Mobility

Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.

  • White Papers // Feb 2014

    The Who, What, Where, When and How of Real-time Personalization

    Read this white paper to find out what the most forward-thinking marketers are doing to leverage the power of real-time personalization, and discover what it takes to build an effective, comprehensive marketing strategy of your own.

    Sponsored By IBM

  • White Papers // Feb 2014

    10 Tips for Moving Social Media and Mobile Marketing out of Silos

    Read this white paper for 10 tips on integrating customer data across your marketing, and find out how to deliver personalized, seamless interactions through mobile, social media, and other channels to create lasting—and profitable—customer engagement.

    Sponsored By IBM

  • White Papers // Feb 2014

    ICSA Labs Network IPS Certification Testing Report

    Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

    Sponsored By IBM

  • White Papers // Jan 2014

    The Role of the Network in Cloud Computing

    For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.

    Sponsored By IBM

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Oct 2013

    Top 6 Project Breakdowns (and How to Fix Them)

    Project management is either one of those things that you are really good at, and you can breeze right through without any issues, or it's something that drives you crazy. Every business owner has experienced some form of project failure, but why? Study the top reasons that projects fail to...

    Sponsored By ConnectWise

  • Downloads // Oct 2013

    Download a trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • White Papers // Aug 2013

    Making Smarter Mobile Access Decisions

    In spite of the ubiquitous nature of smartphones and tablets in the workplace, these devices can represent a significant threat to corporate data. Find out what IT should know before deciding on the right smartphone and tablet platform, and how Dell™ SonicWALL™ solutions can help meet those needs. Read the...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Most companies know that allowing employees to use personal devices improves productivity and job satisfaction. It can also reduce costs and allow for building virtual teams through geographically dispersed talent. But how can you make sure these devices don’t introduce new threats, impact compliance or monopolize bandwidth? Read the White...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Controlling Laptop and Smartphone Access to Corporate Networks

    With “bring your own device” (BYOD) policies enabling employees to select their own mobile devices for work, IT must be able to guarantee bandwidth to critical applications while limiting the negative impact of undesired traffic. So how do you find the balance? Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    There is good reason for IT to get involved in and maintain “bring your own device” (BYOD) procedures. These devices bring more than employee convenience — they promote agility and efficiency throughout your business. However, it’s on IT’s shoulders to form a pragmatic strategy to secure data from malware, theft...

    Sponsored By Dell Software

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile device environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This...

    Sponsored By IBM

  • White Papers // Feb 2013

    Safeguarding the cloud with IBM Security solutions

    IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

    Sponsored By IBM

  • White Papers // Jan 2013

    Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. This report presents our results and findings...

    Sponsored By Webroot Software

  • White Papers // May 2015

    Think it. Build it. Data-Driven Web and Mobile Apps with IBM Bluemix

    Big Data services on Bluemix enable users across the enterprise to readily build data-centric applications and bring Big Data to the forefront of mobile and web scale applications for rapid design, development, deployment and scale. View this webinar to learn how to build applications that: Power mobile and web-scale applications...

    Provided By IBM

  • White Papers // Apr 2015

    Codeless Mobile App Platforms: Quantifying Value and Analyzing Strategy

    With the necessity of mobile strategies apparent, a myriad of tools and solutions are available to organizations to support their mobile initiatives. Each solution has its own benefits and drawbacks. Codeless mobile app development platforms are a valuable tool for any organization initiating or expanding their enterprise mobility strategy. With...

    Provided By Smiths Point Analytics

  • White Papers // Apr 2015

    IT Megatrends’ Impact On Infrastructure

    Your IT infrastructure plays a pivotal role in delivering the responsive services and positive experiences employees and customers demand today, serving as a bridge to a New Style of IT that integrates cloud, mobility, big data, and security. To meet these demands, infrastructure and operations leaders must work with the...

    Provided By HP and Intel UK

  • White Papers // Apr 2015

    End of life for BYOD products- On Demand Webinar

    Learn more about what you can do when your devices reach the end of their life. As personal electronic devices gain more access to corporate data, whether through internal email, software, or files stored on the cloud, security is becoming a major concern. During the editorial webinar Krishan Sharma ZDNet...

    Provided By Dell and Intel®

  • White Papers // Apr 2015

    Thriving in Small Spaces

    In the last 10 years, office cubbicle has shrunk 64% which means than producitty has been affected too. This whitepaper give you useful space hacks to help you be one with a smaller, more open and productive worplace.

    Provided By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Mobile Testing: Follow these Five Steps to Simplify and Accelerate App Testing

    The rapid pace of mobile apps demands new approaches to all types of testing. To bring high-quality software to market quickly, your organisation needs a strategy that covers all aspects of mobile testing from application level testing to real devices and from functional to performance, to network and security. This...

    Provided By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Take Control of your Mobile Reality

    Maintaining control of your mobile applications is crucial at every stage of the lifecycle. What kind of solution can integrate mobile technology and improve the overall experience for users? Explore how the HP Mobile Center can help you manage mobile applications across the lifecycle, from concept through deployment to...

    Provided By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Deliver Mobile Apps: A Lifecycle Approach to Mobile Testing and Development

    This whitepaper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and BYOD smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps...

    Provided By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Three Key Objectives for Mobile Testing

    Mobility is dominating in today's world, and depends on billions of unique factors such as users, apps, and platforms. However, the risk is huge when it comes to mobile applications. When a mobile app fails, approximately 48% of users are less likely to use the app again-resulting in a huge...

    Provided By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Mobile Devices in Education

    Many K-12 school districts and institutions of higher learning are embracing the reality of increased mobile device usage and bring your own device (BYOD) initiatives on their campuses, and the impact this will have on IT. This paper outlines an approach that Dell has developed and tested to meet the...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Mobility: Going your way

    Constant connectivity is the new norm — causing a shift in worker expectations that may not align with enterprise requirements. An effective mobility strategy empowers users and improves business performance without compromising essential IT controls. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Transforming mobility management through a unified approach

    As the mobile workplace and the nature of business itself continue to evolve, IT teams must support a multiplicity of devices, operating systems and work habits. Dell Enterprise Mobility Management helps simplify administration and secure vital data. In this report you will learn how it is being done. ...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Developing a new user agreement for BYOPC programs

    Many organizations are implementing bring-your-own-device (BYOD) or bring-your-own-PC (BYOPC) programs to increase work flexibility, improve employee productivity and reduce enterprise costs. Before your organization allows employees to use personally owned laptops, tablets or smartphones for work, consider how these programs will affect corporate privacy, data protection and e-discovery policies. ...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Agile security for the mobile workforce

    Flexible, end-to-end security enables enterprises to speed adoption of transformative technologies for a competitive edge. Best-practice deployments help deliver on the business promise of mobility with integrated protection throughout the workplace. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Mobile Devices in the Enterprise:A Comprehensive Management Approach

    Many organizations are embracing the reality of increased mobile devices and bring your own device (BYOD) initiatives, and the impact this will have on IT. This paper outlines an approach that Dell has developed and tested to meet the unique needs of the enterprise. Ultrabook, Celeron, Celeron Inside,...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Nine Conversations for Successful BYOD Decision Making

    In recent years, BYOD in the business world has taken on a new aspect: that of mobile devices, particularly driven by the popularity of tablets and SmartPhones. In the last four decades, educational systems have frequently attempted to adopt trends in business to the educational process. The BYOD trend is...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Seamless cellular connectivity: A new freedom for mobile workers

    The mobile workforce needs dependable, high-speed network connectivity to get the job done. Refreshing client fleets with built-in 4G LTE technology lets employees take the internet with them — boosting flexibility, productivity and cost-efficiency. This report will examine the greater flexibility and efficiency granted by the emerging high-speed connection capabilities...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    The Mobile Marketing App Creation Handbook: 10 Steps for Building a Comprehensive Blueprint for Your Mobile Marketing Apps

    Planning the architecture for a mobile marketing app can be a daunting process. The user already have impactful marketing materials available, but they will fall flat if the app fails to engage the target audience, meet their needs, and provide a powerful user experience. Success hinges on the upfront work...

    Provided By Proscape Technologies

  • eBooks // Mar 2015

    Dell Tablet Comparison E-Guide

    Finding the right tablet for full office productivity can be a challenge. Your tablet should be able to do whatever you need, with whatever software you want, while integrating with back-end systems. Finally, you have several ideal choices that bring flexibility, ease of management, professional capability, and near-universal compatibility in...

    Provided By Dell

  • White Papers // Mar 2015

    Life Hacker: Making Mobility Real-eBook

    Let Life Hacker take you through the questions most frequently asked when talking about mobility in organisations around the world. This eBook, chapter by chapter, will examine: • Why Mobility Policy are now a must have • How to remain secure in this world of BYOD • What Mobile...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Zeroing In on the Right Devices

    Discover what you can do to stay ahead of the technological curve and ensure that your productivity can be matched by none. This report will analyse the latest in PC technology and how you and your employees can replace outdated systems with the best-of-the-best. Ultrabook, Celeron, Celeron Inside,...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Enterprise Mobility Management Smackdown

    Are you looking for an independent overview of the Enterprise Mobility Management (EMM) solutions and curious about the different features and functions each EMM vendor is offering?If so, this is a report you MUST read! Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom...

    Provided By Dell and Intel®

  • White Papers // Mar 2015

    Five Organizations Power Business Mobility with Mobile Workspaces

    What are the real benefits of secure mobile workspaces? Read about five organizations that implemented the leading mobile workspace solution – Citrix Workspace Suite – and how they reached new levels of productivity, security and agility.

    Sponsored By Citrix

  • White Papers // Mar 2015

    ESG: Mobile Workspaces: Deliver the Optimum User Experience While Enabling Mobility and Productivity

    Mobility is more than a technology—it’s a work style that delivers significant value to organizations of all sizes. To realize the benefits, consider a mobile workspace solution to securely and seamlessly deliver the apps and data people need to stay productive on any device, over any network.

    Sponsored By Citrix

  • Research // Feb 2015

    Top 10 Mobile Technologies and Capabilities for 2015 and 2016

    Gartner discusses 10 technologies and capabilities that will be critical to organizations wanting to unlock the full potential of mobility as part of their digital business strategy. Download this Gartner report, compliments of Dell. Gartner, Top 10 Mobile Technologies and Capabilities for 2015 and 2016, Nick Jones, 14 February...

    Sponsored By Dell

  • White Papers // Feb 2015

    Tablets That Work for Business

    Tablets designed for work as well as play finally are robust enough to overcome barriers to enterprise adoption. Here’s a look at how enterprise tablets differ from their consumer cousins -- and how their use can open doors to new opportunities. Sponsored by:

    Sponsored By Dell

  • White Papers // Feb 2015

    Making the Most of Data for Education

    Today’s schools face a serious data problem. The problem isn’t that there’s too little data flowing through schools — or even that there’s too much of it — but rather that its use is too limited to provide the actionable insights into student performance that educators need. Student data, as...

    Sponsored By Dell

  • White Papers // Feb 2015

    Transforming Your Business with Tablets

    Tablets are increasingly finding their way into the workplace as workers become accustomed to their portability and ease of use, but a number of obstacles often prevent tablets from being used as a primary business device. Download this paper to better understand these challenges, see how Dell Venue tablets can...

    Sponsored By Dell

  • White Papers // Feb 2015

    Mobility Myth Busting: BYOD, Tablets, and Mobile Apps

    Mobile technology may be reshaping business strategy, but many organizations are mired in antiquated thinking about mobility that keeps them from realizing its full potential. We expose three mobility myths and lay bare the truth about implementing an effective mobile strategy. Sponsored by:

    Sponsored By Dell

  • White Papers // Feb 2015

    A New Model for Teaching and Learning

    In an era when we challenge the status quo and institute new standards for teaching and learning, policy makers seek effective models. When we see success, we question how to take what works in that setting and recreate it in other places. The Science Leadership Academy, a partnership high school...

    Sponsored By Dell

  • White Papers // Apr 2015

    Virtual Machines: Bigger, Faster, and more Agile

    Microsoft Azure Virtual Machines allow you to deploy a wide range of computing solutions in an agile way. With Virtual Machines, you can deploy nearly instantaneously and you pay only by the minute. With Windows, Linux, SQL Server, Oracle, IBM, SAP, and BizTalk, you can deploy any workload, any language,...

    Sponsored By Microsoft

  • White Papers // Apr 2015

    Thriving In Small Places

    In the last 10 years, office cubbicle has shrunk 64% which means than producitty has been affected too. This whitepaper give you useful space hacks to help you be one with a smaller, more open and productive worplace.

    Sponsored By Hewlett-Packard (HP)

  • Live Event // May 2015

    Master the Mobile Mindshift: Engineer your business

    Mobility has produced a mind shift with your customers. They have become the consumers of now. They demand an exceptional mobile user experience anytime and anywhere. Forrester Research calls this the mobile moment, a point in time when someone pulls out a mobile device to get what they want –...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2015

    Enterprise Mobility Management Buyers Guide

    This EMM buyers guide will walk you through the process of selecting the right mobile solution to fit your company’s BYOD objectives. It explains how an effective EMM system can support an organisation's workforce mobility strategy, ensure compliance, protect corporate data and provide centralised management of devices and apps while...

    Sponsored By Sophos

  • White Papers // Mar 2015

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably - so it's easy to get confused about which type of protection is right for you. This Manager's Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

    Sponsored By Sophos

  • Downloads // Apr 2014

    Simplify remote IT administration with DameWare Remote Support

    Support hundreds of end-users without having to leave your desk. DameWare Remote Support is an easy to-use sysadmin tool that lets you manage servers and workstations remotely, and deliver faster support for end-users. From a single, user-friendly interface, initiate multiple remote sessions with Windows®, Linux®, and Mac OS® X systems....

    Sponsored By SolarWinds

  • Videos // Apr 2015

    Insider's Guide to Mobile Apps - Webinar

    Building mobile apps that can transform business is on everyone's 2015 to-do list, but how do you avoid common pitfalls? In this webinar, Pivotal’s Dormain Drewitz asks Farhan Thawar, VP of Engineering at Pivotal Labs, what they have learned in their decade-long experience building great apps for all industries. Learn:...

    Sponsored By Pivotal ANZ

  • Research // Nov 2014

    Busting Myths About Mobility

    Innovations in mobile computing have radically changed the way we interact. Now they’re changing the way we do business. While many companies still see mobile solutions as too costly, risky or hard to manage, organizations that see beyond these misconceptions gain access to tremendous possibilities across the enterprise. Dell found...

    Sponsored By Dell and Intel

  • White Papers // May 2015

    How to Build an Always-On Infrastructure

    Real-time customer expectations are driving the need for an always-on business environment. To keep pace with these demands, organisations need to deploy innovative, mobile solutions and manage explosive data growth, while also reducing risk and costs. To gain a competitive advantage, organisations need an always-on infrastructure that is future...

    Sponsored By Hitachi Data Systems

  • White Papers // May 2015

    Hitachi Data Systems Road to Map to Software-Defined Infrastructure

    Social and big data analytics, cloud and mobility offer you a competitive advantage. And a portfolio of infrastructure automation and virtualisation software as part of your software-defined infrastructure (SDI) solution empowers your mobile workforce with greater access to information. Learn more on how SDI can help you chart your course...

    Sponsored By Hitachi Data Systems

  • Downloads // Apr 2014

    Stadiums race to digitize (PDF download)

    Younger fans are leaving stadiums when they can't get connected, so sports teams are finally embracing technology as a way to improve the fan experience and increase the team’s bottom line. Download the full feature article from TechRepublic's Teena Hammond in magazine format as a free PDF that you can...

    Provided By TechRepublic

  • White Papers // Feb 2014

    Anatomy of a Cyber-Attack

    As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

    Provided By Dell Software

  • eBooks // Feb 2014

    Systems Engineering for Dummies

    This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products. If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for...

    Provided By IBM

  • White Papers // Jun 2014

    Magic Quadrant for Intrusion Prevention Systems

    According to Gartner, “Leaders produce products that embody NGIPS capabilities, provide high signature quality and low latency, innovate with or ahead of customer challenges (such as providing associated advanced targeted attack, ATA, technologies to make enriched IPS intelligence) and have a range of models. Leaders continually win selections and are...

    Provided By Sourcefire, Inc.

  • Downloads // Oct 2008

    Quickly export Outlook e-mail items to Excel

    Exporting e-mail messages from Outlook to Excel is easier than you might think. This technique uses sample VBA code to automate the process, allowing you to specify exactly which fields to copy.This download is also available as an entry in our Microsoft Office blog.

    Provided By Susan Harkins

  • White Papers // Oct 2014

    Integration Patterns

    Throughout the history of the IT industry, integration has been an important part of most projects. Integration of transactions, integration of data, or integration of processes have their own challenges and associated patterns and anti-patterns. In an age of mobile, social, and cloud, integration is more important than ever, but...

    Provided By IBM

  • White Papers // Aug 2014

    What to Look For When Evaluating NGFW

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

    Provided By Dell Software

  • White Papers // Feb 2014

    How Traditional Firewalls Fail

    Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.

    Provided By Dell Software

  • White Papers // Jun 2014

    Gartner Whitepaper: Notebook Total Cost of Ownership: 2013 Update

    The gap between desktop and notebook total cost of ownership continues to close, but tablets are also being considered as notebook replacements. Infrastructure and operations leaders should use this analysis to support their endpoint adoption decision.Find out how much your Notebook solution is costing you with this whitepaper report from...

    Provided By Dell and Intel®

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Provided By IBM

  • White Papers // Dec 2003

    Document Tracking System - Using RFID to Track Documents

    Radio Frequency Identification is an upcoming technology for tracking and identifications. Document tracking system help to keep and manage knowledge gained in every project. Data written in a document can be managed effectively. Information and experience obtained during earlier project can be reused in a later project. A good document...

    Provided By Intensecomp

  • Downloads // Jan 2008

    10 techniques for gathering requirements

    It's difficult to build a solution if you don't know the requirements. The "elicitation" step is where the requirements are first gathered from the client, and there are lots of ways to go about it. Each technique has value in certain circumstances, and you'll often need multiple techniques to gain...

    Provided By Tom Mochal

  • White Papers // Mar 2010

    NCTUns 6.0: A Simulator for Advanced Wireless Vehicular Network Research

    NCTUns is a novel network simulator/emulator that has many unique features over traditional network simulators/ emulators. By adopting an innovative kernel re-entering simulation methodology, NCTUns provides many unique and important advantages over traditional network simulators and emulators. For example, NCTUns directly uses the real-life TCP/IP protocol stack in the Linux...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2010

    Effective Realization of QoS , Network Scalability in Term of Network Security Using Symmetric Algorithm

    Computer networks able to support multimedia applications with diverse QoS performance requirements are evolving. To ensure that multimedia applications will be guaranteed the required QoS, Presently, there are various kinds of networks; wired and wireless that co-exists with each other. These networks have QoS characteristics that are drastically different and...

    Provided By Kurukshetra University

  • White Papers // Jul 2014

    Stepping Into the Cloud:  A Practical Guide to Creating and Implementing a Successful Cloud Strategy

    There’s no such thing as “the cloud,” says this Frost & Sullivan executive brief. It’s more useful to think of the cloud as shorthand for a range of service and deployment models. This practical guide offers steps for moving your company into the cloud, at whatever pace you prefer, with...

    Provided By IBM

  • White Papers // Jul 2014

    Compensation Made Simple

    Using market-based salary data to align your organization’s compensation strategy with those in the same recruiting market can enable your organization to stay competitive and improve employee engagement and retention. Read this paper to learn more about: How a business's lifecycle influences employee compensation, Why market-based salary data...

    Provided By IBM

  • White Papers // Aug 2014

    Secure Mobile Access

    Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.

    Provided By Dell Software

  • eBooks // Aug 2014

    Achieve Deeper Network Security and Application Control

    Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we know it. Traditional firewalls that only focus on stateful packet inspection and access control rules are not effective in today’s advanced-threat environment.

    Provided By Dell Software

  • Downloads // Apr 2008

    How do I... Install and configure a DNS server in Windows Server 2008?

    As many of you are probably aware, DNS is now the name resolution system of choice in Windows. Without it, computers would have a very tough time communicating with each other. However, most Windows administrators still rely on WINS for name resolution on local area networks and some have little...

    Provided By Steven Warren

  • Downloads // Feb 2009

    How to print multiple labels for a single record in Access

    Label printing is often more complex than generating a single label for each record. Users might need one label for multiple records or multiple labels for one record -- or something in between. Susan Harkins offers a VBA alternative that's more flexible than the Access wizard.This article portion of this...

    Provided By Susan Harkins

  • White Papers // Dec 2009

    PID Controller Design for Following Control of Hard Disk Drive by Characteristic Ratio Assignment Method

    The author present PID controller design for following control of hard disk drive by characteristic ratio assignment method. The study in this paper concerns design of a PID controller which sufficiently robust to the disturbances and plant perturbations on following control of hard disk drive. Characteristic Ratio Assignment (CRA) is...

    Provided By King Mongkut's Institute of Technology Ladkrabang

  • White Papers // Feb 2009

    Building a Low Latency Infrastructure for Electronic Trading

    As the global financial markets continue to shift towards electronic trading, the speed at which trading is able to take place establishes the winners and the losers among participants in the trading chain. Latency, wherever and however it is introduced, is the enemy of speed. Market participants are continuously driving...

    Provided By Sun Microsystems