Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • eBooks // Feb 2014

    Systems Engineering for Dummies

    This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products. If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for...

    Sponsored By IBM

  • White Papers // Dec 2013

    3 ways clinicians can leverage a patient portal to craft a healthcare community

    You probably have several goals for your patient portal of choice. Is “community” one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process.

    Sponsored By Healthtech Holdings

  • Case Studies // Feb 2014

    Quadmark: A case study on switching to Google Apps

    Read how Quadmark, the global consulting and training organisation, with over 100 employees globally embarked on a rebranding and expansion plan including a streamline of IT infrastructure. This included switching it’s email server from Exchange to Gmail and adopting Google Apps.

    Sponsored By Google

  • eBooks // Mar 2014

    Business Value Drivers in Digital Commerce: Key Capabilities for Growing Revenue eBook

    This report will look at how leading organizations influence average order value, customer frequency, and customer satisfaction through customer engagement, precision marketing, and exceptional fulfillment practices. Aberdeen will examine the key drivers and pain points organizations face in relation to their digital strategy and the key differentiating strategies, capabilities, and...

    Sponsored By IBM

  • White Papers // Nov 2013

    Keep only the data you want

    In today’s information economy, organizations are facing unfathomable data growth rates. In fact, Aberdeen Group estimates that data is growing at a rate of 56% year over year. And now, the big data phenomenon means data is growing in every single operational and analytic application. In fact, data is growing...

    Sponsored By IBM

  • White Papers // Oct 2013

    IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks, such as: ...

    Sponsored By Kaspersky Lab

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Sponsored By Dell Software

  • White Papers // Jan 2014

    Empowering Your Mobile Workers White Paper

    A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Today’s most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company’s IT strategy has to be ready to support them with easy, reliable,...

    Sponsored By Box

  • White Papers // Apr 2013

    The future of email and application is social.

    This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

    Sponsored By IBM

  • White Papers // Mar 2013

    Businesses are ready for a new approach to IT

    With IBM PureSystems, you can consolidate workloads to reduce the total cost of ownership for your IT infrastructure. Simplify your IT infrastructure and reduce data center complexity. Deliver new services more rapidly and add capacity cost-effectively.

    Sponsored By IBM

  • White Papers // Apr 2013

    Getting the Most Out of Your Next-Generation Firewall

    Network administrators are encountering the highest levels of change in history as they attempt to balance security with productivity. Rapidly evolving business trends are challenging them to provide widespread but safe Internet access, allowing employees to use legitimate business applications while using their device of choice. Applications have evolved to...

    Sponsored By Cisco

  • White Papers // Feb 2014

    Research: Google Apps for Business ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled "Cloud Business Email - Market Quadrant 2013", the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati's findings can be downloaded here.

    Sponsored By Google

  • White Papers // Jan 2014

    Virtual Desktops in the Cloud: Changing the Face of Desktop Security

    Desktops, virtualization and security: To many, these three terms may seem mutually exclusive as they are by historical perspective and traditional consideration, in opposition to one another. Desktops offer individuality, personalization and are based on distributed users. Virtualization is associated with flexibility, mobility and cost effectiveness. Security is perceived as...

    Sponsored By Desktone

  • Webcasts // Feb 2014

    On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

    Sponsored By Centrify

  • eBooks // Oct 2013

    Top 6 Project Breakdowns (and How to Fix Them)

    Project management is either one of those things that you are really good at, and you can breeze right through without any issues, or it's something that drives you crazy. Every business owner has experienced some form of project failure, but why? Study the top reasons that projects fail to...

    Sponsored By ConnectWise

  • White Papers // Apr 2013

    Mobile Content, Collaboration & IDC's 3rd IT Platform: The Next Frontier for the Mobile Enterprise

    IDC focuses this article on talks about the new IT platform. This 3rd IT Platform will be the new wave for the about the next 25 years, so they urge all current companies to embrace it themselves. They also talk about how mobile is a huge part of this...

    Sponsored By Box

  • White Papers // Apr 2013

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Sponsored By IBM

  • Downloads // Oct 2013

    Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • Case Studies // Mar 2014

    Comparative Guide: Hitachi Unified Storage VM

    IT decision-makers often struggle to achieve a balanced information infrastructure that meets all their needs. Historically, they have chosen between low initial costs and higher efficiencies or market advantages. A platform that combines enterprise virtualization, data unification and efficient packaging enables businesses to extract increasing value from their data for...

    Sponsored By Hitachi Data Systems

  • Case Studies // Mar 2014

    Cisco Annual Security Report 2014 (CASR)

    You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the...

    Sponsored By Sourcefire, Inc.

  • White Papers // Dec 2013

    Patient Portals: A Platform for Connecting Communities of Care

    Connecting patient health data across the care continuum is essential to achieve improved care, increased access to personal health records and lowered costs. A successful approach rests in having the hospital serve as the connectivity hub for bringing patients, care givers and healthcare professionals together in a secure, online environment....

    Sponsored By Healthtech Holdings

  • White Papers // Mar 2013

    IDC Analyst Paper - Expert Integrated Systems: A Next Generation Computing Platform

    This white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform....

    Sponsored By IBM

  • White Papers // Feb 2014

    Manage Identity and Access for Continuous Compliance and Reduced Risk.

    As organizations strive to securely deliver high-quality, high-availability services to their user communities, they grapple with cost control and ever-changing user populations, access points,and applications. But that is only part of a larger challenge related to identity and access management (IAM). Services must be delivered solely to the right people,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile device environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This...

    Sponsored By IBM

  • White Papers // Jan 2013

    Types of Electrical Meters in Data Centers

    There are several different types of meters that can be designed into a data center, ranging from high precision power quality meters to embedded meters (i.e. in a UPS or PDU). Each has different core functions and applications. This white paper provides guidance on the types of meters that might...

    Sponsored By APC by Schneider Electric

  • White Papers // Dec 2013

    Cloud Resource Management the Right Way

    Find out how Red Hat® CloudForms gives IT administrators and managers a comprehensive solution to optimize their virtual, private cloud, and hybrid cloud infrastructures with advanced capacity planning and sophisticated resource management capabilities.

    Sponsored By Red Hat

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Protection in the Age of BYODs

    You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world. Is your IT department a roadblock that employees go...

    Sponsored By Kaspersky Lab

  • White Papers // Oct 2012

    Big Data: Trends, Strategies, and SAP Technology

    The intelligent economy has arrived. The convergence of intelligent devices, social networking, pervasive broadband communications, and analytics is redefining relationships among producers, distributors, and consumers of goods and services. The growth in volume, variety, and velocity of data has created new challenges and opportunities.

    Sponsored By SAP

  • White Papers // Jan 2014

    Adding Zero-Day Offense to Vulnerability Management

    This paper describes why your organization is vulnerable to zero day attacks and what you can do to add a zero-day offense to existing vulnerability management processes. It also describes how the Qualys Zero-Day Risk Analyzer enhances capabilities of the QualysGuard Cloud Platform with targeted intelligence and workflow to...

    Sponsored By Qualys

  • White Papers // Jan 2014

    5 Common Mistakes in Application/IT Infrastructure Monitoring

    Everyone knows they need monitoring to ensure their site uptime and keep their business humming. Yet many sites still suffer from outages that are first reported by their customers. Having managed data center operations for decades, we have lots of experience with monitoring systems of all kinds, and these...

    Sponsored By LogicMonitor

  • White Papers // Nov 2013

    Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

    Mobility has brought down the wall between business and personal, spiking corporate productivity and putting work/life balance within reach. The bring-your-own-device (BYOD) phenomenon is a way to be constantly connected for work, family, and play. Companies that do not adapt and allow people to work where, when, and how they...

    Sponsored By Cisco

  • White Papers // Jan 2014

    Bring ROI to Your BYOD - Forrester Documents Benefits of Managed Mobility

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this study, you’ll learn how to improve workplace flexibility, reduce overhead and admin costs and increase productivity.

    Sponsored By IBM

  • White Papers // Feb 2014

    Transforming change into a competitive advantage

    This paper provides an overview of new approaches, tools and solutions for global collaboration throughout the development lifecycle can help you effectively manage change and complexity in the development of smarter products.

    Sponsored By IBM

  • White Papers // Feb 2014

    Cloud Vs. On-Site Security Myths

    Many organizations shy away from hosted and cloud-based services due to security qualms. But often those fears are based on flawed assumptions about the security of cloud environments compared to in-house counterparts. We take a clear-headed look at how cloud security truly stacks up against traditional environments when it comes...

    Sponsored By INetU

  • White Papers // Jan 2014

    BYOD & the Implications for IT: How to Support BYOD without Putting Your Company at Risk

    The predictions that many industry pundits have been making about the rise of BYOD (bring your own device) are coming to fruition. The surprise is that it is happening at a much-accelerated rate at businesses of all sizes, around the world. While BYOD is increasingly important for employee satisfaction, it...

    Sponsored By Desktone

  • White Papers // Feb 2014

    SharePlex Connector for Hadoop Improving analytics with real- and near real-time data replication

    Learn how alternative methods for replicating changes from an Oracle database to a Hadoop® cluster can help you maintain real-time or a near real-time copies of the tables your organization needs to meet its data analytics requirements in this brief from Dell™.

    Sponsored By Dell Software

  • Case Studies // Mar 2014

    IDC Analyst Report: Distributed Denial of Service Attacks - Time for a New Defense

    Executives and managers of information security need to take a proactive approach to DDoS defense because the impact can extend well beyond lost revenue and threaten a company's brand equity. All enterprises need to have mitigation solutions in place. Featured in this Report: How DDoS has become a...

    Sponsored By Arbor Networks