IT Policies

  • White Papers // Jun 2014

    HP Info Brief for SMEs: Operations Orchestration

    Enterprise-scale IT automation with a disciplined approach This report explores the benefits of IT process automation that supports entire IT environment from traditional IT to cloud-based infrastructure operations. Read this info brief and learn how HP helped organisations reduced operational cost and improved service quality .

    Provided By HP US

  • White Papers // Jun 2009

    A Conceptual Framework for the Integration of IT Infrastructure Management, IT Service Management and IT Governance

    The definition and use of standardized IT Management techniques and processes provide the basis for IT Service Management and IT Governance. With the establishment of de facto standard "Best Practice" reference and process models such as the IT Infrastructure Library (ITIL) or Control Objectives for IT and related Technologies (CobiT),...

    Provided By University of Applied Sciences

  • White Papers // Nov 2012

    Improving Mobile Device Security and Management with Active Directory

    As more and more workers bring personal devices to work for increased productivity and mobile access organizations must quickly respond to the security and compliance risks posed by largely unmanaged access to corporate information. Enterprises can expect to see tablet sales alone increase by 250% in 2012, primarily iPads, which...

    Provided By Centrify

  • White Papers // Oct 2013

    Know What Customers Want Before They Do

    Webcast Summary: Today’s consumers and B2B companies only want interactions that are relevant, personalized, and based on a customer’s situation and preferences. Companies that fail to provide relevant offers will be left behind.

    Provided By Oracle

  • White Papers // May 2014

    Tyco Integrated Security: How Secure is Your Business Infographic

    This valuable infographic shows the top seven External Threats to a business, the top three internal threats to a business and the top three concerns for management when considering a business security solution. This infographic helps assess the potential threats in a working environment and reduce the potential risks. This...

    Provided By Tyco

  • White Papers // Apr 2010

    A VB.NET Utility to Transfer Multiple Data Files Between SAS and Microsoft Access/Excel by Automatically Generating SAS Import/Export Statements

    A VB.NET utility was developed to automate the process of converting data files between SAS and Microsoft Access or Microsoft Excel using point-and-click in the Windows environment. It saves time and avoids mistakes by automatically generating SAS import/export statements. This utility illustrates an easier and faster production application development in...

    Provided By SAS Institute

  • Downloads // Sep 2006

    Software-as-a-Service; A Comprehensive Look at the Total Cost of Ownership of Software Applications

    Gartner estimates that the annual cost to own and manage traditional "on-premise" software applications can be up to four times the initial purchase price. This is due to a company's need to acquire and maintain the resources needed to support a large scale in-house software deployment; including: hardware, software upgrades...

    Provided By Business Objects

  • White Papers // Mar 2014

    The Value of Social Data

    Social media provides a wealth of data that can tell you a lot about your brand and your consumers - providing you can effectively act upon that data. According to Digiday, ""48% of digital marketing executives say they focus 'relentlessly' on building customer insights, yet few are executing those strategies...

    Provided By Oracle

  • White Papers // Jun 2009

    New Features in Oracle Forms Server 11g

    This white paper outlines the new features in Oracle Forms version 11.1.1. Use it to gain an understanding of what new features there are and how to use them: External Events, JavaScript, Proxy User Support, New Enterprise Manager User interface and functionality, Events in Pluggable Java Components, Tracing improvements, Oracle...

    Provided By Oracle

  • White Papers // Oct 2008

    Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-Based Single Sign-on for Google Apps

    Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by different companies. The OASIS Security Assertion Markup Language (SAML) 2.0 Web Browser SSO Profile is the emerging standard in this context. This...

    Provided By Association for Computing Machinery

  • Tools & Templates // Aug 2002

    Sample project proposal template

    Being able to quickly explain the potential benefits of an added Web site feature can help a consultant address a client's concerns over a project's importance. This project proposal sheet will help persuade your clients to take the plunge.

    Provided By TechRepublic

  • Downloads // Feb 2006

    Avoid support headaches with this program rollout checklist

    Rolling out a new application can introduce chaos among users and support staff if the process isn't handled in an organized way. This comprehensive checklist will help you gather the information you need to manage the rollout and minimize support overhead. A poorly planned rollout of a new application...

    Provided By TechRepublic

  • Downloads // Jan 2006

    Create Active Directory users and Exchange mailboxes from a CSV file with VBScript

    This VBScript will create Active Directory users and Exchange accounts from a CSV file. Creating users and Exchange accounts can be tedious, especially when user information already resides in your company's HR system. Instead of manually creating an Active Directory user and Exchange account, you can use a script...

    Provided By TechRepublic

  • Downloads // Jun 2005

    Educate your users about e-mail safety with this PowerPoint presentation

    While e-mail has become a mission-critical business application, it has also become a vehicle for scams and viruses. One of the most important aspects of e-mail security is user education. This PowerPoint presentation by Joshua Hoskins entitled "Practice e-mail safety" provides IT professionals with a slide show that they can...

    Provided By TechRepublic

  • Downloads // Sep 2000

    Track turnover in your organization with an employee separation checklist

    Keep track of employee turnover in your organization with a customizable checklist. Turnover is a fact of life in the corporate environment. Keeping tabs on the flow can be simplified with a tools designed for that purpose. The TechRepublic Employee Separation Checklist, available in this free download, can help...

    Provided By TechRepublic

  • Tools & Templates // Nov 2008

    Automated invoice template

    If you're looking for a convenient, no-frills way to generate invoices, this template may be just what you need. It prompts for client information, includes a table for listing charges, and calculates taxes and totals for you.For instructions on how to create your own Word invoice template (and how to...

    Provided By TechRepublic

  • Case Studies // Jan 2009

    Credit Suisse Group Uses Entrust Technology to Secure Desktop Applications

    Credit Suisse Group is a leading global financial services company headquartered in Switzerland. Credit Suisse Group needed security capabilities that would provide an effective means of authenticating users and ensuring accountability and confidentiality. Credit Suisse Group's main focus when choosing the Entrust solution was to achieve more effective authentication of...

    Provided By Entrust

  • White Papers // Sep 2010

    Optimizing FTP File Transfers With BIG-IP WAN Optimization Module

    File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over a TCP/IP-based network, such as the Internet. FTP is built on client-server architecture and utilizes separate control and data connections between the client and server applications. FTP can be used with user-based password authentication...

    Provided By F5 Networks

  • White Papers // Aug 2012

    Backup and Recovery Changes Drive IT Infrastructure and Business Transformation

    This IDC Whitepaper provides an over view of the forces driving change within today's IT organizations and data centers and discusses how backup and recovery can enable or hinder broader IT infrastructure and business transformation.

    Provided By EMC

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.

    Provided By IBM

  • Presentations // Jun 2014

    WebEx Viewpoints: Collaboration in the Workplace

    Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Viewpoints: Training

    WebEx allows companies to train employees effectively, anytime and anywhere. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • White Papers // Feb 2014

    FTP Risk Advisor Tool

    By answering 12 questions, this online tool will provide you with a customized report with recommendations to remediate your FTP risk.

    Provided By IBM

  • White Papers // Dec 2005

    Gartner's Magic Quadrant for Product Information Management

    This report is a must-read if you're an IT strategist who's currently evaluating product information management (PIM) technologies. It explains why the as-yet-immature PIM market is evolving quickly and presents Gartner's Magic Quadrant for this emerging tech sector. There are a variety of differences that separate the companies Gartner classifies...

    Provided By IBM

  • White Papers // Jun 2012

    Storage system comparison: IBM Storwize V7000 vs. EMC VNX5500

    Organisations must continue to deal with growing data storage requirements, while doing more with less. The growing adoption of storage-as-a-service, business intelligence, and big data results in ever more service-level agreements (SLA) that are difficult to fulfil without IT administrators spending longer hours in the datacentre. This Edison research paper...

    Provided By IBM

  • Tools & Templates // Aug 2011

    Systems Optimization Self Assessment

    Improve efficiency and utilization of IT resources. driving out cost and improving service delivery. Take 5 minutes to use this Systems Optimization self assessment.

    Provided By IBM

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Jun 2014

    Meeting Workforce Demands

    Gain access to this new white paper by CIO which examines the changing landscape of end-user computing. The research reveals how today's CIOs are tackling trends and establishing new best practices for the mobile-cloud era. Read more...

    Provided By VMware

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • Tools & Templates // Nov 2007

    Intranet Policy

    The Intranet policy states that all information on the intranet is the company's property; all employees who use the intranet are required to follow this policy, all other relevant company policies (e.g., harassment, nonsolicitation, and respect for dignity), and all applicable laws (e.g., copyright, discrimination). Employees assume all responsibility for...

    Provided By Business & Legal Reports

  • White Papers // Jan 2014

    Best Practices in Lifecycle Management

    Comparing Suites from Dell, LANDesk, Microsoft and Symantec. An Enterprise Management Associates (EMA) White Paper. IT system lifecycle management includes a broad array of essential and complex processes for ensuring optimal reliability and performance of technology investments. Critical to enabling these management disciplines are automated solutions that simplify and standardize...

    Provided By Dell Software

  • eBooks // Mar 2014

    How to Create a Customer Service Process that Enhances Your Bottom Line

    A complaint about complaints. There’s an assumption that the number of complaints received is a perfect reflection of the number of customer problems. If complaints go down, other numbers such as warranty and service costs will go down as well. In fact, complaints are often a poor indicator of...

    Provided By

  • White Papers // Jun 2010

    Why CFO And COO Roles Are Becoming More Cross-Functional

    After the most recent economic downpour, the new operational river running through the executive suite is dissolving the walls between the chief financial officer and chief operating officer offices. Today's successful CFOs must have a strong operational focus. Today's successful COOs must have a strong competency with numbers. And more...

    Provided By Bank of America

  • White Papers // Mar 2011

    Using Six Sigma to Improve IT Help Desk Customer Service

    Within most organizations, the Information Technology (IT) department typically provides the infrastructure, implementation, and administration of hardware, software, networking, and database management. Unfortunately, employees using these systems sometimes encounter problems that hinder the daily productivity of the organization. When such problems occur, it interrupts the flow of work, thereby causing...

    Provided By University of Houston

  • White Papers // Feb 2009

    ITIL: Theory Into Practice

    It is testimony to the complexity of today's technology systems that even one of the most widely-used frameworks for simplifying and standardizing IT management is, in itself, a daunting piece of work. Implementing the IT Infrastructure Library (ITIL) set of guidelines to aid the implementation of a lifecycle framework for...

    Provided By Avocent

  • White Papers // Feb 2014

    Forrester Study - Total Economic Impact of Google Apps

    For companies considering switching to Google Apps from a traditional, on-premise environment for messaging and collaboration, this Forrester Study shows that Google Apps can reduce IT costs while offering even greater gains in employee productivity. Download this quick synopsis to find out more.

    Provided By Google

  • White Papers // Jul 2012

    Frequent Pattern Mining in Social Network Data (Facebook Application Data)

    Data Mining is a process, which involves identification of useful patterns and gathers knowledge which was hidden earlier. It involves various processes of which classification, association rule mining and clustering gain major attention. One of the emerging application areas of Data Mining is Social Networks. In this paper, the authors...

    Provided By EuroJournals

  • Presentations // Apr 2014

    Meg Whitman presents Unlocking IT with Big Data

    Today, the industry is at an inflection point - driven by a triple storm of Big Data, cloud, and mobility; and in this new environment, security is paramount. The New Style of IT is about how businesses and IT leverage this rapid change for enterprise growth. During this Web Event...

    Provided By Hewlett Packard

  • White Papers // Apr 2014

    Embedding BI Into Your Software Solution — Best Practices

    More and more software companies are considering the addition of an analytics module to their product suite. This strategy has compelling business value—analytics can add 20% to 30% of top line revenue to your organization’s top line. This represents your organization’s best opportunity to add revenue and profit for both...

    Provided By Birst

  • White Papers // May 2014

    The Complete Guide to Disaster Recovery Planning

    This comprehensive guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business. It was designed to serve as a primer in disaster management and preparation.

    Provided By Macquarie Telecom Australia