Microsoft

  • White Papers // May 2015

    State of Cloud Adoption

    Based on the latest research from CBS Interactive, this infographic illustrates prevailing attitudes toward cloud services, including SaaS, IaaS, and PaaS. It will present adoption statistics, use cases, and even satisfaction levels with multifarious public, private, and hybrid environments

    Sponsored By Microsoft Networks

  • White Papers // May 2015

    Next-gen cloud migration strategies

    Most enterprises have embraced the "low-hanging fruit" of cloud services, phasing in SaaS applications and creating IaaS environments for testing and development. As cloud technologies have matured, however, businesses are considering the transfer of more mission-critical systems to cloud resources. This white paper outlines the current state and future plans...

    Sponsored By Microsoft

  • White Papers // Apr 2015

    Enterprise Mobility Management: The Big Bang Theory

    Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.

    Sponsored By IBM

  • White Papers // Mar 2015

    Modernize Your SMB

    By modernizing your SMB with Windows Server 2012 R2 running on Intel Xeon processor-based servers, you can maximize performance, security, and compliance. If you’re ready to take your business to the next level, consider a powerful new Intel Xeon Processor E5-based platform that will enable you to respond rapidly to...

    Sponsored By Intel/Microsoft

  • White Papers // Mar 2015

    Modernize Your Data Centre

    As of July 2015, support for Windows Server 2003 will end. Organisations who don’t act now will be at risk, whether from compromised applications, data theft, or failure to meet regulatory requirements. Compliance – Failure to meet compliance requirements from HIPAA, Sarbanes-Oxley, PCI, and others can bring workflows to a...

    Sponsored By Intel/Microsoft

  • White Papers // Mar 2015

    IDC: Capturing the $1.6 Trillion Data Dividend

    In recent years, the promise and, in some cases, the hype of big data have produced plenty of critics who doubt the benefits of big data or point to the potential pitfalls facing organisations engaged in big data and analytics projects. This white paper provides the results of an IDC...

    Sponsored By Microsoft

  • White Papers // Mar 2015

    Forrester: Total Economic Impact™ Of Microsoft SQL Server

    From the information obtained through interviews with six organisations and surveys collected from 48 more, Forrester has constructed a Total Economic Impact (TEI) framework outlining the implementation of Microsoft SQL Server 2012 and/or Microsoft SQL Server 2014. The objective of the framework is to identify the cost, benefit, flexibility, and...

    Sponsored By Microsoft

  • White Papers // Feb 2015

    ESG: Public Cloud Trends

    Early server virtualization was based on consolidation and cost containment. Today, automation, elasticity, and usage-based tracking is transforming virtualized data centers into private cloud infrastructures.

    Sponsored By NetApp

  • White Papers // Feb 2015

    IBM Security AppScan Mobile Analyzer

    IBM Security AppScan® Mobile Analyzer is designed to help secure your organization’s mobile applications, by detecting dozens of today’s most pervasive published security vulnerabilities. Now available for general availability IBM Security AppScan Mobile Analyzer: Scans mobile applications at the appropriate stage of your development lifecycle, Identifies security vulnerabilities to malware...

    Sponsored By IBM

  • White Papers // Feb 2015

    Protecting Your Critical Data with Integrated Security Intelligence

    By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.

    Sponsored By IBM

  • White Papers // Feb 2015

    Puppet Labs DevOps Salary Report

    The 2014 State of DevOps Report revealed strong correlations between DevOps practices and strong IT performance, and also showed that high-performing IT teams have a beneficial impact on the business performance of the organizations they belong to. Among our questions about tools & practices, location, industry and company size,...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    Checklist: Characteristics of a Successful DevOps Team

    No matter how you’re using DevOps practices — whether your company has a DevOps department or cross-functional teams that share DevOps tools and practices — there are distinct characteristics of DevOps teams that align with high IT performance.

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    9 (+1) Ways IT Automation Will Make Your Organization More Successful

    With the right automation in place, your IT infrastructure can become a strategic asset to get your company out ahead of competitors. Thoughtfully chosen automation tools can enable IT operations to manage IT infrastructure for: higher availability and reliability; faster recovery from outages; better scalability; better auditability; more frequent delivery...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    What Windows Admins Need from Configuration Management

    Windows system administrators use a wide variety of tools to do their work. But with Microsoft’s vision of a mobile-first, cloud-first world, Windows admins need a unified toolset to manage all their environments — Windows and not. This handbook describes what to look for in a configuration management tool, and...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    Four Tools to Capture DDoS Attacks in Monitoring

    Most cloud DDoS mitigation services are offered on-demand, meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out - quickly - that it is under attack? Sometimes it is difficult to know. This piece lists four monitoring...

    Sponsored By Neustar

  • White Papers // Jan 2015

    Five Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper and...

    Sponsored By HP

  • White Papers // Dec 2014

    IBM System Z in a mobile World

    Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational innovation rather than incremental innovation. Mobile really is a disruptive innovation. Read More..

    Sponsored By IBM

  • White Papers // Dec 2014

    IDC Report: The Business Value of IBM zEnterprise System Deployments

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Sponsored By IBM

  • White Papers // Oct 2014

    Why Cloud Backup? Top 10 Reasons HP Autonomy Solutions

    Download this white paper to discover the top 10 reasons why organisations are turning to cloud server backup. Learn how you can reduce costs and free your IT staff to focus on more mission-critical projects.

    Sponsored By HP

  • Tools & Templates // May 2015

    Sample files: Random time values, conditional formatting, and a PivotTable solution

    These files demonstrate the techniques explained in the article Office Q&A: Random time values, conditional formatting, and a PivotTable solution.

    Provided By TechRepublic

  • White Papers // Mar 2015

    Greater Strategic Effectiveness through Perpetual Planning

    Businesses face volatility everywhere they look. Increasing globalization is a major factor, with economic and environmental issues in one part of the world readily impacting supply and demand elsewhere. Making a successful shift to perpetual planning helps employees bridge the gap between innovation and your ability to support related efforts....

    Provided By CA Technologies

  • White Papers // Mar 2015

    Defending against malware: A holistic approach to one of today's biggest IT risk

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Read More.....

    Provided By IBM

  • Webcasts // Mar 2015

    Reverse Engineering with Powershell

    Whether the users are performing incident response, black box code analysis, or analyzing malicious code, PowerShell is a powerful tool to add to the users reverse engineering tool arsenal. In this webcast, the presenter will explain how to use PowerShell to analyze binary file formats and reverse engineer managed and...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Monitoring Using Powershell

    In this webcast, the presenter will give real world examples of how to use PowerShell for monitoring servers, websites, active directory, exchange, DNS, DHCP, anti-virus, WSUS patching, and notification using email and websites.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Advanced Powershell Threat - Lethal Client Side Attacks Using Powershell

    Powershell is an ideal platform for client side attacks as it is available on all the Windows machines. The presenter would see how easy and effective it is to use Powershell for various client side attacks like drive-by-downloads, malicious attachments, Java applets, human interface devices etc.

    Provided By SecurityTube.net

  • White Papers // Feb 2015

    Reduce backup costs with high-density energy-smart storage

    Bottom line—your IT infrastructure simply has to work, despite constrained budgets and constant data growth. Fortunately, virtualization has driven sweeping change, making deployments simpler, more scalable and agile regardless of the data center’s size. Discover how best-of-breed storage solutions are maximizing the benefits of virtualization by creating quantifiable improvements in...

    Provided By Nexsan by Imation

  • Webcasts // Feb 2015

    The Panasonic Toughpad FZ-E1

    The Panasonic Toughpad tablets help drive efficiency and productivity in ways that were never previously possible. It’s capable of operating outdoors in a variety of extreme and remote environments and it brings together the best of handheld, smartphone and barcode reader functionality into a single rugged and hard working tablet....

    Provided By Panasonic

  • White Papers // Feb 2015

    Stepping up the Battle Against Advanced Threats WP

    The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection...

    Provided By IBM

  • White Papers // Feb 2015

    A Managed File Transfer Center of Excellence

    Are you a visual thinker? This graphic representation provides the big picture for choosing the right person-centric file transfer solution for your organization. Read More..

    Provided By IBM

  • White Papers // Feb 2015

    5 Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper...

    Provided By HP

  • White Papers // Feb 2015

    Migrate to the New Style of IT

    Microsoft Windows Server 2003 Migration Program for enterprise businesses Microsoft will end support for Windows Server 2003 on 14 July 2015. This will have a dramatic impact on your business, and every moment you wait to begin your migration increases the costs, risks, and complexities you face. Read...

    Provided By HP

  • Webcasts // Jan 2015

    Powershell and You: Using Microsoft's Incident Response Language

    Anyone can write useful security tools in PowerShell. With just a little bit of knowledge the user can automate almost anything. From advanced post-exploitation tasks to incident response tools, they can do it with PowerShell. This webcast will explain why they should learn a new language and cover the basics...

    Provided By SecurityTube.net

  • Videos // Jan 2015

    Using BlueMix to Develop Mobile Applications - Building an Android App using MobileData Cloud

    This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application. Download Now..

    Provided By IBM

  • White Papers // Jan 2015

    Getting The Most From Your Virtualized Data Center With Converged Systems

    In this paper, we look at the greatest challenges faced by IT departments, and how traditional processes and organizations are poorly-equipped to handle today's workplace. We discuss the benefits of converged systems that are engineered to handle virtualised workloads. Finally, we look at HP ConvergedSystem for Virtualisation as a simple...

    Provided By HP and Intel UK

  • White Papers // Jan 2015

    Avoiding the Stall: Riding the Momentum of the Next Levels of Datacenter Virtualisation — A Business Value Perspective (IDC)

    This document discusses the results that more comprehensive datacenter virtualisation delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualisation. Read more... Brought to you by HP and Intel® :

    Provided By HP and Intel UK

  • White Papers // Jan 2015

    Improving the cost and management of mirroring data with a Stretched Cluster Solution

    In today’s world, storage and performance requirements are growing faster than ever before and the costs of managing this growth are eating up more and more of the typical IT budget. With the Software Defined Data Centre (SDDC) four core elements of IT Infrastructure – networking, CPU, storage and security–...

    Provided By Tectrade

  • Webcasts // Dec 2014

    Extreme Privilege Escalation on Windows 8/UEFI Systems

    It has come to light that state actors install implants in the BIOS. Let no one ever again question whether BIOS malware is practical or present in the wild. However, in practice attackers can install such implants without ever having physical access to the box. Exploits against the BIOS can...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse

    Windows APIs are often a blackbox with poor documentation, taking input and spewing output with little visibility on what actually happens in the background. By analyzing (and abusing) the underlying functionality of these seemingly benign APIs, the presenter can effectively manipulate Windows into performing stealthy custom attacks bypassing the latest...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    What Happens in Windows 8 Stays in Windows 8

    Systems evolve over time, patches are applied, holes are fixed and new features are added. Windows 10 is the new flagship product of Microsoft, and as prepared as it can be for a world of white-, grey- and black-hat hackers.

    Provided By SecurityTube.net

  • Case Studies // Dec 2014

    Kent County Council Set to Save Over £2.7 Million While Fast Tracking XP Migration with VMware

    Kent County Council is able to rapidly accelerate the migration of its 4,000 devices away from Microsoft XP - saving over £560,000 in the process and causing minimal disruption to staff. Their challenges are to improve mobility, working flexibility, information security and business agility, migrating away from its aging Windows...

    Provided By VMware

  • White Papers // Feb 2015

    Checklist: Characteristics of a Successful DevOps Team

    No matter how you’re using DevOps practices — whether your company has a DevOps department or cross-functional teams that share DevOps tools and practices — there are distinct characteristics of DevOps teams that align with high IT performance.

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    Enterprise Mobility Management: The Big Bang Theory

    Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.

    Sponsored By IBM

  • White Papers // Oct 2014

    Why Cloud Backup? Top 10 Reasons HP Autonomy Solutions

    Download this white paper to discover the top 10 reasons why organisations are turning to cloud server backup. Learn how you can reduce costs and free your IT staff to focus on more mission-critical projects.

    Sponsored By HP

  • White Papers // Feb 2015

    Puppet Labs DevOps Salary Report

    The 2014 State of DevOps Report revealed strong correlations between DevOps practices and strong IT performance, and also showed that high-performing IT teams have a beneficial impact on the business performance of the organizations they belong to. Among our questions about tools & practices, location, industry and company size,...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    9 (+1) Ways IT Automation Will Make Your Organization More Successful

    With the right automation in place, your IT infrastructure can become a strategic asset to get your company out ahead of competitors. Thoughtfully chosen automation tools can enable IT operations to manage IT infrastructure for: higher availability and reliability; faster recovery from outages; better scalability; better auditability; more frequent delivery...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    What Windows Admins Need from Configuration Management

    Windows system administrators use a wide variety of tools to do their work. But with Microsoft’s vision of a mobile-first, cloud-first world, Windows admins need a unified toolset to manage all their environments — Windows and not. This handbook describes what to look for in a configuration management tool, and...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    Four Tools to Capture DDoS Attacks in Monitoring

    Most cloud DDoS mitigation services are offered on-demand, meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out - quickly - that it is under attack? Sometimes it is difficult to know. This piece lists four monitoring...

    Sponsored By Neustar

  • White Papers // Feb 2015

    IBM Security AppScan Mobile Analyzer

    IBM Security AppScan® Mobile Analyzer is designed to help secure your organization’s mobile applications, by detecting dozens of today’s most pervasive published security vulnerabilities. Now available for general availability IBM Security AppScan Mobile Analyzer: Scans mobile applications at the appropriate stage of your development lifecycle, Identifies security vulnerabilities to malware...

    Sponsored By IBM

  • White Papers // Mar 2015

    IDC: Capturing the $1.6 Trillion Data Dividend

    In recent years, the promise and, in some cases, the hype of big data have produced plenty of critics who doubt the benefits of big data or point to the potential pitfalls facing organisations engaged in big data and analytics projects. This white paper provides the results of an IDC...

    Sponsored By Microsoft

  • White Papers // Mar 2015

    Forrester: Total Economic Impact™ Of Microsoft SQL Server

    From the information obtained through interviews with six organisations and surveys collected from 48 more, Forrester has constructed a Total Economic Impact (TEI) framework outlining the implementation of Microsoft SQL Server 2012 and/or Microsoft SQL Server 2014. The objective of the framework is to identify the cost, benefit, flexibility, and...

    Sponsored By Microsoft

  • White Papers // Mar 2015

    Modernize Your SMB

    By modernizing your SMB with Windows Server 2012 R2 running on Intel Xeon processor-based servers, you can maximize performance, security, and compliance. If you’re ready to take your business to the next level, consider a powerful new Intel Xeon Processor E5-based platform that will enable you to respond rapidly to...

    Sponsored By Intel/Microsoft

  • White Papers // Mar 2015

    Modernize Your Data Centre

    As of July 2015, support for Windows Server 2003 will end. Organisations who don’t act now will be at risk, whether from compromised applications, data theft, or failure to meet regulatory requirements. Compliance – Failure to meet compliance requirements from HIPAA, Sarbanes-Oxley, PCI, and others can bring workflows to a...

    Sponsored By Intel/Microsoft

  • White Papers // May 2015

    Next-gen cloud migration strategies

    Most enterprises have embraced the "low-hanging fruit" of cloud services, phasing in SaaS applications and creating IaaS environments for testing and development. As cloud technologies have matured, however, businesses are considering the transfer of more mission-critical systems to cloud resources. This white paper outlines the current state and future plans...

    Sponsored By Microsoft

  • White Papers // May 2015

    State of Cloud Adoption

    Based on the latest research from CBS Interactive, this infographic illustrates prevailing attitudes toward cloud services, including SaaS, IaaS, and PaaS. It will present adoption statistics, use cases, and even satisfaction levels with multifarious public, private, and hybrid environments

    Sponsored By Microsoft Networks

  • White Papers // Jan 2015

    Five Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper and...

    Sponsored By HP

  • White Papers // Dec 2014

    IBM System Z in a mobile World

    Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational innovation rather than incremental innovation. Mobile really is a disruptive innovation. Read More..

    Sponsored By IBM

  • White Papers // Dec 2014

    IDC Report: The Business Value of IBM zEnterprise System Deployments

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Sponsored By IBM

  • White Papers // Feb 2015

    Protecting Your Critical Data with Integrated Security Intelligence

    By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.

    Sponsored By IBM

  • White Papers // Feb 2015

    ESG: Public Cloud Trends

    Early server virtualization was based on consolidation and cost containment. Today, automation, elasticity, and usage-based tracking is transforming virtualized data centers into private cloud infrastructures.

    Sponsored By NetApp

  • White Papers // Mar 2015

    Defending against malware: A holistic approach to one of today's biggest IT risk

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Read More.....

    Provided By IBM

  • Videos // Jan 2015

    Using BlueMix to Develop Mobile Applications - Building an Android App using MobileData Cloud

    This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application. Download Now..

    Provided By IBM

  • eBooks // Mar 2014

    Integrating and governing big data

    While the term “big data” has only recently come into vogue, IBM has designed solutions capable of handling very large quantities of data for decades, leading the way with data integration, management, security and analytics solutions known for their reliability, flexibility and scalability. The end-to-end information integration capabilities of IBM®...

    Provided By IBM

  • White Papers // Nov 2014

    The Business Value of IBM zEnterprise System Deployments - IDC Report

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Provided By IBM

  • White Papers // Jan 2015

    Getting The Most From Your Virtualized Data Center With Converged Systems

    In this paper, we look at the greatest challenges faced by IT departments, and how traditional processes and organizations are poorly-equipped to handle today's workplace. We discuss the benefits of converged systems that are engineered to handle virtualised workloads. Finally, we look at HP ConvergedSystem for Virtualisation as a simple...

    Provided By HP and Intel UK

  • White Papers // Mar 2015

    Greater Strategic Effectiveness through Perpetual Planning

    Businesses face volatility everywhere they look. Increasing globalization is a major factor, with economic and environmental issues in one part of the world readily impacting supply and demand elsewhere. Making a successful shift to perpetual planning helps employees bridge the gap between innovation and your ability to support related efforts....

    Provided By CA Technologies

  • eBooks // Feb 2014

    Executive's guide to the end of Windows XP support

    See how organizations are dealing with Windows XP's end-of-life deadline, the consequences of various migration (or stay-put) scenarios, and the obstacles encountered by companies moving off the OS.

    Provided By TechRepublic

  • Case Studies // Dec 2011

    Etisalat Upgrades Operating System with Zero-Touch Installation for Business Continuity

    Egypt-based mobile services provider Etisalat Misr wanted to upgrade its operating system from Windows XP to reduce maintenance costs, cut downtime, and improve productivity. In 2010, the company decided to deploy the Windows 7 Enterprise operating system to its entire workforce supported by Microsoft Gold Partner OMS. The IT team...

    Provided By Microsoft

  • White Papers // Mar 2014

    Based on WDM of Disk Immunity Systems

    Along with the computer virus and rogue malware become more and more rampant increasingly. It is a tough problem to protect computer data in the public environment. In order to prevent hard disk data from virus infection, malice destroy and deleting by mistake, this paper illustrates the design and implementation...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Oct 2012

    Portable and Economic Smart Generic Data Server for Small Scale Business

    Now-a-days internet plays a very major role in business processes. The internet acts as the kind of the bonding between the customers and an organization (probably business), the customer can obtain the information of the user desire by making the single click on organization's website. But, the major infrastructure to...

    Provided By International Journal of Engineering Inventions (IJEI)

  • Case Studies // Mar 2012

    Government Improves Productivity and Reduces Overheads with Virtualized Solution

    The technology arm of the government of the Punjab - Punjab Information Technology Board (PITB) - needed to replace its decentralized communications technology with a more secure, reliable solution. It worked with Microsoft gold partner inbox business technologies, to deploy a solution based on Windows Server 2008 R2 and Microsoft...

    Provided By Microsoft

  • White Papers // Aug 2014

    Automated Window 8 Security and Safety System

    Automated Windows 8 security console is software program which is aimed to help Windows 8 users to protect their privacy & from malicious attacks. Automated Windows 8 security console is graphical user interface software which guides an average user about the latest security issues involved in windows 8. Software then...

    Provided By International Journal of Computer Science and Mobile Computing (IJCSMC)

  • Webcasts // Sep 2014

    Windows Phone 8 Application Security

    In this webcast, the presenter will focus on Windows Phone 8 and applications security. Microsoft is expanding its presence on Smartphone OS market. Windows Phone 8 is a new mobile platform and there is not so much information about security issues out there.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades

    In this webcast, the presenter explains about the Kerberos-besides having three heads and guarding the gates of hell-protects services on Microsoft Windows domains. Its use is increasing due to the growing number of attacks targeting NTLM authentication. Attacking Kerberos to access Windows resources represents the next generation of attacks on...

    Provided By SecurityTube.net

  • White Papers // Aug 2014

    Mixed Integer Programming Model For The Vehicle Routing Problem With Time Windows Considering Avoiding Route

    The Vehicle Routing Problem (VRP) is a combinatorial optimization problem to specify a homogeneous set of vehicles and routes, in which each vehicle starts from a depot and traverses along a route in order to serve a set of customers with known geographical locations, and then finish its tour at...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Acquisiting Text Documents Opened by Notepad from Windows7 RAM Image

    The text documents opened by notepad are important forensic objects in MS Windows memory forensic field, because the notepad is a widely used text editing program bind with the Windows system. This paper proposed a method for recovering text documents from windows7 memory image based on reconstructed process space for...

    Provided By Binary Information Press

  • White Papers // Sep 2014

    Mimecast Services for Microsoft Office 365

    This datasheet discusses the third party capabilities that Office 365 users should consider to add value to their platform. Mimecast provides a rich set of cloud services designed to meet the specific needs of O365 users and provides complementary services to eliminate business dependence on on-premises technologies. Check this out...

    Provided By Mimecast

  • Case Studies // Aug 2014

    FFVA Mutual Insurance Company

    FFVA Mutual Insurance Company is specialty insurance provider focused on controlling costs for worker compensation insurance. Their challenge is to eliminate user admin rights exposing the enterprise to risks and vulnerabilities. They chose BeyondTrust to overcome this challenge. They have implemented BeyondTrust PowerBroker for windows with BeyondInsight allowed users to...

    Provided By BeyondTrust

  • Case Studies // Mar 2012

    Multichannel Retailer Boosts Availability of Critical Applications and Supports Growth

    Florida-based HSN is a leading, interactive, multichannel retailer that sells a range of brand-name products through a popular television channel and multiple digital screens including the web and mobile. The company wanted to continue to increase availability levels and reduce failover times for several mission-critical applications. By implementing a new...

    Provided By Microsoft

  • Case Studies // Sep 2014

    Coras Iompair Eireann (CIE)

    Coras Iompair Eireann (CIE), Ireland's national public transport authority, makes 230 million trips around and across Ireland. Their challenges are tedious Windows OS rollouts, time-consuming user profile migrations, costly travel to solve day-to-day issues, spotty OS roll out status checks System Center Configuration Manager (SCCM) and tedious Windows OS rollouts....

    Provided By PJ Studios

  • Research // Oct 2014

    Gartner Magic Quadrant for Enterprise Search, 2014.

    There is an established Nexus of Forces — social, mobile, cloud and information – that affects the information-centric enterprise search market substantially. A new paradigm is the increased drive for contextualization. Organizations are no longer satisfied with a list of search results — they want the single best result. It...

    Provided By HP