Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Feb 2013

    Delivering Success that Scales with the Largest Enterprises

    IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar ® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information...

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Mar 2014

    Managing security risks and vulnerabilities

    With integrated security intelligence solutions from IBM, organizations can use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

    Sponsored By IBM

  • White Papers // Aug 2013

    Enterprise Information Security in Transition: An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • Case Studies // Jul 2013

    Equifax

    As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it...

    Sponsored By IBM

  • White Papers // Feb 2014

    Leverage Security Intelligence to Protect Sensitive Healthcare Data

    IBM solutions deliver the end-to-end systems visibility necessary to give healthcare organizations the true security intelligence they need - with the ease of use and labor-saving automation that makes security intelligence a powerful and achievable tool for protecting information.

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.

    Sponsored By IBM

  • White Papers // Feb 2013

    Secure By Design: Building Identity-based Security into Today’s Information Systems

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA&#8482) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.

    Sponsored By IBM

  • White Papers // Feb 2013

    Identity and Access Intelligence: Transforming Enterprise Security

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA&#8482) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Feb 2014

    Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    By supporting flexible authentication schemes, context-based access and behavioral analysis, IBM Security Access Manager for Mobile can help ensure that only authorized mobile users can access valuable resources - onsite, in the cloud and beyond.

    Sponsored By IBM

  • White Papers // Apr 2013

    Implementing Hot and Cold Air Containment in Existing Data Centers

    Containment solutions can eliminate hot spots and provide energy savings over traditional uncontained data center designs. The best containment solution for an existing facility will depend on the constraints of the facility. While ducted hot aisle containment is preferred for highest efficiency, cold aisle containment tends to be easier and...

    Sponsored By APC by Schneider Electric

  • White Papers // Oct 2013

    Comparing Data Center Power Distribution Architectures

    Significant improvements in efficiency, power density, power monitoring, and reconfigurability have been achieved in data center power distribution, increasing the options available for data centers. This paper compares five power distribution approaches including panelboard distribution, field-wired PDU distribution, factory-configured PDU distribution, floor-mount modular power distribution, and modular busway, and describes...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    Deploying High-Density Pods in a Low-Density Data Center

    Simple and rapid deployment of self-contained, high-density pods within an existing or new low-density data center is possible with today’s power and cooling technology. The independence of these high-density pods allow for predictable and reliable operation of high-density equipment without a negative impact on the performance of existing low-density power...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2012

    The Different Technologies for Cooling Data Centers

    There are 13 basic heat removal methods to cool IT equipment and to transport unwanted heat to the outdoor environment. This paper describes these fundamental cooling technologies using basic terms and diagrams. 11 of these methods rely on the refrigeration cycle as the primary means of cooling. Pumped refrigerant systems...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    Impact of Hot and Cold Aisle Containment on Data Center Temperature and Efficiency

    Both hot-air and cold-air containment can improve the predictability and efficiency of traditional data center cooling systems. While both approaches minimize the mixing of hot and cold air, there are practical differences in implementation and operation that have significant consequences on work environment conditions, PUE, and economizer mode hours. The...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2014

    Top 9 Mistakes in Data Center Planning

    Why do so many data center builds and expansions fail? This white paper answers the question by revealing the top 9 mistakes organizations make when designing and building new data center space, and examines an effective way to achieve success through the Total Cost of Ownership (TCO) approach.

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2014

    Containerized Power and Cooling Modules for Data Centers

    Standardized, pre-assembled and integrated data center facility power and cooling modules are at least 60% faster to deploy, and provide a first cost savings of 13% or more compared to traditional data center power and cooling infrastructure. Facility modules, also referred to in the data center industry as containerized power...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2014

    High Efficiency Indirect Air Economized-based Cooling for Data Centers

    Of the various economizer (free cooling) modes for data centers, using fresh air is often viewed as the most energy efficient approach. However, this paper shows how indirect air economizer-based cooling produces similar or better energy savings while eliminating risks posed when outside fresh air is allowed directly into the...

    Sponsored By APC by Schneider Electric

  • Downloads // Mar 2014

    Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    Do you want a unified view of IT systems performance, availability and capacity across all server platforms, network devices, applications, and IT business services? Unified, enterprise-level monitoring, alerting and reporting across all Servers, Networks, Applications, and IT services. Easy to use and quick to deploy. up.time can...

    Sponsored By Uptime Software

  • Case Studies // Jan 2014

    MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

    Sponsored By F5

  • White Papers // Mar 2014

    Attack Path Analytics: A Strategic Approach to Vulnerability Remediation

    Security organizations have no problem finding vulnerabilities on enterprise networks – the volume of security data is constantly growing. The greater challenge is sifting through this data to determine which situations present the greatest risk to the business and prioritizing remediation efforts. Read this white paper to find out the...

    Sponsored By Tenable Network Security

  • White Papers // Mar 2014

    IBM - Giant Leap Forward in Data Services

    As an IT professional, you’ve already dreamt it: a future where you can quickly deploy high availability transactional database systems without the hassle of purchasing, installing, configuring, tuning and testing everything yourself. That day has arrived! The IBM PureData System for Transactions is a pre-integrated database platform that helps you...

    Sponsored By IBM

  • White Papers // Jan 2014

    Guidance for Calculation of Efficiency (PUE) in Data Centers

    Before data center infrastructure efficiency can be benchmarked using PUE or other metrics, there must be agreement on exactly what power consumptions constitute IT loads, what consumptions constitute physical infrastructure, and what loads should not be counted. Unfortunately, commonly published efficiency data is not computed using a standard methodology, and...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    High Efficiency Indirect Air Economizer-based Cooling for Data Centers

    Of the various economizer (free cooling) modes for data centers, using fresh air is often viewed as the most energy efficient approach. However, this paper shows how indirect air economizer-based cooling produces similar or better energy savings while eliminating risks posed when outside fresh air is allowed directly into the...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Specification of Modular Data Center Architecture

    There is a growing consensus that conventional legacy data center design will be superseded by modular scalable data center designs. Reduced total cost of ownership, increased flexibility, reduced deployment time, and improved efficiency are all claimed benefits of modular scalable designs. Yet the term “modular”, when and where modularity is...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2013

    IDC: Mobile Video Collaboration - The New Business Reality

    The powerful combination of mobility and real-time video communications is further enhanced by the bring-your-own-device (BYOD) trend in mobility. This consumerization of IT brings to bear a number of new concerns about liability, privacy, and security. As a result, enterprise IT stakeholders are rapidly building a strategy for BYOD through...

    Sponsored By Polycom

  • White Papers // Mar 2014

    Innovating Through Cloud Technologies: Change is in Your hands

    EMA research shows that organizations typically encounter numerous challenges when leveraging cloud. These issues do not emerge on PowerPoint during the cloud vendor's sales presentation, but become evident when the cloud deployment project begins. In addition, most enterprises have much work left to do in terms of data center automation,...

    Sponsored By frontrange

  • White Papers // Feb 2014

    Enhancing Business Value with HP Wireless Networking Solutions

    The mobile device revolution is transforming the enterprise. One of the four major pillars supporting the 3rd Platform of computing — along with cloud, Big Data, and social technologies — mobile technology is helping organizations realize new sources of competitive advantage and making employees more productive by enabling them to...

    Sponsored By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    The Manager of Managers Approach to Running Your IT Environment Virtual Event

    Do you have a single console to view, control, and manage your IT environment? Is automation built into your monitoring strategy? As IT environments become more dynamic, your operations teams need a unified view for management and monitoring. Automatic detection, and automated monitoring setup and configuration are two ways to...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Sponsored By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    Thinking ahead: Pragmatic steps for successful cloud transformations virtual event

    Public, private, or hybrid, the cloud is creating an array of opportunities for business and IT. And it’s reshaping IT as we know it. But incorporating cloud technology and services into the data center can entail multi-year transformations. The key to successful cloud transformations is developing a pragmatic strategy and...

    Sponsored By Hewlett-Packard (HP)

  • Case Studies // Feb 2014

    Vodafone Ireland implements world-class service excellence with HP BSM

    Learn how business service management helped Vodafone Ireland transform from a reactive to a proactive IT Operations function. Read how BSM solutions enabled the Vodafone IT Operations group to align priorities to match the business and drive business value, delivering 300% ROI in one year. HP is the sponsor...

    Sponsored By Hewlett-Packard (HP)

  • Podcasts // Feb 2014

    T-Mobile Podcast

    Learn how wireless services provider T-Mobile US, Inc. improved cloud- and data-access services delivery to its enterprise customers. Listen to the podcast featuring Daniel Spurling, Director of IT Infrastructure at T-Mobile US, Inc and understand now T-Mobile moved from manual cloud provisioning services to a centralized service portal to better...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    Creating a Mobile-Centric Organization

    As the pace of change quickens, you want to keep your staff engaged and responsive regardless of where they are. Wireless network access is moving beyond conference rooms and building lobbies to have a pervasive presence in every work environment. People simply want and need to stay connected- everywhere and...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    Manage WLANs with Ease

    With the explosion of mobile devices and the irreversible phenomenon of bring-your-own-decide (BYOD), users now expect seamless wireless connectivity. As you expand your wireless LAN (WLAN) to support more people, devices, and applications, you will need to optimize coverage, troubleshoot problems, and plan for growth. This whitepaper highlights seven common...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    Put wireless security worry to rest

    As your wireless needs grow, so too does your exposure to wireless security threats. WLANs are subject to many of the same threats as wired networks, as well as some specific attacks that take advantage of the radio frequency (RF) medium. Attackers often try to compromise the WLAN first, and...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Feb 2014

    HP Unified Access: Unify wired and wireless access at your own pace

    This white paper explores the changing requirements for campus networks, driven by mobility and the bring your own device (BYOD) movement, as well as the increasing adoption of rich‑media applications balanced against ongoing IT resource constraints. Like many other IT organizations, you may be faced with the new urgency to...

    Sponsored By Hewlett-Packard (HP)