IT Policies

Creating a reliable business requires strong business strategy; find out the latest products and recommendations from industry experts.

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value

    Decision makers at many organizations question the investments made in IT. This is often because they don't fully understand the value delivered by IT service management (ITSM) or by compliance with recommended best practices such as those defined by the IT Infrastructure Library or ITIL®. This often pressures CIOs to...

    Sponsored By ServiceNow

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value with Service Catalogue

    Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.

    Sponsored By ServiceNow

  • White Papers // Oct 2013

    How TCO Benefits Make Cloud Computing a No-Brainer for Many SMBs and Mid-Market Enterprises

    Read this white paper to learn how a detailed total cost of ownership (TCO) evaluation shows cloud-based solutions can deliver significant savings compared to on-premises business applications. Cloud computing eliminates the need for individual companies to buy, deploy and maintain IT infrastructure or application software. Cloud computing results in substantial...

    Sponsored By NetSuite

  • White Papers // Aug 2013

    EMC IT - Leading The Transformation

    After enduring several years of global economic uncertainty, organizations large and small are beginning to increase IT spending. The pressures, although by no means gone, have begun to recede. ESG research indicates that for both enterprise and midmarket organizations, just reducing costs-while still important-is no longer the top priority. This...

    Sponsored By EMC

  • White Papers // Aug 2013

    EMC IT - Leading the Transformation

    After enduring several years of global economic uncertainty, organizations large and small are beginning to increase IT spending. The pressures, although by no means gone, have begun to recede. ESG research indicates that for both enterprise and midmarket organizations, just reducing costs hile still important is no longer the top...

    Sponsored By EMC

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere Big Insights technologies helping organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution allows security analysts to extend their analysis well beyond typical security data using real-time...

    Sponsored By IBM

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

    Provided By IBM

  • Research // Dec 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Provided By F5

  • White Papers // Dec 2014

    Flexible Work Arrangements and Employee Retention in IT Sector

    Traditional ways of working is evaporating due to advanced technologies, new societal values, changing demographics, and rapid globalization. This new phenomenon has put forth new challenges as well as opportunities before the organizations. In order to survive and accomplish goals, organizations required to induce new policies of work system that...

    Provided By Creative Commons

  • White Papers // Nov 2014

    IDC Report: Innovative ICT Empower a Better Connected Smartgrid

    In this IDC Energy Insights Report sponsored by Huawei Technologies Co. Ltd. it lays out the electric global power industry business drivers for information and communication technology (ICT). It explores the innovative ICT technologies IDC includes in its Third Platform model along with the trends in utility use. It also...

    Provided By Huawei

  • Case Studies // Nov 2014

    Samsung Printing Efficiencies - Ipswich Hospital NHS Trust Case Study

    It's easy in any large organisation for printers and consumables to end up being bought on an ad hoc basis. This piecemeal approach not only costs more, it is time consuming. This is what happened to the Ipswich Hospital NHS Trust. Learn how Samsung printing solutions assisted the Ipswich...

    Provided By Samsung

  • White Papers // Nov 2014

    How Mature is Your Cyber-Security Risk Management?

    A security framework is a step-by-step approach to helping an organization move from meeting its basic security requirements to providing a fully security-optimized environment. Five types of frameworks address progressive steps in security maturity as needs and capabilities change.

    Provided By IBM

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Provided By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • eBooks // Oct 2014

    Make remote vendor access more secure. Free ObserveIT eBook

    The threat of user-based attacks has never been higher, with 76% of all breaches coming from accounts with access to sensitive data. With the exploitation of remote vendor access a huge concern, learn how to make working with your contractors more secure with this free e-Book from ObserveIT.

    Provided By ObserveIT

  • White Papers // Oct 2014

    Identity as a Revenue Generator: Getting started with customer focused Identity Management

    Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether...

    Provided By ForgeRock

  • White Papers // Oct 2014

    Cloud Migration Guide

    The cloud is unchartered territory for many organisations. Yes, there are a number of really important benefits to cloud computing - no matter how big or small your business is. But cloud migration can still feel daunting. A smooth move to the cloud is all about planning. Here’s...

    Provided By IT Lab

  • White Papers // Oct 2014

    Best Practices in Intelligent Search in the Age of Big Data

    Learn how you can easily provide real-time access to unified content from multiple sources and deliver new insights to improve decision making and productivity. You will also learn how you can tap into your enterprise social network, with social graphing, to identify internal knowledge experts and facilitate enterprise collaboration. Learn...

    Provided By HP

  • eBooks // Oct 2014

    Secure Your Data: Visibility for Your Business User

    Download this eBook to learn how outperforming organizations are integrating processes across multiple platforms, mobile devices, applications, and IT infrastructures, and get best practices to help you develop your own innovative approach to managed file transfer.

    Provided By IBM

  • eBooks // Oct 2014

    From Chaos to Control: Creating a Mature File Transfer Process

    Read this ebook from Aberdeen to learn why leading organizations are moving away from the chaos of multiple methods to a single managed file transfer platform, and get best practices for developing a secure, best-in-class file transfer process of your own.

    Provided By IBM

  • eBooks // Oct 2014

    Seeing Managed File Transfer as Strategic: Business Users Need Full Visibility

    Read this e-book to find out how you can create your own innovative approach to managed file transfer—one that ensures reliable, convenient and secure file transfers across every business process.

    Provided By IBM

  • Tools & Templates // Oct 2014

    MFT Maturity Assessment Tool

    Complete this quick assessment and receive a report that benchmarks your organizations current practices against those of Best-in-Class companies.

    Provided By IBM

  • eBooks // Oct 2014

    Enterprise File Synch & Share eBook

    Read this ebook from the Aberdeen Group to see highlights of the latest research on file synch / file share solutions to support personal productivity and collaboration.

    Provided By IBM

  • White Papers // Oct 2014

    Gartner Multi-Channel Campaign Mangement Magic Quadrant

    Multichannel campaigns must perform better than ever to engage today's customers. Read this report by Gartner to learn about the strengths and weaknesses of providers and how they're adapting to these new demands where IBM is cited as a leader in Gartner's 2014 Magic Quadrant for Multi-Channel Campaign Management. You’ll...

    Provided By IBM

  • White Papers // Oct 2014

    DBAs: Control the Cloud

    DBAs know that staying vital in their profession means working with, and in, the cloud. In this new white paper, see how DBAs can avoid “database isolation management,” and how a broad perspective gives DBAs control over any database environment . Get this paper today.

    Provided By Dell Software

  • White Papers // Oct 2014

    Meeting Workforce Demands: Why—and How—IT Should Modernize End-User Computing

    IT departments face unprecedented challenges in keeping both IT and end-users efficient and productive. This paper discusses top trends and how today’s most successful CIOs are taking a more holistic viewpoint towards the new end-user computing landscape. Here they share their best practices for maximizing agility, meeting end user demands...

    Provided By VMware

  • White Papers // Oct 2014

    A Proposal for a Method to Translate MAP Model Into BPMN Process Diagram

    In this paper, the authors present a method to bridge the gap between intentional process modeling and business process modeling. The first represent the business objectives of an enterprise and the strategies used in order to achieve these objectives, while the second concentrate on the business processes. The proposed method...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Accelerate Your Cloud Journey: HP Converged Cloud Architecture

    Enterprise IT needs a new approach to manage processes and applications that are distributed across a mix of environments. How do you make services immediately available, easy-to-use and accessible on mobile platforms while also preventing the IT bypass and unintended effects on the overall IT infrastructure? HP has a comprehensive...

    Provided By HP

  • White Papers // Sep 2014

    ForgeRock Open Identity Stack

    Identity and Access Management (IAM) services were traditionally built for a company's internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as...

    Provided By ForgeRock

  • White Papers // Sep 2014

    Improving Collaboration by Adding Social Capabilities to Email

    This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all...

    Provided By IBM

  • White Papers // Sep 2014

    Evolving Toward the Next Phase of Email

    According to most corporate decision makers and influencers, email is the single most important application they have deployed! The typical user spends two hours per day working in the corporate email system and sends or receives a median of 130 emails per day. Moreover, email is the primary method for:...

    Provided By IBM

  • White Papers // Sep 2014

    Ovum Report: New Versions of IBM Notes and Domino Show Microsoft the Way Forward

    Ovum's assessments of IBM's collaboration portfolio over the last four years have put IBM ahead of the field in terms of technical capability. Read how Ovum believes this momentum will translate to improved market leadership for IBM Notes and Domino as well.

    Provided By IBM

  • White Papers // Sep 2014

    Failover Strategies on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years, becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the capacity for two totally redundant failover paths for every...

    Provided By Global Knowledge

  • White Papers // Sep 2014

    Troubleshooting Fibre Channel Boot from SAN on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the implementation of stateless computing, which allows all the hardware...

    Provided By Global Knowledge

  • Webcasts // Sep 2014

    ZDNet APAC webinar: Business Intelligence on the move

    Join us for this LIVE event! Monday, 29 September at 3pm Australian Eastern Standard Time Business Intelligence used to be the domain of the experts, with small crews of data analysts controlling the flow of business insights. But a great democratisation is unfolding and not only is Business Intelligence being...

    Provided By ZDNet

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Provided By Centrify

  • White Papers // Sep 2014

    Downtime by DDoS: Taking an Integrated Multi-Layered Approach

    Companies who suffer an outage experience losses in revenue and productivity, face potential compliance and regulatory violations, and lower customer satisfaction. Increased duration or frequency of outages will ultimately affect the company brand. One of the leading reasons organizations experience network and application outages is from network/security issues like Distributed...

    Provided By Arbor Networks

  • White Papers // Sep 2014

    10 Essential Elements for a Secure Mobility Strategy

    With enhanced mobility and work flexibility comes increased information security risk. Explore the security implications and capabilities of the major mobile OS platforms and learn more about best practices to fortify security while supporting new levels of productivity.

    Provided By Citrix Online

  • White Papers // Sep 2014

    Managing the BlackBerry Transition

    The BlackBerry enterprise mobile solution always included a powerful management and security platform for its devices. As you transition to multiple mobile platforms, you face a host of security and management challenges Discover how to address those challenges with Citrix XenMobile.

    Provided By Citrix Online

  • Downloads // May 2014

    Find, Analyze & Resolve Your Toughest Performance Issues on SQL Server - FAST

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Sponsored By SolarWinds

  • White Papers // Mar 2015

    Zeroing In on the Right Devices

    Discover what you can do to stay ahead of the technological curve and ensure that your productivity can be matched by none. This report will analyse the latest in PC technology and how you and your employees can replace outdated systems with the best-of-the-best. Ultrabook, Celeron, Celeron Inside,...

    Sponsored By Dell and Intel®

  • White Papers // Mar 2015

    The Risk of “Free” Endpoint Security

    Everything in life comes at a price, even “free” endpoint protection. Every organisation has anti-virus/anti-malware solutions deployed, but how much have you actually reduced your risk? Read this insightful report by Aberdeen Group to understand the true risk of “free” endpoint protection.

    Sponsored By Intel Security

  • White Papers // Mar 2015

    Critical Factors to Endpoint Security

    The modern threatscape of today is very different from the one that existed even five years ago in that organized crime and government operatives are aggressively funding, organizing and building significant offensive capabilities all focused on generating revenue or gaining a competitive advantage in the global economy. “Crimeware” can be...

    Sponsored By Dell and Intel®

  • White Papers // Mar 2015

    Mobility: Going your way

    Constant connectivity is the new norm — causing a shift in worker expectations that may not align with enterprise requirements. An effective mobility strategy empowers users and improves business performance without compromising essential IT controls. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom...

    Sponsored By Dell and Intel®

  • White Papers // Mar 2015

    Transforming mobility management through a unified approach

    As the mobile workplace and the nature of business itself continue to evolve, IT teams must support a multiplicity of devices, operating systems and work habits. Dell Enterprise Mobility Management helps simplify administration and secure vital data. In this report you will learn how it is being done. ...

    Sponsored By Dell and Intel®

  • White Papers // Apr 2015

    HP ArcSight Logger: Unify collection, storage, & analysis of logs for security and compliance

    With HP ArcSight Logger you can improve everything from compliance and risk management to security intelligence to IT operations to efforts that prevent insider and advanced persistent threats. This universal log management solution collects machine data from any log-generating source and unifies the data for searching, indexing, reporting, analysis, and...

    Sponsored By Avnet

  • Downloads // Mar 2007

    Convert an XML file into an Excel spreadsheet with this technique

    Developers often deal with information that is in no way user-friendly without really thinking about how a user would handle it. XML is a prime example --- most users don't know what to make of it. One way to present XML information to a user is by converting...

    Provided By Edmond Woychowsky

  • White Papers // Feb 2014

    Anatomy of a Cyber-Attack

    As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

    Provided By Dell Software

  • White Papers // Jun 2014

    Fundamentals of the PKI Infrastructure

    Securing corporate information can be a challenge, considering the numerous technologies and platforms that need to be protected. One technology that definitely helps achieve secure data is public key infrastructure (PKI), which enhances the security of data by using advanced access methods and making sure the authenticity of the data...

    Provided By Global Knowledge

  • Downloads // Jul 2004

    Microsoft Access Help Desk Database

    Use this sample Microsoft Access Help Desk database as a simple substitute for commercial help desk software. It provides pertinent customer information with tabs to track call details as well as create reports.

    Provided By TechRepublic

  • Downloads // Feb 2005

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic

  • White Papers // Sep 2010

    University Reaches More Students Online, Spending Less

    Munich University is one of the largest institutions of its kind in Germany, with partner universities in Europe, North America, South America, and Asia, and 14,000 students. Some 11 percent of the students are located abroad. To better accommodate this international presence, the university chose Cisco WebEx™ Meeting Center to...

    Provided By Cisco Systems

  • Downloads // Jun 2006

    IP subnetting made easy

    IP subnetting is a fundamental subject that's critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it. After years of watching confused students struggle through school and in practice when dealing with subnetting, TechRepublic's George Ou created a simple, graphical approach that...

    Provided By George Ou

  • Downloads // Sep 2001

    Sample service level agreement for application support

    Consulting firms that provide support to their clients use service-level agreements to make sure both sides get what they need. This SLA template, updated in November 2003, can be used to hammer out what consultants will provide for their clients.

    Provided By TechRepublic

  • Tools & Templates // Jan 2006

    Build your own consulting contract using this sample form

    Both independent consultants and their clients benefit when they're working with a solid contract. Download this sample contract from TechRepublic member and IT consultant Randy Barger as a guide for preparing your next consulting agreement. E-mail makes it easy to assume a fairly informal relationship with your clients. But...

    Provided By TechRepublic

  • White Papers // Sep 2014

    Failover Strategies on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years, becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the capacity for two totally redundant failover paths for every...

    Provided By Global Knowledge

  • White Papers // Aug 2012

    The Importance of Managing Privileged Accounts

    Discover invaluable insights on the benefits of properly managing administrative privileges, developing a policy for managing privileged accounts and enforcing those policies. Could you be managing your privileged accounts better? Download the whitepaper today and find out.

    Provided By Dell Software

  • White Papers // Mar 2014

    Best Practices for recruiting the right talent

    This white paper examines best practices in recruiting and the technology behind those practices. It discusses how to reduce time to hire by up to 50 percent, reduce cost per hire by up to 70 percent, and improve recruiter efficiency in finding the right talent.

    Provided By Oracle

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • Downloads // Nov 2012

    ASP.NET developer interview cheat sheet

    This list of open-ended proficiency questions and answers will come in handy for hiring managers interviewing ASP.NET developer candidates -- and it will be a useful interview prep tool for the candidates themselves.

    Provided By Tony Patton

  • White Papers // Sep 2014

    Troubleshooting Fibre Channel Boot from SAN on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the implementation of stateless computing, which allows all the hardware...

    Provided By Global Knowledge

  • White Papers // Oct 2013

    Know What Your Customers Want Before They Do

    Webcast Summary: Today’s consumers and B2B companies only want interactions that are relevant, personalized, and based on a customer’s situation and preferences. Companies that fail to provide relevant offers will be left behind.

    Provided By Oracle

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • White Papers // Aug 2014

    Interactive Infographic: A Personal Training Guide for Your Journey to the Cloud

    Is your IT infrastructure healthy or is it struggling to meet the intensifying demands placed on it by today's evolving business environment?, are emerging trends in cloud computing, big data, mobility, and security making your IT organisation leaner, smarter and more agile, or is it making it obsolete, unresponsive, and...

    Provided By NetApp

  • Downloads // Feb 2006

    Avoid support headaches with this program rollout checklist

    Rolling out a new application can introduce chaos among users and support staff if the process isn't handled in an organized way. This comprehensive checklist will help you gather the information you need to manage the rollout and minimize support overhead. A poorly planned rollout of a new application...

    Provided By TechRepublic

  • White Papers // Jun 2006

    Forrester Best Practices: How IT Must Shape and Manage Demand

    Download the Forrester Research white paper, "How IT Must Shape and Manage Demand," to read about best practices in IT demand management, a critical IT governance process that: Aligns IT resources to optimize business value Influences and modifies end user behavior by providing meaningful information Enables a more complete...

    Provided By frontrange

  • White Papers // Jul 2011

    Balancing Profitability and Risk in Banking: Overcoming Common Risk Analysis and Reporting Challenges

    Banks need a robust enterprise risk analysis and reporting solution to improve reporting accuracy and efficiency while reducing the costs and burdens of compliance. This paper will focus on the many risk reporting challenges facing banks. It will then outline the best practices banks need to improve reporting and manage...

    Provided By SAP

  • White Papers // Jul 2008

    Application Retirement: Road Map for Legacy Applications

    As technology becomes obsolete and organizations deploy new applications, many enterprise applications wind up outliving their usefulness and become known as a "Legacy application". Every organization needs to be actively looking at their IT portfolios for applications, systems, and platforms that cost them more to maintain than the value they...

    Provided By Solix Technologies

  • White Papers // Jun 2005

    Problem Management - Key Best Practices

    The ITIL framework supplies an excellent relational model on how to manage Incidents, Problems and Changes. But this model becomes much more powerful when best practices are applied; such as planning and documenting Roles and Responsibilities, proper Operational Metrics and defined processes for Knowledge Management, Root Cause Analysis, ROI Calculation...

    Provided By NetworkD

  • Downloads // Oct 2009

    100 keyboard shortcuts for moving faster in Windows 7

    You don't have to experiment to find out which traditional shortcuts still work in Windows 7 -- or search for ones that have been added to the new OS. Just refer to this quick reference to speed common Windows 7 tasks.

    Provided By Greg Shultz

  • White Papers // Jun 2014

    Improve your Unified Communications ROI

    IT decision makers concentrate hard on vintegrating real-time tools like instant messaging and voice and video conferencing with voicemail, email and text messages, they neglect the emotional and informational needs of the end user. The result? Your company has made a significant investment on a flawless UC platform and cutting...

    Provided By Plantronics

  • White Papers // Feb 2014

    Research - Google Apps ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled “Cloud Business Email - Market Quadrant 2013”, the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati’s findings can be downloaded here. Download this quick...

    Provided By Google

  • White Papers // May 2014

    Workflow, Governance and Reporting – Solvency II

    Insights into addressing the challenges of Solvency II Pillars 2 and 3 from leading European insurers.

    Provided By IBM

  • White Papers // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

    Provided By IBM

  • White Papers // Mar 2014

    The Value of Social Data

    Social media provides a wealth of data that can tell you a lot about your brand and your consumers - providing you can effectively act upon that data. According to Digiday, ""48% of digital marketing executives say they focus 'relentlessly' on building customer insights, yet few are executing those strategies...

    Provided By Oracle

  • White Papers // Jun 2009

    New Features in Oracle Forms Server 11g

    This white paper outlines the new features in Oracle Forms version 11.1.1. Use it to gain an understanding of what new features there are and how to use them: External Events, JavaScript, Proxy User Support, New Enterprise Manager User interface and functionality, Events in Pluggable Java Components, Tracing improvements, Oracle...

    Provided By Oracle

  • White Papers // Oct 2008

    Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-Based Single Sign-on for Google Apps

    Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by different companies. The OASIS Security Assertion Markup Language (SAML) 2.0 Web Browser SSO Profile is the emerging standard in this context. This...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    A Conceptual Framework for the Integration of IT Infrastructure Management, IT Service Management and IT Governance

    The definition and use of standardized IT Management techniques and processes provide the basis for IT Service Management and IT Governance. With the establishment of de facto standard "Best Practice" reference and process models such as the IT Infrastructure Library (ITIL) or Control Objectives for IT and related Technologies (CobiT),...

    Provided By University of Applied Sciences

  • White Papers // Jun 2014

    Meeting Workforce Demands

    Gain access to this new white paper by CIO which examines the changing landscape of end-user computing. The research reveals how today's CIOs are tackling trends and establishing new best practices for the mobile-cloud era. Read more...

    Provided By VMware