high-availability services to their user communities, they grapple with cost control and ever-changing user populations, access points,and applications. But that is only part of a larger challenge related to identity and access management (IAM). Services must be delivered solely to the right people,...

    Sponsored By IBM

  • White Papers // Jan 2013

    Types of Electrical Meters in Data Centers

    There are several different types of meters that can be designed into a data center, ranging from high precision power quality meters to embedded meters (i.e. in a UPS or PDU). Each has different core functions and applications. This white paper provides guidance on the types of meters that might...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Sponsored By IBM

  • White Papers // Feb 2014

    SharePlex Connector for Hadoop Improving analytics with real- and near real-time data replication

    Learn how alternative methods for replicating changes from an Oracle database to a Hadoop® cluster can help you maintain real-time or a near real-time copies of the tables your organization needs to meet its data analytics requirements in this brief from Dell™.

    Sponsored By Dell Software

  • Case Studies // Mar 2014

    IDC Analyst Report: Distributed Denial of Service Attacks - Time for a New Defense

    Executives and managers of information security need to take a proactive approach to DDoS defense because the impact can extend well beyond lost revenue and threaten a company's brand equity. All enterprises need to have mitigation solutions in place. Featured in this Report: How DDoS has become a...

    Sponsored By Arbor Networks

  • eBooks // Jan 2014

    Putting the Design in Responsive Design

    Mobile devices are rapidly becoming the predominant consumer choice, with adoption increasing daily as PC sales diminish in response.Designing your digital site for desktop or laptop, as well as tablets and smartphones within a single codebase, is called responsive design. The promise of responsive design? A single, digital site optimized...

    Sponsored By Acquia

  • Webcasts // Aug 2013

    On-demand Webcast: Choosing the right online productivity suite: Office 365 vs. Google Apps

    Today's productivity suites offer far more than just word processing, spreadsheets, and email. They're also no longer restricted to the desktop. Cloud-based suites from Microsoft and Google provide the standard productivity apps as well as collaboration, conferencing, and file storage. But choosing between Office 365 and Google Apps (or whether...

    Sponsored By Centrify

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • Webcasts // Mar 2014

    Live Webcast: Smart Strategies for Data Backup and Recovery

    Everyone knows the dire consequences of data loss. The key is how to work pre-emptively to avoid them by employing smart strategies for backup and recovery. Smart strategies are centered around an essential understanding of why systems fail and what can be done to play it safe with your...

    Sponsored By Unitrends

  • Case Studies // Apr 2014

    Forrester Report: Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren't enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Preparing your Network for the Mobile Onslaught

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices - which can ultimately lead to poor performance or an inflexible infrastructure. Find...

    Sponsored By IBM

  • White Papers // Feb 2014

    Transforming change into a competitive advantage

    This paper provides an overview of new approaches, tools and solutions for global collaboration throughout the development lifecycle can help you effectively manage change and complexity in the development of smarter products.

    Sponsored By IBM