IT Policies

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • Downloads // Feb 2005

    Create a site for e-commerce with PHP, MySQL, and PayPal

    This how-to article offers step-by-step instructions for adding e-commerce capabilities to your existing Web site using PHP, MySQL, and PayPal. The method outlined here lets you add e-business functionality to your corporate portal without a major allocation of scarce development resources.

    Provided By TechRepublic

  • White Papers // Jul 2011

    Fundamentals of SCSI and iSCSI

    SCSI (Small Computer Systems Interface), which is present in all personal, defines an initiator/target client/server relationship that includes addresses, commands, and specified operations. The SCSI model has numerous interfaces, including TCP/IP, fibre channel, directly attached parallel bus, and firewire. Fibre Channel and iSCSI are the two major choices for building...

    Provided By Global Knowledge

  • White Papers // May 2011

    SP1 for Windows 7 and Windows Server 2008 R2: What's New?

    This white paper examines the new features and updates in Service Pack 1 (SP1) for Windows 7 and SP1 for Windows Server 2008 R2, both of which were released on February 22, 2011. Although the two service packs are mostly independent of each other in updates and features, they do...

    Provided By Global Knowledge

  • Downloads // Apr 2010

    The 10 most useful Excel keyboard shortcuts

    Why complicate your spreadsheet life with a bunch of tricks you'll never use? These 10 shortcuts will expedite the Excel tasks you perform every day.This download is also available as an entry in our Microsoft Office blog.

    Provided By Jody Gilbert

  • White Papers // Sep 2013

    Businesses are ready for a new approach to IT

    Today’s businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in “patterns of expertise” to address complex business and operational tasks for smarter computing.

    Provided By IBM

  • White Papers // Jan 2014

    Surviving the technical security crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Provided By IBM

  • eBooks // Jan 2013

    Cloud Services for Dummies eBook

    Cloud computing is becoming an integral part of many companies’ business and technology strategies. There are many different delivery models. But two foundational services are essential for cloud computing to become a strategic part of the overall computing infrastructure: Infrastructure as a Service (IaaS) for access to compute and storage...

    Provided By IBM

  • White Papers // May 2010

    Overview of IT Service Managment Using the IT Infrastructure Library (ITIL)

    This white paper introduces managers with an interest in information technology to the ITIL. You will become familiar with ITIL processes and understand where ITIL fits within your organization. You will be able to identify the benefits available from ITIL and craft a high-level business case for ITIL adoption in...

    Provided By Global Knowledge

  • White Papers // Oct 2013

    Top ten criteria for selecting a managed services provider

    When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how...

    Provided By IBM

  • White Papers // Jan 2014

    IT Infrastructure: From Silos to Optimised Infrastructure Management

    InfoWorld have released the latest results from their IT Monitoring study, evaluating the complexities of managing siloed performance views and the need for a unified IT monitoring approach. This whitepaper provides key insights for IT teams managing traditional and newer technologies across social, cloud and mobile platforms and discusses the...

    Provided By CA Technologies

  • White Papers // Oct 2013

    Security in the Internet of Things White Paper

    The transition to the Internet of Things (IoT) from closed networks is accelerating at a rapid pace—and justly raising alarms about security.

    Provided By Wind River

  • White Papers // Jan 2014

    Avoiding the pitfalls of outdated disaster recovery plans: Evolving business expectations and threats may require new disaster recovery approaches

    IBM has identified seven outdated assumptions on which many organizations base their disaster recovery plans. This white paper lists them and discusses how to modernize disaster recovery operations.

    Provided By IBM

  • White Papers // Nov 2013

    Operational Analytics from A to Z

    As the market demands faster and more accurate responses to opportunities and threats, operational analytics is becoming the foundation for real-time decision making. The paper outlines the business value and technological foundations of operational analytics.

    Provided By IBM

  • White Papers // May 2012

    Smarter Planet Leadership Series: Air Canada

    Perfecting the art of self service. How self service helped an airline transform their brand.

    Provided By IBM

  • Downloads // Jan 2013

    The Executive's Guide to the Internet of Things

    This guide introduces the basic concepts of the Internet of Things, shows how it can generate business benefits, looks at security and privacy hurdles, and offers examples of how it's being used in the real world.

    Provided By TechRepublic

  • Downloads // Sep 2001

    Sample service level agreement for application support

    Consulting firms that provide support to their clients use service-level agreements to make sure both sides get what they need. This SLA template, updated in November 2003, can be used to hammer out what consultants will provide for their clients.

    Provided By TechRepublic

  • White Papers // Sep 2013

    Data Loss Prevention: Providing Proactive Compliance Management

    Managing compliance and internal security polices can feel like a constant battle. IT organizations not only struggle with day-to-day operational efficiencies but also how to implement the internal controls over critical IT systems and people. In this new white paper, learn common industry regulations in America and abroad. Then, see...

    Provided By Dell Software

  • White Papers // Aug 2010

    Mastering Problem Management

    There are several approaches to take that prevent Problem Management failure, including a thorough understanding of how Incident and Problem Management affect each other. If IT organization leaders can incorporate Incident Management into their Problem Management, as well as follow other tips laid out in this white paper, they can...

    Provided By Global Knowledge

  • White Papers // Feb 2013

    Key Considerations for Increasing Windows System Performance

    Rather than rely on the Windows built-in defrag tool to address performance problems “after-the-fact” on laptops and workstations, IT departments can now address the problem proactively to eliminate performance-robbing fragmentation from ever occurring. One simple fix will put a stop to pesky helpdesk performance issues and ensure you never defrag...

    Provided By Condusiv Technologies

  • White Papers // Nov 2013

    Solve The IT talent Shortage Impacting Your Business

    This Whitepaper will provide key insights into: Facts and figures on the severity of the IT talent shortage . Innovating the recruiting and hiring process to win the war for IT talent. Strategies for utilizing a flexible workforce and vendor partnerships to meet strategic goals

    Provided By Randstad

  • White Papers // Jan 2014

    Private cloud services from IBM. Flexible end-to-end solutions for transforming the enterprise

    Private clouds can drive operational efficiencies and transformative business model change, but maximizing these benefits requires a carefully planned strategy and flexible, scalable services. IBM’s holistic approach and integrated portfolio of end-to-end services provides multiple pathways to private cloud. Success hinges on ensuring the infrastructure is cloud-ready, developing an actionable...

    Provided By IBM

  • White Papers // Jan 2014

    The flexible workplace: Unlocking value in the “bring your own device” era

    Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains...

    Provided By IBM

  • White Papers // Jan 2014

    10 criteria for selecting a managed services provider

    When you're faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out...

    Provided By IBM

  • White Papers // Jan 2013

    The Strategic Importance of OLAP and Multidimensional Analysis

    Read how OLAP give organizations the deep business insight needed to make more informed decisions.

    Provided By IBM

  • White Papers // Dec 2005

    Gartner's Magic Quadrant for Product Information Management

    This report is a must-read if you're an IT strategist who's currently evaluating product information management (PIM) technologies. It explains why the as-yet-immature PIM market is evolving quickly and presents Gartner's Magic Quadrant for this emerging tech sector. There are a variety of differences that separate the companies Gartner classifies...

    Provided By IBM

  • White Papers // Dec 2013

    Whitepaper: Security and Speed

    The problem of security implications for performance is growing as the number of devices or procedures deployed between the user and applications continues to grow. Download this whitepaper to learn more about how the right security mechanisms and approaches can minimize performance degradation.

    Provided By F5 Networks

  • Tools & Templates // Aug 2002

    Sample project proposal template

    Being able to quickly explain the potential benefits of an added Web site feature can help a consultant address a client's concerns over a project's importance. This project proposal sheet will help persuade your clients to take the plunge.

    Provided By TechRepublic

  • Downloads // Jan 2006

    Troubleshoot 10 common Exchange problems with these expert answers

    This list outlines 10 common Exchange problems and solutions. This handy two-page list outlines 10 familiar Exchange problems and an assortment of solutions. From user access errors to mail delivery problems, this list is great quick reference for every Exchange administrator.Here's a sample:Number 1: Users cannot access server. -...

    Provided By TechRepublic

  • Case Studies // Jan 2010

    Toyota: Fujitsu Drives Outsourcing for Toyota

    Toyota Motor Corporation is the third largest automaker in the world and produces a full range of model offerings - from mini-vehicles to large trucks. As a medium size organisation, Toyota Australia is not justified to invest so much on manpower to support the major IT activity. By outsourcing, it...

    Provided By Fujitsu

  • White Papers // May 2008

    ITIL v3: What It Is and Why You Should Care

    The Information Technology Infrastructure Library (ITIL) is the proven way for IT organizations to align with the business, control costs, improve quality, and balance resource allocations. Research shows a dramatic increase in ITIL adoption over the last few years. A study in 2006 showed that about 30% of IT organizations...

    Provided By Global Knowledge

  • White Papers // Sep 2010

    Five Challenges To ITIL Best Practices Adoption

    ITIL is gaining momentum in the United States as the standard for best practices in IT Service Management. However, organizations looking to implement the IT Infrastructure Library often encounter a few road blocks as they transition from their old methodologies and standards. This white paper reviews five challenges often encountered...

    Provided By Global Knowledge

  • White Papers // Mar 2010

    10 Security Concerns for Cloud Computing

    The flexibility, reduced cost, and mobility of cloud computing have made the concept a hot topic. Before implementing this method of computing, however, it is important to consider the security of the "cloud." In this white paper, you will learn some of the risks and benefits of cloud computing to...

    Provided By Global Knowledge

  • White Papers // Jan 2013

    The Value of ITIL® Certification

    The professional certification industry has grown significantly in conjunction with increased growth of various aspects of the information technology field. The Information Technology Infrastructure Library (ITIL®) is a set of best practices designed to describe common approaches that organizations can apply to regular activities conducted by information technology (IT) organizations....

    Provided By Global Knowledge

  • White Papers // Jan 2013

    Simplify Your Route to the Internet: Three Advantages of Using LISP

    The Location ID separation protocol (LISP) simplifies the process of connecting multi-homed sites, and also presents distinct advantages for networks. These advantages include simplicity over BGP, load balancing, and mobility.

    Provided By Global Knowledge

  • White Papers // Sep 2013

    Whitepaper: Reinventing Anti-virus

    This whitepaper describes how new threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature...

    Provided By Webroot Software

  • White Papers // Nov 2013

    Why Should You Encrypt Email and What Happens if You Don’t?

    Encryption is absolutely essential to protect data both in transit and at rest. However, most sensitive or confidential content sent through email is not encrypted, but instead is sent in clear text and so exposed to potential interception. This puts the owners of this information and its recipients at serious...

    Provided By

  • White Papers // Nov 2013

    The Essential Guide to IT Transformation

    Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.

    Provided By ServiceNow

  • Webcasts // Nov 2013

    On-demand Webcast- Machine-to-Machine Security: How to Stay Secure While Building an Internet of Things

    Much of what we now refer to as the Internet of Things (IoT) has existed for decades but the Internet and cloud computing have further enabled automation, data, and security problems. As powerful and as valuable as IoT is, it's important to remember the security risks involved. Connected devices can...

    Provided By Wind River

  • White Papers // Apr 2013

    Mobile Content, Collaboration & IDC's 3rd IT Platform: The Next Frontier for the Mobile Enterprise

    IDC focuses this article on talks about the new IT platform. This 3rd IT Platform will be the new wave for the about the next 25 years, so they urge all current companies to embrace it themselves. They also talk about how mobile is a huge part of this...

    Provided By Box