Mobility

Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.

  • White Papers // Feb 2013

    Ensuring application security in mobile device environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This...

    Sponsored By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile environments

    As mobile device use in the workplace continues to increase rapidly, more organizations are placing mobile application security as a top security priority. For different types of mobile applications, there are many potential vulnerabilities attackers can exploit to gain access to sensitive data. Providing security for mobile applications requires the...

    Sponsored By IBM

  • Podcasts // Feb 2013

    Mobility Product Demo

    Redesigned and reimagined for the mobile world, Workday Mobile offers all the same insight, information, and intelligence you get on your desktop. And it's delightfully easy to use—Workday’s touch-optimized interface offers easy access to tasks, real-time analytics, and worker information.

    Sponsored By Workday

  • White Papers // Feb 2013

    Use of Resource Pools in VMware vSphere DRS Clusters

    Resource Pools are often misunderstood, disliked, and untrusted by vSphere Administrators who have been burned due to unexpected results of improperly configured resource pools. This white paper examines several scenarios based on actual customer resource pool implementations. Some scenarios describe examples of poorly configured pools. Other scenarios describe examples of...

    Sponsored By Global Knowledge

  • White Papers // Jan 2013

    Simplify Your Route to the Internet: Three Advantages of Using LISP

    The Location ID separation protocol (LISP) simplifies the process of connecting multi-homed sites, and also presents distinct advantages for networks. These advantages include simplicity over BGP, load balancing, and mobility.

    Sponsored By Global Knowledge

  • White Papers // Jan 2013

    The Evolution of Cisco Switching

    A thorough understanding of the fundamentals of routing and switching dynamics is not only necessary but expected by network professionals today. While the various processes may run almost invisibly on a properly configured device in a healthy network, inevitable issues will nearly always require the ability to examine problems at...

    Sponsored By Global Knowledge

  • White Papers // Jan 2013

    Protecting Applications and Data in a Virtual World with Dell AppAssure

    Dell AppAssure provides holistic protection both for physical and virtual environments, dramatically improving recovery time and recovery point objectives. AppAssure delivers:

    • Management of virtual and hybrid environments from a single console
    • Automatic testing of every backup on a nightly basis
    • Smart agent architecture to instantly recover...

      Sponsored By Dell

    • White Papers // Jan 2013

      2013 Mobile Malware Report

      While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users...

      Sponsored By Blue Coat Systems

    • White Papers // Dec 2012

      IP Version 6 Transitions Mechanisms

      As with the adoption of any new technology, the move from IP version 4 to IP Version 6 will take a number of years to complete. During that transition phase, various mechanisms will be necessary to continue support of the older protocol as the newer gains widespread momentum. In addition,...

      Sponsored By Global Knowledge

    • White Papers // Dec 2012

      openBench Labs: How Diskeeper 12 Keeps the Latest Windows OS Running Like New

      There are inherent behaviors associated with Windows that degrade system performance over time. In this Executive Summary, openBench Labs provides a technical narrative on the nature of Windows system performance issues, and performs testing to validate Condusiv's Diskeeper 12's ability to accelerate the latest Windows environments.

      Sponsored By Condusiv Technologies

    • Podcasts // Dec 2012

      OnDemand: Faster VMs Guaranteed – No Hardware Required

      Learn how optimizing I/O at the source on virtual machines provides up to 50% or more application performance at a fraction of the cost of hardware. By eliminating unnecessary I/O traffic at the guest level, there is far less traffic pushed into the server, network, and storage.

      This OnDemand...

      Sponsored By Condusiv Technologies

    • White Papers // Oct 2012

      5 Best Practices for Mobile Business Intelligence

      Considering rolling out mobile business intelligence? The benefits are obvious: get data where decisions are made and in the hands of people who need it. Spread business intelligence more widely throughout your organization and create a culture of data-driven decision making.

      But going mobile doesn't just happen. There are fundamental...

      Sponsored By Tableau Software

    • White Papers // Sep 2012

      Building a Cisco Certification Lab

      Building a flexible lab environment is an essential and critical part of any certification study environment. The first step, either the CCENT or CCNA, requires an environment that is complete enough to cover all of the exam topics, but simple and inexpensive enough to easily construct. Learning concepts is important,...

      Sponsored By Global Knowledge

    • White Papers // Jul 2012

      Export Operation & Compliance Benchmark Report: Going Global w/ Regulatory Reform

      Welcome to the second annual benchmark study covering U.S. export operations and compliance produced by American Shipper in partnership with BPE Global and the International Compliance Professionals Association (ICPA). More than 300 U.S.-based exporters participated in this 35 question survey covering export regulatory reform, operations management practices, organizational structure, compliance...

      Sponsored By SAP

    • White Papers // Jul 2012

      Hybrid Cloud Storage: Getting the Best of Two Worlds

      The Aberdeen Group surveyed 106 enterprises spanning various sectors to see how they are dealing with very high growth storage. In this report we look at each component of Hybrid Cloud Storage. As users of this new technology, they will be able to choose where to locate their data, on-premise...

      Sponsored By Red Hat

    • White Papers // Jun 2012

      Ten Smart Things to Know About Storage

      Learn about trends, developments and tips to make your storage environment more efficient.

      Sponsored By NetApp

    • White Papers // May 2012

      SUSE Linux Enterprise Server on the IBM PureFlex System

      The SUSE Enterprise Linux Server, now on the IBM PureFlex System, provides an open, reliable and secure IT environment with faster deployment, better business agility, lower power consumption, better hardware utilization and lower total cost of ownership.

      Sponsored By IBM

    • White Papers // May 2012

      A New Day: How Smarter Computing can Grow Capacity on Flat Costs

      How smarter computing can grow capacity on flat costs.

      Sponsored By IBM

    • White Papers // May 2012

      Hyper-Mobility meets Security in the Corporate Environment

      Huge amounts of valuable business-related information may be stored and processed on a mobile device, and this means that smartphones make attractive targets for criminals, leading to corporate data leakage, unauthorized access and malware infection. In the UK alone, during 2010, 228 phones were reported stolen every hour.

      Read...

      Sponsored By Kaspersky Lab

    • White Papers // Apr 2012

      12 Steps to Bring Your Own Device (BYOD) Success

      IT departments have multiple opportunities and challenges as a result of the Bring Your Own Device (BYOD) invasion. The most common opportunity is to reinforce enterprise network security from both the inside and the outside. Supporting BYOD also offers more monitoring and tracking of activities that provide a more detailed...

      Sponsored By Global Knowledge

    • White Papers // Mar 2012

      Tips for Maximizing Efficiency in a VMware vSphere Environment

      There are many ways to improve efficiency in a VMware environment. This paper provides many tips for achieving a more efficient environment from looking at the storage to viewing the entire environment's health with one view. It also reviews many of the products offered both as part of the vSphere...

      Sponsored By Global Knowledge

    • White Papers // Jan 2012

      Ten Rules of RIPv2

      Over the years, the need for RIP has declined as IP-based networks evolve into more complex topologies. However, there is still a valid use for RIP, especially with the added features found in RIPv2. Here are ten useful rules to remember for RIPv2.

      Sponsored By Global Knowledge

    • White Papers // Dec 2011

      Accelerated Networks Drive Better Business Outcomes

      Many organizations are evaluating a more business-oriented approach to service levels and advanced network optimization technologies. This approach to Network Applications Services leverages best practice solutions from systems integrators, network technology vendors, and applications providers. By linking IT activities directly to measurable business outcomes, this more comprehensive approach is now...

      Sponsored By Global Knowledge

    • White Papers // Dec 2011

      Designing Network for Rich Media Communications

      IP networks are the standard for delivering converged application like video collaboration, voice over IP, video surveillance, and on-demand video. Real-time applications like video and voice can become useless due to network delays and congestion, placing unique demands on the IP networks. This paper discusses designing a video-ready network and...

      Sponsored By Global Knowledge

    • White Papers // Dec 2011

      The Network Manager Checklist for Cloud

      According to the U.S. National Institute of Standards and Technology, "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction." This white paper provides a six-point...

      Sponsored By Global Knowledge

    • White Papers // Oct 2011

      10 Current Security Threats for Individuals

      We now live in a world where new threats are poised to cause us harm in ways most of us never dreamed possible. The convenience and benefits of Internet access, always-on connectivity, and mobile devices have made us vulnerable to these attacks. It is time for us to adopt a...

      Sponsored By Global Knowledge

    • White Papers // Jun 2010

      Restoring Data with Database Snapshots

      What DBA wouldn't appreciate a process that allows for fast and easy restoration of lost data, allowing you and your users to examine the information before restoring it, to use a minimal amount of drive space, and to carry out all the necessary steps with only local resources? This white...

      Sponsored By Global Knowledge

    • Webcasts // Oct 2013

      Live Webcast: Introducing New Technology to Your Users: A Make or Break Moment

      Join us for this LIVE event!
      Tuesday, October 8th
      10:00 AM PDT / 1:00 PM EDT

      You only get one chance to make a first impression. You might be delivering brilliant, flawless technology, but if users are confused when they first encounter it, they’ll be disappointed.

      And, you...

      Provided By Citrix Online

    • White Papers // Sep 2013

      Which Mobile Device Is the Most Secure?

      Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

      Provided By Sophos

    • White Papers // Sep 2013

      Your Company Data, Their Personal Device — What Could Go Wrong?

      Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.

      Provided By Sophos

    • White Papers // Sep 2013

      Mobile Browsing - Is Your Company at Risk?

      This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And...

      Provided By Webroot Software

    • Case Studies // Sep 2013

      Machine-to-Machine Technology Roundtable: The CIO Perspective

      Objects connected directly to the Internet, dubbed machine-to-machine, or M2M, technology provide a plethora of possibilities for organizations. Machines communicating directly with other machines with minimal human intervention poses exciting possibilities that will change the technology landscape significantly over time.

      The most interesting thing about M2M technology is that...

      Provided By Verizon

    • Case Studies // Aug 2013

      Putting Mobile First: Best Practices of Mobile Technology Leaders

      This report is an IBM study that investigates the approaches organizations are using to support the transformational shift to mobile. The study report defines the resulting Mobile Infrastructure Maturity Model and documents the best practices and characteristics of organizations that are leaders in order to help other organizations improve and...

      Provided By IBM

    • White Papers // Aug 2013

      Does your IT infrastructure put mobile first?

      The shift to mobile is dramatically changing the way people work and organizations conduct business. This infographic is the result of the latest IBM Global IT Study on Mobile Infrastructure.

      Provided By IBM

    • White Papers // Aug 2013

      Mobile Is The New Face Of Engagement - A CIO Whitepaper by Forrester

      CIOs Must Plan Now For New Systems Of Engagement.

      To remain vital in this business technology reformation, CIOs must step up and work with other executives to implement an enterprise-wide mobile strategy. This team will coordinate the business and technology investments under a design-for-mobile-first mantra that delivers four immediate...

      Provided By SAP

    • White Papers // Aug 2013

      Mobile Solution Scalability: Designing Solutions for Tomorrow’s Needs

      The combination of a growing mobile workforce, advances in mobile technology and the overall proliferation of mobile devices and services is ushering a new IT era.

      One of the first-deployed critical building blocks to any comprehensive mobile IT strategy is a mobile device management (MDM) solution that serves to...

      Provided By SAP

    • White Papers // Aug 2013

      TBR Corporate IT Buying Behavior and Customer Satisfaction Study

      Leading IT industry analysts Technology Business Research (TBR) conducts quarterly x86 Server Customer Satisfaction (CSAT) studies to identify what factors are most important to small and midsize companies. This white paper summarizing the study results explains why IBM® System x® servers, efficiently powered by the latest Intel® Xeon® processors, are...

      Provided By IBM and Intel

    • White Papers // Jul 2013

      Building The Business Case For a BYOD Program

      This report outlines Forrester's guidance for developing a business case to justify a BYOD program to support your workforce computing strategy. Supporting the growing number and increasing diversity of mobile devices used for work is particularly challenging for I&O executives. Results of Forrester's Forrsights Workforce Employee Survey, Q2 2012 show...

      Provided By Absolute Software

    • White Papers // Jul 2013

      Mobile Devices: The New Thin Clients

      As IT organizations grapple with some of the profound changes being brought on by the explosion of mobile devices, the rapid adoption of bring your own device (BYOD), and the transition from Windows XP to Windows 7, many of them are taking a fresh look at their client devices and...

      Provided By Citrix

    • Case Studies // Jul 2013

      Four customers who never have to refresh their PCs again

      As mobile workstyles reinvent the way people and businesses operate, IT organizations are in a position to enable new levels of mobility, productivity and efficiency - but not if the high cost of their legacy endpoint environment prevents them from making strategic investments in innovation. Desktop virtualization, paired with thin...

      Provided By Citrix