Cloud

Cloud technologies are gaining momentum everyday in the largest data centers and the smallest businesses, offering services that encompass everything from the infrastructure down to the software level. There are many potential benefits as well as risks, but market leaders like Amazon, Rackspace, IBM, and Microsoft are bringing the cloud from the bleeding edge to the center of the IT landscape.

  • White Papers // May 2014

    Whitepaper: Workday: A Whole New Approach to the HRMS Marketplace

    Josh Bersin, principal analyst at Bersin and Associates, talked with three of Workday’s customers and is now convinced that there are transformational benefits to adopting its unique and powerful approach to human resource management systems (HRMS). This whitepaper summarizes the discussion and highlights the benefits of Workday for other organizations....

    Sponsored By Workday

  • White Papers // May 2014

    Whitepaper: Global at the Core

    Global business can’t be served by legacy applications. That’s why Workday designed SaaS solutions that are global at the core. This whitepaper explains how Workday has built modern, global enterprise application solutions that effectively transform enterprise business by providing superior information, agility, control, and economics.

    Sponsored By Workday

  • Videos // May 2014

    Video: 10 Critical Requirements for Cloud Applications

    Many application vendors now claim they're in the cloud. But being committed to this new delivery model requires more than just saying it. So what must-haves should you look for in a cloud vendor? Watch this video to see the 10 Critical Requirements for Cloud Applications.

    Sponsored By Workday

  • White Papers // May 2014

    HP HAVEn: See the big picture in Big Data

    HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the...

    Sponsored By HP US

  • Downloads // Apr 2014

    One Tool that Makes Server & Application Performance Monitoring Simple

    SolarWinds Server & Application Monitor (SAM) gives you the ability to proactively identify problems and isolate the root cause of performance issues. Rather than only responding to problems, fire drills and endless help tickets, stop poor performance before it affects service availability. Four reasons to consider SolarWinds Server & Application...

    Sponsored By SolarWinds

  • White Papers // Apr 2014

    Managing hybrid clouds: A comprehensive, secure, and flexible cloud management solution white paper

    Hybrid cloud delivery brings a fundamental shift to the enterprise, and a new style of IT. The IT department that develops a hybrid delivery model, one that creates an optimal mix of traditional IT, private, and public cloud, is the department that realizes success. Read the white paper and learn...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2014

    Uniform Server Management for Hybrid Environments

    With a broad array of multivendor, cloud and non-cloud platforms and devices to support, managing today’s server infrastructures has grown increasingly complicated. Check this out and learn how you can manage server infrastructures efficiently.

    Sponsored By IBM

  • White Papers // Apr 2014

    Private Cloud in the Hybrid Era: The Critical Choices Driving Business Value and Agility

    Capitalizing on the transformative potential of private cloud requires leveraging the differentiators that will drive exponential value down the road. This IBM white paper discusses the core differentiators that drive transformative business value in the

    Sponsored By IBM

  • eBooks // Apr 2014

    Guarding the Castle

    This ebook details the sophisticated strategies and tools that today’s cybercriminals use to infiltrate your network, and how you can stop them.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    eBook Series: The Changing Landscape of Technology Services

    Technology changes in the blink of an eye. New products or services are introduced and older versions are obsolete almost immediately. The convergence of Mobile, Big Data, and the Cloud is setting the stage for a new way of working, collaborating and leveraging business information. Learn more about how you...

    Sponsored By ConnectWise

  • White Papers // Mar 2014

    Global Compliance for Data Security

    Driven on by relentless news about security breaches and data loss, law makers and regulators the world over are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on encryption, not only of portable equipment and...

    Sponsored By Vormetric

  • Downloads // Mar 2014

    Big Data in HR and Finance: Understanding the Real Value

    Big Data continues to create new ways of gathering and analyzing information. In the latest research by Harvard Business Review Analytics Services, a real-world lens of big data is provided for HR and Finance. View this infographic below to discover why big data matters to you and your organization.

    Sponsored By Workday

  • White Papers // Mar 2014

    Why and How to Choose the Right Cloud Vendor

    Check out this informative resource to discover how to best choose a service provider for your cloud backup services. Read on to explore key requirements to look for in a provider, including: a proven track record, scalability, simple data recovery and more..

    Sponsored By HP US

  • White Papers // Feb 2014

    Mobile Connect

    Discover how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Mac OS X, Android™, Kindle Fire and Windows 8.1) while protecting your corporate network from mobile security threats.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Mobile Security: How to Protect the Enterprise in the Mobile Era

    Learn about the three pillars of mobile security, and how they give users the flexibility and access they need while providing a strong foundation that protects systems and data.

    Sponsored By Dell Software

  • eBooks // Feb 2014

    eBook: Agile Cloud Delivery: When Innovation Can't Wait

    Companies are increasingly turning to cloud computing as a way to provide an agile, flexible service delivery platform. Whether the goal is to transition more swiftly to a virtual environment or speed application deployment, the answer lies in Agile Cloud Delivery.

    Sponsored By CA Technologies

  • Videos // Feb 2014

    Video: DNS Europe drives down the cost of high availability, fault tolerant cloud services for their customers

    Business: DNS Europe is a UK based cloud hosting business offering cloud application hosting and development, hybrid cloud integration, consulting and on-boarding. Challenge: Compete with larger hosting providers and public cloud providers by offering high availability & fault tolerance with a very high service credit policy. Solution: Offer public and...

    Sponsored By CA Technologies

  • Case Studies // Feb 2014

    Success Story: DonorsChoose.org processes more charitable donations with CA Technologies cloud computing platform

    Business: DonorsChoose.org is an online charity that connects classrooms in need with people that want to donate funds to help. Challenge: With DonorsChoose.org experiencing massive growth, it needed to ensure that its online platform was able to support a growing number of transactions, particularly during peaks in demand. Solution:...

    Sponsored By CA Technologies

  • White Papers // Feb 2014

    Osterman Research: The importance of Continuity in Office 365 Environments

    Email downtime is a fact of life for virtually every organisation and carries with it a variety of consequences that range from the annoying to the financially devastating. This paper addresses the solutions around email outages and downtime and what business decision makers need to consider as they develop their...

    Sponsored By Mimecast

  • White Papers // Feb 2014

    SuperMassive Series Data Sheet

    The Dell™ SonicWALL™ SuperMassive™ Next-Generation Firewall (NGFW) platform is built to meet the needs of enterprise, government, university and service provider deployments and gives you uncompromising, high-performance firewall protection. Learn how to protect against today’s emerging threats in this SuperMassive NGFW datasheet.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    ZDNet ANZ IaaS / PaaS Priorities 2013/14

    The Infrastructure-as-a-Service and Platform-as-a-Service strategies, priorities and implementation plans of ANZ IT leaders and professionals Part of ZDNet's Cloud Priorities research project, ZDNet IaaS/PaaS Priorities reports the findings of a survey about the cloud priorities and implementation plans of IT and business leaders in Australia and New Zealand. ...

    Sponsored By ZDNet

  • White Papers // Feb 2014

    ZDNet Asia IaaS/PaaS Priorities 2013/14 Report

    The Infrastructure-as-a-Service and Platform-as-a-Service strategies, priorities and implementation plans of Asian IT leaders and professionals Part of ZDNet's Cloud Priorities research project, ZDNet IaaS/PaaS Priorities reports the findings of a survey about the cloud priorities and implementation plans of IT and business leaders in Asia. As the name...

    Sponsored By ZDNet

  • White Papers // Jan 2014

    Prepare, Pinpoint, Predict

    As your IT organization adopts new technologies like cloud and virtualization, physical and virtual machine sprawl grows. This is exacerbated with the explosion of mobility, a vast choice of user devices, sensors and readers of many types that now have internet connectivity, and the hundreds of new technologies that are...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jan 2014

    Under Cloud Cover: How Leaders are Accelerating Competitive Differentiation

    According to a survey by the IBM Center for Applied Insights and Oxford Economics, business leaders are becoming increasingly focused on the business value of cloud. Although the participant's cloud strategies differ in terms of scope, platform and delivery models, the chief takeaway from the survey is that cloud is...

    Sponsored By IBM

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • White Papers // Jan 2014

    Data Security in the Cloud

    Maintaining control over the data is paramount to cloud success. In this CSO Magazine whitepaper, learn about Cloud Computing Security Challenges, Techniques for Protecting Data in the Cloud and Strategies for Secure Transition to the Cloud.

    Sponsored By Vormetric

  • White Papers // Jan 2014

    Big Data Gets Personal: Business Report

    Big data and personal data are converging to shape the Internet's most surprising consumer products. They'll predict your needs and store your memories -- if you let them. Fast-developing methods for collecting and analyzing these types of "big data" promise valuable insights to retailers, urban planners, and for individuals. This...

    Sponsored By SAP

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • eBooks // Oct 2013

    Finding Success in the Cloud

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

    Sponsored By LabTech Software

  • White Papers // Mar 2012

    Build a hybrid cloud: Choose a cloud partner

    This paper will provide you with a list of steps and considerations that you can use as the basis for your own plan in working with a Cloud Service Provider.

    Sponsored By IBM

  • White Papers // Jan 2015

    Crime Area Detection and Criminal Data Record

    In 21st century where mobile and information technology have become an integral part of the people lives. A new area where mobile integrated with technology is useful for crime reporting since readily accessible information is not available at any point in investigation this is a key drawback for communication in...

    Provided By Creative Commons

  • White Papers // Jan 2015

    Load Degree Calculation for the Public Cloud Based on Cloud Partitioning Model Using Turnaround Time

    Cloud computing is a growing technology and is becoming popular because of its great features as it provides almost everything-hardware, software, infrastructure and platform as a service. Clients are becoming more demanding and expect better service, so load balancing has become an inevitable requirement for the Cloud Service Providers (CSPs)....

    Provided By Creative Commons

  • White Papers // Jan 2015

    Bio-Inspired Scheduling of High Performance Computing Applications in Cloud: A Review

    Cloud computing is a type of internet based computing that trusts sharing computing resources rather than having local servers or personal devices to handle applications. High performance computing applications are some scientific applications that require high bandwidth, low latency networking, and very high computing capabilities. Scheduling and managing high performance...

    Provided By Creative Commons

  • White Papers // Jan 2015

    An Automated Sequence Model Testing (ASMT) for Improved Test Case Generation Using Cloud Integration

    Software quality assurance is primarily done by means of testing an activity that faces constraints of both time & resources. Traditional testing strategies obliged the overwhelming resources and infrastructure and it can be carried out after the completion code is created. So to apply some changes after the development obliges...

    Provided By Creative Commons

  • White Papers // Jan 2015

    Multi-Resource Energy-Efficient Routing in Cloud Data Centers with Networks-as-a-Service

    With the rapid development of software defined networking and network function virtualization, researchers have proposed a new cloud networking model called Network-as-a-Service (NaaS) which enables both in-network packet processing and application-specific network control. In this paper, the authors revisit the problem of achieving network energy efficiency in data centers and...

    Provided By Temple Skin Care

  • White Papers // Jan 2015

    Seeking Black Lining in Cloud

    In this paper, the authors focus on attacks on confidentiality that require time synchronization. This manuscript proposes a detection framework for covert channel perspective in cloud security. This problem is interpreted as a binary classification problem and the algorithm proposed is based on certain features that emerged after data analysis...

    Provided By Cornell University

  • White Papers // Jan 2015

    Cloud Hosting: Benefits of Cloud Server Hosting & Impact on It Organizations

    Cloud hosting is an emerging style of technology where users in a network are linked to several servers. Each user has the computer power of several interconnected servers. Users of this cloud hosting space have access to information on several servers, not just one. There are several types of cloud...

    Provided By Prototype