IT Policies

  • White Papers // Aug 2012

    Backup and Recovery Changes Drive IT Infrastructure and Business Transformation

    This IDC Whitepaper provides an over view of the forces driving change within today's IT organizations and data centers and discusses how backup and recovery can enable or hinder broader IT infrastructure and business transformation.

    Provided By EMC

  • Presentations // Jun 2014

    WebEx Viewpoints: Collaboration in the Workplace

    Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Viewpoints: Training

    WebEx allows companies to train employees effectively, anytime and anywhere. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • White Papers // Feb 2014

    FTP Risk Advisor Tool

    By answering 12 questions, this online tool will provide you with a customized report with recommendations to remediate your FTP risk.

    Provided By IBM

  • White Papers // Dec 2005

    Gartner's Magic Quadrant for Product Information Management

    This report is a must-read if you're an IT strategist who's currently evaluating product information management (PIM) technologies. It explains why the as-yet-immature PIM market is evolving quickly and presents Gartner's Magic Quadrant for this emerging tech sector. There are a variety of differences that separate the companies Gartner classifies...

    Provided By IBM

  • White Papers // Jun 2012

    Storage system comparison: IBM Storwize V7000 vs. EMC VNX5500

    Organisations must continue to deal with growing data storage requirements, while doing more with less. The growing adoption of storage-as-a-service, business intelligence, and big data results in ever more service-level agreements (SLA) that are difficult to fulfil without IT administrators spending longer hours in the datacentre. This Edison research paper...

    Provided By IBM

  • Tools & Templates // Aug 2011

    Systems Optimization Self Assessment

    Improve efficiency and utilization of IT resources. driving out cost and improving service delivery. Take 5 minutes to use this Systems Optimization self assessment.

    Provided By IBM

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Jun 2014

    Meeting Workforce Demands

    Gain access to this new white paper by CIO which examines the changing landscape of end-user computing. The research reveals how today's CIOs are tackling trends and establishing new best practices for the mobile-cloud era. Read more...

    Provided By VMware

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • Tools & Templates // Nov 2007

    Intranet Policy

    The Intranet policy states that all information on the intranet is the company's property; all employees who use the intranet are required to follow this policy, all other relevant company policies (e.g., harassment, nonsolicitation, and respect for dignity), and all applicable laws (e.g., copyright, discrimination). Employees assume all responsibility for...

    Provided By Business & Legal Reports

  • White Papers // Jan 2014

    Best Practices in Lifecycle Management

    Comparing Suites from Dell, LANDesk, Microsoft and Symantec. An Enterprise Management Associates (EMA) White Paper. IT system lifecycle management includes a broad array of essential and complex processes for ensuring optimal reliability and performance of technology investments. Critical to enabling these management disciplines are automated solutions that simplify and standardize...

    Provided By Dell Software

  • eBooks // Mar 2014

    How to Create a Customer Service Process that Enhances Your Bottom Line

    A complaint about complaints. There’s an assumption that the number of complaints received is a perfect reflection of the number of customer problems. If complaints go down, other numbers such as warranty and service costs will go down as well. In fact, complaints are often a poor indicator of...

    Provided By

  • White Papers // Jun 2010

    Why CFO And COO Roles Are Becoming More Cross-Functional

    After the most recent economic downpour, the new operational river running through the executive suite is dissolving the walls between the chief financial officer and chief operating officer offices. Today's successful CFOs must have a strong operational focus. Today's successful COOs must have a strong competency with numbers. And more...

    Provided By Bank of America

  • White Papers // Mar 2011

    Using Six Sigma to Improve IT Help Desk Customer Service

    Within most organizations, the Information Technology (IT) department typically provides the infrastructure, implementation, and administration of hardware, software, networking, and database management. Unfortunately, employees using these systems sometimes encounter problems that hinder the daily productivity of the organization. When such problems occur, it interrupts the flow of work, thereby causing...

    Provided By University of Houston

  • White Papers // Feb 2009

    ITIL: Theory Into Practice

    It is testimony to the complexity of today's technology systems that even one of the most widely-used frameworks for simplifying and standardizing IT management is, in itself, a daunting piece of work. Implementing the IT Infrastructure Library (ITIL) set of guidelines to aid the implementation of a lifecycle framework for...

    Provided By Avocent

  • White Papers // Feb 2014

    Forrester Study - Total Economic Impact of Google Apps

    For companies considering switching to Google Apps from a traditional, on-premise environment for messaging and collaboration, this Forrester Study shows that Google Apps can reduce IT costs while offering even greater gains in employee productivity. Download this quick synopsis to find out more.

    Provided By Google

  • White Papers // Jul 2012

    Frequent Pattern Mining in Social Network Data (Facebook Application Data)

    Data Mining is a process, which involves identification of useful patterns and gathers knowledge which was hidden earlier. It involves various processes of which classification, association rule mining and clustering gain major attention. One of the emerging application areas of Data Mining is Social Networks. In this paper, the authors...

    Provided By EuroJournals

  • Presentations // Apr 2014

    Meg Whitman presents Unlocking IT with Big Data

    Today, the industry is at an inflection point - driven by a triple storm of Big Data, cloud, and mobility; and in this new environment, security is paramount. The New Style of IT is about how businesses and IT leverage this rapid change for enterprise growth. During this Web Event...

    Provided By Hewlett Packard

  • White Papers // Apr 2014

    Embedding BI Into Your Software Solution — Best Practices

    More and more software companies are considering the addition of an analytics module to their product suite. This strategy has compelling business value—analytics can add 20% to 30% of top line revenue to your organization’s top line. This represents your organization’s best opportunity to add revenue and profit for both...

    Provided By Birst

  • White Papers // May 2014

    The Complete Guide to Disaster Recovery Planning

    This comprehensive guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business. It was designed to serve as a primer in disaster management and preparation.

    Provided By Macquarie Telecom Australia

  • White Papers // Dec 2013

    3 ways clinicians can leverage a patient portal to craft a healthcare community

    You probably have several goals for your patient portal of choice. Is “community” one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process.

    Provided By Healthtech Holdings

  • White Papers // Jun 2013

    Gartner Magic Quadrant for Secure Email Gateways

    McAfee Positioned in the Leaders Quadrant of the Gartner Magic Quadrant for Secure Email Gateways. With spam still representing 75% of email and email viruses, and targeted phishing attacks and ransomware increasing, an effective Email Gateway is not a solution campanies can do without. Legacy email security solutions are no...

    Provided By Grey AU: McAfee/Intel

  • Downloads // Mar 2013

    You multi-task at work. Your software should, too.

    All-in-One, Easy Batch Scanning- Kofax Express makes it easy for anyone to scan, organize and store documents, at speeds that make short work of batches big and small. Easy enough for beginners, powerful enough for pros; let Kofax show you the new Express route to document scanning. Free trial software...

    Provided By Kofax

  • Case Studies // Jun 2014

    Rosetta Stone Case Study

    Midsize learning technology company sought to move all files to the cloud for disaster-recovery reasons and to boost employee productivity. Added Box to their existing cloud stack for all employees. Streamlined IT operations; in the process of replacing servers with Box.Technology industry, midsize company, midmarket, global, server replacement, cloud stack,...

    Provided By Box

  • White Papers // Jan 2014

    Avoiding the pitfalls of outdated disaster recovery plans: Evolving business expectations and threats may require new disaster recovery approaches

    IBM has identified seven outdated assumptions on which many organizations base their disaster recovery plans. This white paper lists them and discusses how to modernize disaster recovery operations.

    Provided By IBM

  • White Papers // Jan 2014

    Surviving the technical security crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Provided By IBM

  • White Papers // Jun 2014

    Whitepaper: Pod Infrastructure, Virtual Infrastructure and Dedicated Infrastructure

    Every organisation has different needs when it comes to Cloud computing. Getting stuck in a rigid contract that doesn’t allow you to consume or scale Cloud services the way your business needs to negates the very purpose of Cloud – the ability to provide flexibility, agility and rapid provisioning.Find out...

    Provided By EMC

  • Analyst Briefings // Jun 2014

    The economics of IT risk and reputation: What business continuity and IT security really mean to your organization

    For one of the largest global studies ever conducted of more than 2,000 business continuity and IT security professionals, IBM teamed up with the Ponemon institute to dig deeper into the true economic impact of business continuity and security failures. The groundbreaking study revealed key findings that you’ll want...

    Provided By IBM

  • White Papers // Jul 2014

    Why Choice and Control are Critical to a Successful Cloud Strategy

    It’s true that many businesses today are taking advantage of cloud technology. It’s also true that far more have yet to adopt it in any meaningful way. What’s missing for most organizations is an approach that enables them to leverage the benefits of the cloud—like agility, cost containment and speed...

    Provided By IBM

  • Downloads // Jan 2006

    Create Active Directory users and Exchange mailboxes from a CSV file with VBScript

    This VBScript will create Active Directory users and Exchange accounts from a CSV file. Creating users and Exchange accounts can be tedious, especially when user information already resides in your company's HR system. Instead of manually creating an Active Directory user and Exchange account, you can use a script...

    Provided By TechRepublic

  • Downloads // Jun 2005

    Educate your users about e-mail safety with this PowerPoint presentation

    While e-mail has become a mission-critical business application, it has also become a vehicle for scams and viruses. One of the most important aspects of e-mail security is user education. This PowerPoint presentation by Joshua Hoskins entitled "Practice e-mail safety" provides IT professionals with a slide show that they can...

    Provided By TechRepublic

  • Tools & Templates // Nov 2008

    Automated invoice template

    If you're looking for a convenient, no-frills way to generate invoices, this template may be just what you need. It prompts for client information, includes a table for listing charges, and calculates taxes and totals for you.For instructions on how to create your own Word invoice template (and how to...

    Provided By TechRepublic

  • Downloads // Sep 2000

    Track turnover in your organization with an employee separation checklist

    Keep track of employee turnover in your organization with a customizable checklist. Turnover is a fact of life in the corporate environment. Keeping tabs on the flow can be simplified with a tools designed for that purpose. The TechRepublic Employee Separation Checklist, available in this free download, can help...

    Provided By TechRepublic

  • White Papers // Jun 2014

    IBM Security Services 2014 Cyber Security Intelligence Index

    When IBM talked to 1,000 clients about security attacks that occurred in 2013, three things became abundantly clear: criminals are relentless, every business—across every industry—is affected, and your perimeter may have already been breached. Read the white paper to learn the findings from the analysis of billions of security events...

    Provided By IBM

  • Case Studies // Jul 2014

    Cincinnati Zoo transforms customer experience and boosts profits

    The Cincinnati Zoo & Botanical Garden is one of the nation's most popular attractions, a Top 10 Zagat-rated Zoo, and a Top Zoo for Children according to Parent's Magazine. Each year, more than 1.3 million people visit its 71-acre site, which is home to more than 500 animal and 3,000...

    Provided By IBM

  • eBooks // Jul 2014

    Analytics and Big Data for the Midmarket (eBook)

    With so much emphasis in the business world being placed on big data and analytics, it can be easy for midsize businesses to feel like they’re being left behind. These organizations often recognize the benefits offered by big data and analytics, but have a hard time pursuing those benefits with...

    Provided By IBM

  • White Papers // Oct 2008

    Analysis of Transparent Mode IEEE 802.16j System Performance With Varying Numbers of Relays and Associated Transmit Power

    In this paper, the system capacity of IEEE 802.16j systems operating in transparent mode is investigated under varying numbers of relays and associated transmit power. The study is based on an extended variant of an analytical model defined in previous work and used to determine the throughput gain that can...

    Provided By University College Dublin

  • White Papers // Sep 2010

    Top Email Trends of 2010: What to Watch and Why

    Email excellence is a moving target. Improve your aim and stay on top of the trends. Download Top Email Trends of 2010 to find out what you should watch for and why, and to review the top trends every email marketer must understand in order to remain effective and relevant...

    Provided By Unica

  • White Papers // Sep 2010

    Three Mobile Email Marketing Challenges - and What You Can Do About Them

    Marketers have been limited to bland options for sending communications to consumers on their mobile phones. With the introduction of Apple's iPhone and operating systems like Google's Android and Palm's Pre/Pixi, now offering similarly rich user experiences, you have the opportunity to reach your customers, anywhere, any time, on their...

    Provided By Unica