Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • White Papers // Jan 2014

    Advanced Case Management Leadership Guide

    This guide examines how IBM Case Manager offers an extensible platform for enhancing capabilities and protecting investments with additional value-added ECM capabilities from IBM, as well as industry-specific case management applications and best practices from IBM Business Partners.

    Sponsored By IBM

  • White Papers // Jan 2014

    Pervasive Technology Trends Shaping the Business and the Implications for Your Data Center

    Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy...

    Sponsored By IBM

  • White Papers // Jan 2014

    Private Cloud Services from IBM. Flexible End-to-End Solutions for Transforming the Enterprise

    Private clouds can drive operational efficiencies and transformative business model change, but maximizing these benefits requires a carefully planned strategy and flexible, scalable services. IBM’s holistic approach and integrated portfolio of end-to-end services provides multiple pathways to private cloud. Success hinges on ensuring the infrastructure is cloud-ready, developing an actionable...

    Sponsored By IBM

  • White Papers // Jan 2014

    Avoiding the Pitfalls of Outdated Disaster Recovery Plans: Evolving Business Expectations and Threats May Require New Disaster Recovery Approaches

    Why do so many disaster recovery plans fail? Too often, organizations base their entire recovery strategies on outdated assumptions. Read "Avoiding the Pitfalls of Outdated Disaster Recovery Plans"

    Sponsored By IBM

  • White Papers // Jan 2014

    Prefabricated Modular Data Centres

    Data centre systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerised, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology...

    Sponsored By APC by Schneider Electric

  • Downloads // Jan 2014

    Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

    Sponsored By SolarWinds

  • White Papers // Jan 2014

    IDEAS International Seeding Clouds on Power Systems with IBM SmartCloud Entry

    Many organizations are genuinely excited about the potential for private clouds, anticipating greater responsiveness for end users and reduced costs for administrators. However, they are also concerned with the risk of taking on added complexity as they make the transition to cloud computing, which by definition introduces new management processes...

    Sponsored By IBM

  • White Papers // Jan 2014

    Edison Group - The Business and Economic Advantages of SmartCloud Entry for Power Systems

    Companies worldwide are embracing private clouds, not only because they support new, highly efficient and secure data solutions, but also to drive new competitive organizational strategies. This white paper provides an assessment of the business value of implementing IBM SmartCloud Entry for Power Systems versus comparable private cloud solutions from...

    Sponsored By IBM

  • Podcasts // Jan 2014

    IBM SmartCloud Entry for Power Systems

    The IBM SmartCloud™ Entry on Power Systems™ solution provides a cost-competitive, entry-level private cloud solution that helps speed time to value of your service deployments on your IBM Power Systems servers.

    Sponsored By IBM

  • White Papers // Jan 2014

    IBM PowerVM Virtualization Technology on IBM POWER7 Systems

    Consolidating data center servers through virtualization is integral to successful IT systems design. Read the white paper and see how IBM PowerVM on POWER7 offers higher ratios of server virtualization than VMware on comparable Intel x86 platforms. This enables superior performance, greater operational savings and improved efficiency.

    Sponsored By IBM

  • Analyst Briefings // Dec 2013

    NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800

    Learn how IBM performed in the latest NSS Labs testing, exploring the security effectiveness and performance characteristics of the GX7800 intrusion prevention appliance. This analyst paper covers: - How IBM achieved an exploit block rate of 95.7% - Ratings for stability/reliability and evasion - Performance ratings based on "real-world" scenarios

    Sponsored By IBM

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Nov 2013

    Business Value of Managed Services

    Businesses around the world are looking for ways to innovate, improve customer relationships and drive down costs. But it can be challenging to find the right people and resources to support those corporate initiatives. Managed services from IBM can help

    Sponsored By IBM

  • White Papers // Nov 2013

    The Essential Guide to IT Transformation

    Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.

    Sponsored By ServiceNow

  • White Papers // Nov 2013

    Consolidation: The Foundation for IT Business Transformation

    This white paper explores how to consolidate legacy, redundant IT services and shows how consolidation can accelerate growth while cutting costs and reducing complexities and enhance competitiveness.

    Sponsored By ServiceNow

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • White Papers // Oct 2013

    Top Ten Criteria for Selecting a Managed Services Provider

    When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how...

    Sponsored By IBM

  • White Papers // Oct 2013

    Consolidation: The Foundation for IT and Business Transformation

    Your enterprise needs the ability to identify all duplicative or outmoded IT and business applications, services, and other resources, and then to consolidate those worth keeping, migrate those worth updating, retiring the rest. With the right practices, policies, and technology platform, your enterprise can accomplish these goals in ways that...

    Sponsored By ServiceNow

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value

    Decision makers at many organizations question the investments made in IT. This is often because they don't fully understand the value delivered by IT service management (ITSM) or by compliance with recommended best practices such as those defined by the IT Infrastructure Library or ITIL®. This often pressures CIOs to...

    Sponsored By ServiceNow

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value with Service Catalogue

    Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.

    Sponsored By ServiceNow

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper...

    Sponsored By Symantec

  • White Papers // Aug 2013

    EMC IT - Leading The Transformation

    After enduring several years of global economic uncertainty, organizations large and small are beginning to increase IT spending. The pressures, although by no means gone, have begun to recede. ESG research indicates that for both enterprise and midmarket organizations, just reducing costs-while still important-is no longer the top priority. This...

    Sponsored By EMC

  • White Papers // Aug 2013

    EMC IT - Leading the Transformation

    After enduring several years of global economic uncertainty, organizations large and small are beginning to increase IT spending. The pressures, although by no means gone, have begun to recede. ESG research indicates that for both enterprise and midmarket organizations, just reducing costs hile still important is no longer the top...

    Sponsored By EMC

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Apr 2013

    Algorithmics and IBM Platform Computing Solution for Financial Markets

    IBM Platform Computing is a proven technology with a more advanced and capable computing infrastructure to cost effectively scale up and optimize computing capacity for risk management applications, such as those from Algorithmics.

    Sponsored By IBM

  • White Papers // Mar 2013

    SPSS Stastics White Paper: The Risk of Using Spreadsheets for Statistical Analysis

    While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they’re not designed to perform, or for a task beyond the limit of their capabilities, using spreadsheets can be risky. Read this paper to learn about more powerful yet...

    Sponsored By IBM

  • White Papers // Feb 2013

    Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

    Sponsored By IBM

  • White Papers // Feb 2013

    Avoiding Insider Threats to Enterprise Security

    IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling...

    Sponsored By IBM

  • White Papers // Feb 2013

    Get Actionable Insight with Security Intelligence for Mainframe Environments

    IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.

    Sponsored By IBM

  • White Papers // Feb 2013

    Transitioning Business Continuity To The Cloud

    In the past, server, storage and data center redundancy were the only options that met corporate resilience objectives. Read this white paper to gain an understanding of the resiliency challenges facing organizations today and how you can transition to cloud-based resiliency.

    Sponsored By IBM

  • White Papers // Jul 2011

    How Data Center Infrastructure Management Software Improves Planning and Cuts Operational Costs

    Business executives are challenging their IT staffs to convert data centers from cost centers into producers of business value. Data centers can make a significant impact to the bottom line by enabling the business to respond more quickly to market demands. This paper demonstrates, through a series of examples, how...

    Sponsored By APC by Schneider Electric

  • Downloads // Mar 2015

    Find, Analyze and Resolve Your Toughest Performance Issues on SQL Server -- FAST

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Provided By SolarWinds

  • Webcasts // Feb 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • White Papers // Feb 2015

    Data Mobility and Control Can a CIO have Both?

    Whether they are travelling across town or across the globe, today’s tech-savvy employees increase their productivity and connectedness with numerous personal devices. The potential for collaboration through these devices is so great that employees often solve their file sharing needs through publicly available cloud storage services. This is a practice...

    Provided By Hitachi Data Systems

  • Videos // Feb 2015

    The Next IT Evolution: Hitachi Mobility Platform

    This video provides an overview of the next IT infrastructure generation that will help you to access your data anywhere, any time and from any device. In this video Hitachi is explaining how you can securely share data, speed collaboration, and balance resources and costs between private and public clouds.

    Provided By Hitachi Data Systems

  • White Papers // Feb 2015

    A Road Map to Content Mobility

    Data security is getting more complicated. Compliance is touching more and more data. Too much data is stored solely on user devices. You need data in the right place at the right time, with the visibility and control to ensure that it’s handled appropriately. This roadmap will help you choose...

    Provided By Hitachi Data Systems

  • White Papers // Feb 2015

    Choose the Most Secure Object Storage for Your Hybrid Cloud

    Data mobility is changing the way that businesses work. Organizations, lines of business, and even individual users can run applications, store data cheaply, and access content from anywhere. This puts IT in a tough position. What they need is a new approach for storing and accessing data: one where the...

    Provided By Hitachi Data Systems

  • White Papers // Feb 2015

    An Energy-Efficient 64-Bit Prefix Adder Based on Semidynamic and Bypassing Structures

    An energy-efficient 64-bit prefix adder is proposed for micro-server processors based on both semi-dynamic and bypassing structures. Prefix adders consist of three main stages i.e. Propagate-Generate (PG) stage, Carry Merge (CM) tree, and sum generators. In this architecture, the PG and CM stages consume most of the power because these...

    Provided By Chungnam National University

  • White Papers // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

    Provided By IBM

  • Research // Mar 2015

    Cisco Annual Security Report 2015

    Despite advances by the security industry, criminals continue to evolve their approaches to break through security defenses. New threat intelligence and trend analysis in the Cisco 2015 Annual Security Report show that attackers are realizing that bigger and bolder are not always better. Understand how attackers are using gaps between...

    Sponsored By Cisco Systems

  • White Papers // Aug 2014

    Unified Communications Buyers Guide: The Top Ten Requirements for a UC Solution

    This document offers an overview of the current top ten requirements to consider for a premise-based UC solution, with features called out as well as a ShoreTel case study.

    Sponsored By ShoreTel

  • Research // Mar 2015

    Frost Industry Quotient - Asia- Pacific Network Firewall Vendors 2014

    A new paradigm shift in IT security is starting to emerge as enterprises begin to accept the possibility that their organizations may be breached, even after they have invested significantly in security technologies to prevent such incidents from happening. As a result, more enterprises are looking beyond a preventive approach,...

    Sponsored By Cisco Systems

  • White Papers // Mar 2015

    Continuous Endpoint Threat Detection and Response in a Point-in-Time World

    The only way to defeat today’s security threats is to address them holistically across the full attack continuum - before, during, and after an attack. Cisco’s approach of continuous endpoint analysis in combination with a big data architecture is foundational to this model. Our innovations in advanced malware protection include:...

    Sponsored By Cisco Systems

  • White Papers // Mar 2015

    IDC Brief - Assessing the Business Value of the Secured Datacenter

    With recent high-profile breaches at some of the largest retailers and financial institutions worldwide, there has been an increase in awareness, rising to the executive and even board levels. This IDC Brief explores the shift to "3rd Platform" era which is built on a foundation of mobile, social, Big Data,...

    Sponsored By Cisco Systems

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Sponsored By Symantec

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value

    Decision makers at many organizations question the investments made in IT. This is often because they don't fully understand the value delivered by IT service management (ITSM) or by compliance with recommended best practices such as those defined by the IT Infrastructure Library or ITIL®. This often pressures CIOs to...

    Sponsored By ServiceNow

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Encryption - Get you facts right

    In an era where cyber-attacks are growing and becoming increasingly sophisticated, it's not surprising to find that the number of data breaches has also grown exponentially. Regulatory requirements make encryption a necessity for many. Companies that need to comply with regulations such as PCIDSS or HIPAA must have an auditable...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Security - Get you facts right

    Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Download this report to learn how you can focus on your business without compromising security or performance with Symantec™ Endpoint Protection providing:...

    Sponsored By Symantec

  • White Papers // May 2014

    What's Behind a Cyberattack?

    IBM Security QRadar Incident Forensics provides a next-generation approach to security incident forensics that supports network security, insider threat analysis - including fraud and abuse - and the documentation of incident-related evidence.

    Sponsored By IBM

  • White Papers // Mar 2014

    Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security

    Big data has been big news in recent years. While organizations have, to date, been busy exploring and experimenting, they are now beginning to focus on using big data technologies to solve business problems.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Critical Capabilities for SIEM

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Feb 2015

    Win the Race Against Time to Stay Ahead of Cybercriminals

    IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

    Sponsored By IBM

  • White Papers // Feb 2014

    EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager

    This EMA report explores the values of the newest product of the QRadar platform, IBM Security QRadar Vulnerability Manager, the need for better integrated security architecture expressed by enterprises worldwide, and example use cases that highlight the value of the IBM approach. Download this analyst report to discover how...

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for SIEM

    "IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers' greatest...

    Sponsored By IBM

  • White Papers // Mar 2014

    Leverage Security Intelligence for Government Agencies

    IBM QRadar Security Intelligence Platform combines robust log management, security information and event management (SIEM) and risk management capabilities to help government organizations detect advanced cyber threats, exceed compliance mandates and prevent malicious insider activities.

    Sponsored By IBM

  • Downloads // Oct 2014

    Find the Root Cause of Your Toughest SQL Server Performance Issues in 4 Clicks!

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Sponsored By SolarWinds

  • Research // Nov 2014

    Busting Myths About Mobility

    Innovations in mobile computing have radically changed the way we interact. Now they’re changing the way we do business. While many companies still see mobile solutions as too costly, risky or hard to manage, organizations that see beyond these misconceptions gain access to tremendous possibilities across the enterprise. Dell found...

    Sponsored By Dell and Intel

  • White Papers // Nov 2014

    Enabling Devices & Device Management for your Mobility-BYOD Program

    Enterprise initiatives designed to facilitate mobile productivity can deliver important benefits to your organization and your employees. To maximize mobile productivity, your employees need the right devices - devices that not only match employee preferences but also meet both business and IT requirements. This paper suggests best practices for selecting...

    Sponsored By Dell and Intel

  • Downloads // Jan 2014

    Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

    Sponsored By SolarWinds

  • Downloads // Apr 2014

    Easy-to-Use & Affordable Remote IT Administration & Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

    Sponsored By SolarWinds

  • Downloads // Aug 2014

    Secure FTP Server Software for Managed File Transfer & File Sharing - Extremely Affordable & Easy-to-Use

    Serv-U® Managed File Transfer (MFT) Server from SolarWinds® is an easy-to-use FTP server software that delivers security, automation, and centralized control for file transfers in your organization. Deployed within your datacenter, Serv-U MFT Server allows you to securely transfer and share files with your business partners. Serv-U MFT Server supports...

    Sponsored By SolarWinds

  • White Papers // Nov 2013

    The Essential Guide to IT Transformation

    Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.

    Sponsored By ServiceNow

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value with Service Catalogue

    Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.

    Sponsored By ServiceNow

  • White Papers // Nov 2013

    Consolidation: The Foundation for IT Business Transformation

    This white paper explores how to consolidate legacy, redundant IT services and shows how consolidation can accelerate growth while cutting costs and reducing complexities and enhance competitiveness.

    Sponsored By ServiceNow

  • White Papers // Mar 2015

    Dense computing–Considering convergence

    Consolidating physical servers within a shared framework provides many benefits: A significant reduction in cabling for power distribution and networking Cooling can be consolidated as well to provide better efficiency at the rack and also increasing the efficiency of CRAC air units Systems management is streamlined to provide easier monitoring...

    Sponsored By Dell and Intel®

  • White Papers // Mar 2015

    IDC: Server Innovations

    More and more organisations are choosing to work with vendors investing in solutions that can process, support and manage mission-critical workloads for cloud solutions, mobility capabilities, and data analytics initiatives in today's data centres. This IDC whitepaper will outline how Dell and its partners are able to partners are able...

    Sponsored By Dell and Intel®

  • White Papers // Jun 2014

    Fundamentals of Managing the Data Center Life Cycle for Owners

    Just as good genes do not guarantee health and well-being, a good design alone does not ensure a data center is well-built and will remain efficient and available over the course of its life span. For each phase of the data center’s life cycle, proper care and action must be...

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2011

    How Data Center Infrastructure Management Software Improves Planning and Cuts Operational Costs

    Business executives are challenging their IT staffs to convert data centers from cost centers into producers of business value. Data centers can make a significant impact to the bottom line by enabling the business to respond more quickly to market demands. This paper demonstrates, through a series of examples, how...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2015

    HP ArcSight Logger: Unify collection, storage, & analysis of logs for security and compliance

    With HP ArcSight Logger you can improve everything from compliance and risk management to security intelligence to IT operations to efforts that prevent insider and advanced persistent threats. This universal log management solution collects machine data from any log-generating source and unifies the data for searching, indexing, reporting, analysis, and...

    Sponsored By Avnet

  • White Papers // Apr 2015

    Playbook: HP Logger for Security Compliance and Operations Management

    Uncover and develop new prospects for log management solutions that support Security, Compliance, Operations, and Application development teams. Read more and see how HP Logger solves the problem of log management and value-add versus competitors.

    Sponsored By Avnet

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Provided By Global Knowledge

  • White Papers // Aug 2014

    12 Essential Tasks of Active Directory Domain Services

    Discover the 12 major tasks of Active Directory Domain Services (AD DS) administration and management, and how delegation can be an excellent way for administrators to reduce the their workload and streamline management of their AD DS infrastructures. Read the white paper and learn how the implementation of proper...

    Provided By Dell Software

  • White Papers // Sep 2014

    The Forrester Wave Private Cloud Solutions

    Enterprises look to private clouds for more than just virtual infrastructure provisioning. Private cloud vendors have started to bundle additional capabilities into their solutions, including pervasive VM management capabilities, design tools for complex application templates, and service catalogs. HP is the sponsor of this material. By submitting your information...

    Provided By Hewlett-Packard (HP)

  • White Papers // Nov 2014

    IDC Converged and Integrated Datacenter Systems:Creating Operational Efficiencies

    STRUGGLING WITH THE COMPLEXITY OF LEGACY IT? Download this IDC report to learn how your organization can benefit from converged infrastructure. IT has moved away from siloed servers, storage, data, and processes and is embracing converged, virtualized technologies. This IDC Insight report examines the benefits of converged infrastructure...

    Provided By Nutanix

  • Downloads // Jul 2004

    Microsoft Access Help Desk Database

    Use this sample Microsoft Access Help Desk database as a simple substitute for commercial help desk software. It provides pertinent customer information with tabs to track call details as well as create reports.

    Provided By TechRepublic

  • White Papers // Nov 2014

    VDI Solutions Guide

    The IT industry has been abuzz over the past several years promoting the idea of VDI: virtualizing and centralizing desktops to enable IT to deliver a more secure, manageable, less costly, and ultimately more mature end-user computing model. In fact, IT departments are finding that with the right investments in...

    Provided By Pure Storage

  • Downloads // Dec 2005

    10 common SQL Server problems and solutions

    This list outlines 10 common SQL Server problems and solutions. This handy two-page list outlines 10 familiar SQL Server problems and an assortment of solutions. From "Out of Space" errors to a database going suspect, this list is great quick reference for every SQL administrator.Here's a sample:Number 1: Users...

    Provided By TechRepublic

  • Downloads // Feb 2005

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic