Cloud

See the latest white papers on how cloud computing and cloud services have transformed the IT industry, from data center services to virtualization, software-as-a-service, infrastructure-as-a-service, platform-as-a service and more.

  • White Papers // Apr 2015

    The Importance of Vendor Innovation in Systems, Services, and Solutions to Create Holistic Offerings

    The emerging reality of today's "always on" global marketplace is that people and resources now exist in an increasingly integrated web of mobility, connectivity, and interactivity. As virtualization enhances the ability to provide cloud computing, advanced mobility, and new forms of complex analytics over the next several years, virtualized enterprise...

    Provided By Hewlett-Packard (HP)

  • White Papers // Apr 2015

    Deploy and Move Enterprise Applications in the Cloud

    What if your organisation could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options?...

    Provided By IBM

  • White Papers // Apr 2015

    6 Best Practices of Managed Mobility Services

    The constant change in the mobility landscape often leads to a convoluted, ineffective process of mobility management. Mobility Managed Services (MMS) is emerging as a response to this complexity. MMS can address the varying levels of challenge through an objective-based setting for management in the enterprise. MMS pre-integrates solutions...

    Provided By Tangoe

  • White Papers // Apr 2015

    Cause & Effect - Enterprise Cloud Services

    A 2015 study indicated that security is one of the top 5 challenges with cloud maturity. Tangoe research shows that of lack of cloud policy, and to a lesser degree, a poorly enforced cloud policy, is one of the largest issues facing IT professionals today. Download this report which examines...

    Provided By Tangoe

  • White Papers // Apr 2015

    Best Practices for Selecting a Vulnerability Management (VM) Solution (French)

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Provided By Qualys

  • White Papers // Apr 2015

    IT Megatrends’ Impact On Infrastructure

    Your IT infrastructure plays a pivotal role in delivering the responsive services and positive experiences employees and customers demand today, serving as a bridge to a New Style of IT that integrates cloud, mobility, big data, and security. To meet these demands, infrastructure and operations leaders must work with the...

    Provided By HP and Intel UK

  • Webcasts // Apr 2015

    Does your app hit the mark with users? Use cloud-based services to find out for sure!

    Like it or not, you will hear from your vocal users. It’s not unusual to see ratings from 1 to 5 stars for the same app. How do you track and compare actual and perceived quality? How can you get actionable insight from user feedback to develop mobile apps that...

    Provided By IBM

  • White Papers // Apr 2015

    Ten Answers Regarding Mobile App Testing

    This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test...

    Provided By IBM

  • White Papers // Apr 2015

    Service Virtualization For Dummies

    Discover service virtualization and how it fits into the big picture of software quality. In this book, Service Virtualization For Dummies, IBM Limited Edition written by industry analysts Marcia Kaufman and Judith Hurwitz, learn how to deliver higher quality software by increase the efficiency and effectiveness of your testing processes...

    Provided By IBM

  • Webcasts // Apr 2015

    Real Experiences: Transforming Application Delivery for Continuous Innovation

    Key Takeaways: Learn from real experiences in transforming large organizations for increased speed and quality using a DevOps approach. Explore the characteristics and behavior of fast-moving companies, based on hundreds of assessments, interviews and implementations. Begin a self-assessment designed to give you a better understanding of your organization's readiness and...

    Provided By IBM

  • Webcasts // Apr 2015

    New Insights for Driving Cloud Strategy

    You don’t know what you don’t know! New insights for driving cloud strategy through analysing existing behavior. You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how...

    Provided By Hewlett-Packard (HP)

  • Videos // Apr 2015

    You don't know what you don't know! New insights for driving cloud strategy

    You don’t know what you don’t know! New insights for driving cloud strategy through analyzing existing behavior. You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how...

    Provided By Hewlett-Packard (HP)

  • Case Studies // Apr 2015

    SaaS Based Remote Inventory Management System

    Client is a California based Software-as-a-Service (SaaS) provider for remote stock room inventory management solutions. Client required a Web based application running on a windows Server in place of their current client-server based desktop application. They also wanted a Windows mobile application with scanning and high performance features to capture...

    Provided By Semaphore

  • Webcasts // Mar 2015

    Webcast: You Don't Know What You Don't Know! New Insights for Driving Cloud Strategy Through Analyzing Existing Behavior

    You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how good we are at managing our existing technologies. In this webinar we’ll explore the world of cloud...

    Provided By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Optimized security for the modern data center

    Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands whilst achieving improvements in quality of service and business agility. Read More..

    Provided By Trend Micro

  • White Papers // Mar 2015

    Work the Way You Live: What the Office Can Learn from the Smartphone

    Today's smartphone users can read the news, set up a dinner party, and buy a plane ticket before they get out of bed. In this Google for Work perspective, we share 5 powerful lessons from personal technology that will help your team be as productive with work as they are...

    Provided By Google Apps for Work

  • White Papers // Mar 2015

    The Evolving Role of the CIO: How Personal Technology and the Cloud are Changing the Way We Work

    As the role of IT rapidly changes from enforcer to enabler, CIOs have the opportunity to become strategic partners to the business. In this Google for Work collection, Google's SVP for Technical Infrastructure, Urs Hölzle and CIO, Ben Fried discuss three trending topics that can help you transform your organization:...

    Provided By Google Apps for Work

  • White Papers // Mar 2015

    The Fundamental Five: What businesses need to extract maximum value from the Cloud

    This research identifies and explores the core foundational elements of a mature cloud strategy, examining the degree to which companies have put this foundation in place and where they lie on the cloud maturity curve. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    IDC Technology Spotlight: The New DDoS Defense: Denying Denial-of-Service Attacks

    Enterprises are under attack. Any business that depends on the Internet is a target for distributed denial-of-service (DDoS) attacks, which overload a network and its components, effectively shutting down the network. These attacks are more than an inconvenience — they can harm an organization's reputation or, worse, cost lots of...

    Provided By Arbor Networks

  • White Papers // Mar 2015

    Quickbooks on Cloud: Surviving and Thriving in the World of Cloud

    With the accounting industry moving towards cloud on a fully online working model, users believe that moving their applications to the cloud is the best option they have. Hosting QuickBooks desktop edition means that the service provider installs and manages the software and files on their cloud-based servers. Users don't...

    Provided By Intuit

  • Case Studies // Mar 2015

    Load DynamiX Determines Best Flash & Hybrid Storage Solution for Service Provider

    Firehost is a secure cloud infrastructure provider that protects valuable websites and business assets. One big challenge is how to get more VMs per server and rack without sacrificing quality of service to their customers. They chose Load DynamiX to overcome this challenge. In researching storage performance and load testing...

    Provided By Load DynamiX

  • White Papers // Mar 2015

    Cloud Manager’s Balancing Act

    Read the new Forrester Research Paper: The Cloud Manager’s Balancing Act: Balancing Security and Cost without Sacrificing Time-to-Value. In this helpful study, you’ll learn: IT managers’ top concerns around time-to-value and cost The shift in balance between security and risk How to achieve adequate security, appropriate time-to-value, and cost...

    Provided By Trend Micro Australia

  • White Papers // Mar 2015

    Building the New Workplace - Google for Work

    Sometime in the last decade, we crossed into a fresh phase of the digital era. A new generation of companies born in the cloud—like Airbnb (lodging), Snapchat (messaging), Uber (transportation) and Zillow (real estate)—are using entirely new business models to disrupt the status quo. Google Chairman Eric Schmidt calls this...

    Provided By Google

  • White Papers // Mar 2015

    IBM Software See clearly in the cloud with threat-aware identity and access management

    Securely connect people, applications and devices to cloud environments While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is...

    Provided By IBM

  • White Papers // Mar 2015

    IBM Software: Safeguarding the cloud with IBM Dyamic Could Security

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    Cloud vs. Hybrid: Why Cloud is Best for your Business

    Learn how cloud beats hybrid by reducing complexity, delivering better centralised security and drives innovation. Free your Enterprise from the cost of maintaining legacy hardware and software find out how cloud reduces your total cost of ownership.

    Provided By Box

  • White Papers // Mar 2015

    Infrastructure Matters: Cloud Security Overview

    This solution overview guide explores how secure the cloud really is, and how Fujitsu services are designed to ensure your information is protected at every level. Read More..

    Provided By Fujitsu

  • White Papers // Mar 2015

    Prepare for a new age of enterprise security

    This report discusses how today’s security attacks are well-funded and executed by organized teams with business-like precision. As technologies such as cloud, mobile, big data and social media become more pervasive, attacks multiply, assaults on enterprises become more sophisticated, and their impact is more extreme. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    Threshold Based Approach to Detect DDoS Attacks in Cloud

    Cloud computing environment is very much prone to intrusion attacks due to modern-days new attacks and hence security of cloud computing is very much required. People will move towards cloud services until and unless they are not having full reliance in its security. Although various measures are taken place from...

    Provided By International Journal of Innovative Research in Information Security (IJIRIS)

  • White Papers // Feb 2015

    Securing Business Information in the Cloud

    Since the rise of the client-server model, IT has steadily moved from a centralized computing model to a highly decentralized one. This shift has dramatically accelerated in the last several years, fueled by mobility, cloud services and service-oriented platforms. This has created immense value for IT and end users, but...

    Provided By Box

  • White Papers // Feb 2015

    An Alternative to Today’s Distributed Content Security Chaos

    Many enterprise organizations have sensitive files stored cross the enterprise using a variety of technologies and security controls. As bad as this is, environments are actually getting worse as today's complex IT architecture is expanded with cloud and mobile computing. Addressing this problem with status quo solutions won't work, so...

    Provided By Box

  • White Papers // Feb 2015

    The Ultimate Manufacturing ERP Glossary: A Guide to the Most Common Manufacturing ERP Terms and Acronyms

    The ERP universe is ¬filled with buzzwords, made-up vendor terms and acronyms. BPM, CoC, MES, M2M, OEE, PPV, the list is extensive. Even worse, the frequently evolving terms often create more questions than answers. For example, what are the speci¬fic differences between ERP, MRP and MES? Or which service level...

    Provided By IQMS

  • White Papers // Feb 2015

    Protect Applications, Not Just Data – BC/DR for Virtualised Applications

    When organisations are considering a disaster recovery strategy, they look for a solution that not only protects and recovers data, but also provides application consistency. Learn how Zerto enables automated replication and recovery with application awareness to align with the business’ needs – application protection and availability. Download this resource...

    Provided By Zerto

  • White Papers // Feb 2015

    Mission-Critical Disaster Recovery in the Virtual World

    Enterprise App virtualisation is no longer an emerging technology. Enterprises of all sizes are deploying applications on virtualised IT infrastructures and clouds, and reaping the benefits of ease of management, simplicity, mobility, and cost-effectiveness. But there’s a speed bump on the virtualisation highway. Traditional replication and DR solutions were not...

    Provided By Zerto

  • White Papers // Feb 2015

    A comparison of Hypervisor-based Replication vs. Current and Legacy BC/DR Technologies

    Zerto’s innovative, hypervisor-based replication is a new technology developed to provide a true enterprise-class, yet fully virtual-aware BC/DR solution to protect virtualised, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

    Provided By Zerto

  • White Papers // Feb 2015

    The Intelligent Flexible Cloud

    Network applications and services today are nearly unrecognizable from a few decades ago. The diversity, scale, and dynamic evolution of apps, services, data, and devices have led to a corresponding evolution within service provider environments. Public, private, and hybrid clouds are ascendant. Software-based approaches to more agile network management and...

    Provided By ARM

  • White Papers // Feb 2015

    ESG Report: Extending the Data Center to the Cloud

    This ESG whitepaper was commissioned by NetApp discusses that 41% of ESG research respondents reported that the cloud enabled them to realise IT cost reductions with 26% seeing improvements in productivity. Learn how you can achieve these benefits by reviewing common IT scenarios detailed in private and hybrid cloud, data...

    Provided By NetApp

  • White Papers // Feb 2015

    Forrester Report: Cloud Management in a Hybrid Cloud World

    In this report, it explains how the Infrastructure and Operations role changes in a hybrid cloud world, how I&O professionals need to accelerate the cloud application delivery life cycle to exceed business expectations of cloud, and which cloud management capabilities I&O must master to take on the role of hybrid...

    Provided By NetApp

  • White Papers // Feb 2015

    The Cost Advantages of NetApp FlexPod Datacenter with VMware

    This whitepaper focuses on the NetApp FlexPod Datacenter offering. It compares NetApp’s capabilities to both VCE and EMC at a high level as well as demonstrating value via the Total Cost of Acquisition (TCA) and Total Cost of Ownership (TCO) analyses.

    Provided By NetApp

  • White Papers // Feb 2015

    Case Study: Wimbeldon (Cloud)

    For two weeks each year, Wimbledon scales from a small business to a global enterprise. After deploying IBM Cloud Orchestrator software, the organization supports a highly agile and scalable cloud environment, rapidly provisioning and deprovisioning virtual IBM System x servers as needed.

    Provided By IBM