Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • eBooks // Feb 2014

    Systems Engineering for Dummies

    This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products. If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for...

    Sponsored By IBM

  • White Papers // Dec 2013

    3 ways clinicians can leverage a patient portal to craft a healthcare community

    You probably have several goals for your patient portal of choice. Is “community” one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process.

    Sponsored By Healthtech Holdings

  • Case Studies // Feb 2014

    Quadmark: A case study on switching to Google Apps

    Read how Quadmark, the global consulting and training organisation, with over 100 employees globally embarked on a rebranding and expansion plan including a streamline of IT infrastructure. This included switching it’s email server from Exchange to Gmail and adopting Google Apps.

    Sponsored By Google

  • eBooks // Mar 2014

    Business Value Drivers in Digital Commerce: Key Capabilities for Growing Revenue eBook

    This report will look at how leading organizations influence average order value, customer frequency, and customer satisfaction through customer engagement, precision marketing, and exceptional fulfillment practices. Aberdeen will examine the key drivers and pain points organizations face in relation to their digital strategy and the key differentiating strategies, capabilities, and...

    Sponsored By IBM

  • White Papers // Nov 2013

    Keep only the data you want

    In today’s information economy, organizations are facing unfathomable data growth rates. In fact, Aberdeen Group estimates that data is growing at a rate of 56% year over year. And now, the big data phenomenon means data is growing in every single operational and analytic application. In fact, data is growing...

    Sponsored By IBM

  • White Papers // Oct 2013

    IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks, such as: ...

    Sponsored By Kaspersky Lab

  • White Papers // Mar 2013

    Businesses are ready for a new approach to IT

    With IBM PureSystems, you can consolidate workloads to reduce the total cost of ownership for your IT infrastructure. Simplify your IT infrastructure and reduce data center complexity. Deliver new services more rapidly and add capacity cost-effectively.

    Sponsored By IBM

  • White Papers // Apr 2013

    The future of email and application is social.

    This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

    Sponsored By IBM

  • Webcasts // Feb 2014

    On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

    Sponsored By Centrify

  • eBooks // Oct 2013

    Top 6 Project Breakdowns (and How to Fix Them)

    Project management is either one of those things that you are really good at, and you can breeze right through without any issues, or it's something that drives you crazy. Every business owner has experienced some form of project failure, but why? Study the top reasons that projects fail to...

    Sponsored By ConnectWise

  • White Papers // Feb 2014

    Research: Google Apps for Business ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled "Cloud Business Email - Market Quadrant 2013", the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati's findings can be downloaded here.

    Sponsored By Google

  • White Papers // Apr 2013

    Getting the Most Out of Your Next-Generation Firewall

    Network administrators are encountering the highest levels of change in history as they attempt to balance security with productivity. Rapidly evolving business trends are challenging them to provide widespread but safe Internet access, allowing employees to use legitimate business applications while using their device of choice. Applications have evolved to...

    Sponsored By Cisco

  • White Papers // Jan 2014

    Virtual Desktops in the Cloud: Changing the Face of Desktop Security

    Desktops, virtualization and security: To many, these three terms may seem mutually exclusive as they are by historical perspective and traditional consideration, in opposition to one another. Desktops offer individuality, personalization and are based on distributed users. Virtualization is associated with flexibility, mobility and cost effectiveness. Security is perceived as...

    Sponsored By Desktone

  • Downloads // Oct 2013

    Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • Case Studies // Mar 2014

    Comparative Guide: Hitachi Unified Storage VM

    IT decision-makers often struggle to achieve a balanced information infrastructure that meets all their needs. Historically, they have chosen between low initial costs and higher efficiencies or market advantages. A platform that combines enterprise virtualization, data unification and efficient packaging enables businesses to extract increasing value from their data for...

    Sponsored By Hitachi Data Systems

  • Case Studies // Mar 2014

    Cisco Annual Security Report 2014 (CASR)

    You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the...

    Sponsored By Sourcefire, Inc.

  • White Papers // Dec 2013

    Patient Portals: A Platform for Connecting Communities of Care

    Connecting patient health data across the care continuum is essential to achieve improved care, increased access to personal health records and lowered costs. A successful approach rests in having the hospital serve as the connectivity hub for bringing patients, care givers and healthcare professionals together in a secure, online environment....

    Sponsored By Healthtech Holdings

  • White Papers // Mar 2013

    IDC Analyst Paper - Expert Integrated Systems: A Next Generation Computing Platform

    This white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform....

    Sponsored By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile device environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This...

    Sponsored By IBM

  • White Papers // Feb 2014

    Manage Identity and Access for Continuous Compliance and Reduced Risk.

    As organizations strive to securely deliver high-quality, high-availability services to their user communities, they grapple with cost control and ever-changing user populations, access points,and applications. But that is only part of a larger challenge related to identity and access management (IAM). Services must be delivered solely to the right people,...

    Sponsored By IBM

  • White Papers // Jan 2013

    Types of Electrical Meters in Data Centers

    There are several different types of meters that can be designed into a data center, ranging from high precision power quality meters to embedded meters (i.e. in a UPS or PDU). Each has different core functions and applications. This white paper provides guidance on the types of meters that might...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Sponsored By IBM

  • White Papers // Feb 2014

    SharePlex Connector for Hadoop Improving analytics with real- and near real-time data replication

    Learn how alternative methods for replicating changes from an Oracle database to a Hadoop® cluster can help you maintain real-time or a near real-time copies of the tables your organization needs to meet its data analytics requirements in this brief from Dell™.

    Sponsored By Dell Software

  • Case Studies // Mar 2014

    IDC Analyst Report: Distributed Denial of Service Attacks - Time for a New Defense

    Executives and managers of information security need to take a proactive approach to DDoS defense because the impact can extend well beyond lost revenue and threaten a company's brand equity. All enterprises need to have mitigation solutions in place. Featured in this Report: How DDoS has become a...

    Sponsored By Arbor Networks

  • eBooks // Jan 2014

    Putting the Design in Responsive Design

    Mobile devices are rapidly becoming the predominant consumer choice, with adoption increasing daily as PC sales diminish in response.Designing your digital site for desktop or laptop, as well as tablets and smartphones within a single codebase, is called responsive design. The promise of responsive design? A single, digital site optimized...

    Sponsored By Acquia

  • Webcasts // Aug 2013

    On-demand Webcast: Choosing the right online productivity suite: Office 365 vs. Google Apps

    Today's productivity suites offer far more than just word processing, spreadsheets, and email. They're also no longer restricted to the desktop. Cloud-based suites from Microsoft and Google provide the standard productivity apps as well as collaboration, conferencing, and file storage. But choosing between Office 365 and Google Apps (or whether...

    Sponsored By Centrify

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • Webcasts // Mar 2014

    Live Webcast: Smart Strategies for Data Backup and Recovery

    Everyone knows the dire consequences of data loss. The key is how to work pre-emptively to avoid them by employing smart strategies for backup and recovery. Smart strategies are centered around an essential understanding of why systems fail and what can be done to play it safe with your...

    Sponsored By Unitrends

  • Case Studies // Apr 2014

    Forrester Report: Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren't enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Preparing your Network for the Mobile Onslaught

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices - which can ultimately lead to poor performance or an inflexible infrastructure. Find...

    Sponsored By IBM

  • eBooks // Feb 2014

    Mobile Security: How an Organization Can Control Growing Threats with Mobile Device Management

    From smartphones to tablets, as the popularity of mobile devices grows, the opportunity for security breaches grows as well, placing a new burden on IT departments. By providing mobile device management, IT professionals can ensure their organization remains protected from mobile security threats. Download the Mobile Security: Controlling Growing Threats...

    Sponsored By LabTech Software

  • White Papers // Feb 2014

    Transforming change into a competitive advantage

    This paper provides an overview of new approaches, tools and solutions for global collaboration throughout the development lifecycle can help you effectively manage change and complexity in the development of smarter products.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Endpoint Manager

    IBM Endpoint Manager lowers the total cost of managing and securing mobile devices, laptops, desktops, and servers – physical or virtual, on or off-network, personally or corporate-owned.

    Sponsored By IBM

  • White Papers // Jan 2014

    Bring ROI to Your BYOD - Forrester Documents Benefits of Managed Mobility

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this study, you’ll learn how to improve workplace flexibility, reduce overhead and admin costs and increase productivity.

    Sponsored By IBM

  • White Papers // Dec 2013

    Cloud Resource Management the Right Way

    Find out how Red Hat® CloudForms gives IT administrators and managers a comprehensive solution to optimize their virtual, private cloud, and hybrid cloud infrastructures with advanced capacity planning and sophisticated resource management capabilities.

    Sponsored By Red Hat

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Protection in the Age of BYODs

    You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world. Is your IT department a roadblock that employees go...

    Sponsored By Kaspersky Lab

  • White Papers // Oct 2012

    Big Data: Trends, Strategies, and SAP Technology

    The intelligent economy has arrived. The convergence of intelligent devices, social networking, pervasive broadband communications, and analytics is redefining relationships among producers, distributors, and consumers of goods and services. The growth in volume, variety, and velocity of data has created new challenges and opportunities.

    Sponsored By SAP