Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • White Papers // Aug 2014

    Real-Time Analytics and Reporting for SMBs

    SAP solution brief providing insights on the latest advances in in-memory computing technology for analysis and reporting. Explore the benefits of analytics and make decisions faster, improve employee productivity and increase ROI.

    Sponsored By SAP

  • White Papers // Aug 2014

    Google Infographic: Personal Devices at Work

    This infographic explores the implications of BYOD and how Google Apps for Business helps users work seamlessly across all the personal devices they choose to use. Know the trends, understand employee habits and see the gains that can be had when managing personal devices in the work place....

    Sponsored By Google Apps for Business

  • White Papers // Aug 2014

    Security Considerations When Undergoing a Network Refresh

    Corporate networks are under a constant state of siege - not just from threats but from the pressure of supporting the ever-growing number of clients, devices and platforms that have resulted from the BYOD phenomena. Network demands will only increase as we move to the internet of things adding sensors...

    Sponsored By HP

  • White Papers // Aug 2014

    Building a Better Network Security Strategy

    In today's global, always-on world, network security is crucial. Enterprises need to ensure that employees accessing their networks are secure at all times. A comprehensive network security solution needs to include a number of factors, including • Network reliability • Resources for managing the network • Network features and...

    Sponsored By HP

  • White Papers // Jun 2014

    VMware AlwaysOn Workplace Solution for Financial Services

    Exceptional customer interactions result in satisfied customers and long-term engagements. Yet meeting customer expectations can prove difficult—and costly—if frontline employees cannot access critical client data or financial services applications because the data center or their desktop is down. As financial services firms look for ways to increase both customer and...

    Sponsored By VMware

  • Downloads // Mar 2014

    Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    up.time is enterprise-level IT monitoring that’s up to 50% more cost effective than traditional “Big 4” monitoring tools. Get the comprehensive features, deep reporting, and proactive monitoring you need for a unified view of IT performance, availability, and capacity. up.time monitors across platforms, including all infrastructure (servers, VMs, network devices)...

    Sponsored By Uptime Software

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • White Papers // Jul 2014

    Reducing Expenses Starts with the Programming Skills of Operations Groups

    Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today’s new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the...

    Sponsored By F5

  • White Papers // Apr 2014

    How to Fill the Threat Management Gateway Void

    The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. In choosing a new solution, it’s important for decision-makers to ensure that the solution they select includes the features and functionality necessary to ensure safe and...

    Sponsored By F5

  • Research // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • Case Studies // Jan 2014

    MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

    Sponsored By F5

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • White Papers // May 2014

    Evolving Your IT Services in a Modern Mobile World

    To stay competitive, IT solution providers must evolve their IT services offering and embrace the modern needs of mobility through service-oriented and mobile safeguard technology. Get enabled to answer the IT service calls of clients wanting to get connected to their data, stay connected to their data and ensure they...

    Sponsored By LabTech Software APAC

  • Research // Aug 2014

    Gartner’s Best Practices for Implementing Automation

    Follow a systematic approach. Opportunistic implementations may backfire, leading to incompatibilities and added expense and risk. Read Gartner’s advice for maximizing the benefits of data center automation.

    Sponsored By HP

  • Videos // Aug 2014

    PointClickCare drives to 80% automation

    Learn how PointClickCare used HP Service Anywhere to accelerate process improvements and share knowledge, allowing them to identify recurring problems and automate the triage of over 80% of their cases.

    Sponsored By HP

  • White Papers // Aug 2014

    Turn Data Into Knowledge - Social Collaboration Empowers a More Intelligent Service Desk

    Extract social knowledge for the help desk. Connect business and IT into one conversation to improve service quality and business results. Download this whitepaper to learn more.

    Sponsored By HP

  • White Papers // Jul 2014

    Ten Critical Requirements for Cloud Applications

    Many Organizations are freeing up their valuable resources for strategic activities by deploying cloud applications that are less costly and complex. So the need to differentiate between the real cloud providers and applications from the imposters has become crucial. The purpose of this document is to help technology and business...

    Sponsored By Workday

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Sep 2014

    Forrester Research Report: Big Data Hadoop Solutions

    This comprehensive research report details the findings about how well each solution fulfils the criteria, shows where the vendors stand in relation to each other, and helps technology management professionals select the right Hadoop solution for their business needs.

    Sponsored By MapR

  • White Papers // Sep 2014

    Hadoop Buyer’s Guide

    Acquiring, deploying and integrating all the moving parts that make up the Hadoop ecosystem can be challenging for even the best IT organisations. Make sure you choose the right solution with the Hadoop Buyer's Guide, by Robert D. Schneider, the author of Hadoop for Dummies. This comprehensive reference goes...

    Sponsored By MapR

  • White Papers // Sep 2014

    Executive Guide to Big Data and Apache Hadoop

    This special edition ebook, from the author of Hadoop for Dummies, contains everything you need to know to get started with Big Data and Hadoop. It also recommends how to evaluate Hadoop’s platform offerings so you can meet your business objectives. Download this ebook to learn critical big data...

    Sponsored By MapR

  • White Papers // Apr 2014

    IBM: Surviving the Technical Security Skills Crisis

    As new threats emerge every day, the need for qualified security staff is growing - but there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security...

    Sponsored By IBM

  • White Papers // Sep 2014

    Biz & Tech Insights: Win with data - Get the upper hand against data deluge

    The rising tide of data is demanding more out of enterprises than ever before. Organisations that have successfully managed to ride this data wave and extract insights from it have been successful in propelling their business forward. Take a look at the difference effective data management can make to your...

    Sponsored By IBM

  • White Papers // Jun 2014

    Gartner Whitepaper: Notebook Total Cost of Ownership: 2013 Update

    The gap between desktop and notebook total cost of ownership continues to close, but tablets are also being considered as notebook replacements. Infrastructure and operations leaders should use this analysis to support their endpoint adoption decision.Find out how much your Notebook solution is costing you with this whitepaper report from...

    Provided By Brought to you by Dell and Intel® Core™ vPro™ processor family

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • White Papers // Jan 2014

    Unified Communications

    Organizations are largely relying on TCO and ROI models in determining whether or not to invest in a unified communications (UC) solution. But what other factors are they considering? Read the white paper “Mobility And Business Outcomes Are Driving The Adoption Of Unified Communications” to get a clear picture of...

    Provided By IBM

  • White Papers // Jul 2014

    Preparing for IEEE 802.11ac

    This business white paper discusses the history that led to the IEEE 802.11ac standard and the considerations you need to weigh before you decide to deploy it. This new WLAN technology is being introduced in the market in two waves. Topics that will be addressed in this paper are: ...

    Provided By HP US

  • White Papers // Feb 2014

    FTP vs MFT: Why it’s time to make the change

    Get the facts you need to make the case for managed file transfer. Read the report to get head-to-head comparisons of cost, reliability, visibility, security & management and get the information you need to make a compelling case for moving to MFT.

    Provided By IBM

  • White Papers // Jan 2014

    Sophisticated attacks WP

    We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you...

    Provided By IBM

  • Downloads // Apr 2014

    Stadiums race to digitize (PDF download)

    Younger fans are leaving stadiums when they can't get connected, so sports teams are finally embracing technology as a way to improve the fan experience and increase the team’s bottom line. Download the full feature article from TechRepublic's Teena Hammond in magazine format as a free PDF that you can...

    Provided By TechRepublic

  • White Papers // May 2014

    STAC Report: IBM BigInsights vs Apache Hadoop, using SWIM - How PC accelerates

    In an audited benchmark conducted by STAC®, the Securities Technology Analysis Center, InfoSphere BigInsights for Hadoop was found to deliver an approximate 4x performance gain on average over open source Hadoop running jobs derived from production workload traces. The result is consistent with an approximate eleven times advantage in raw...

    Provided By IBM

  • White Papers // Jul 2014

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Provided By HP US

  • White Papers // Jul 2014

    Maximize your UC&C Outcomes

    Unified communications and collaboration (UC&C) solutions like Microsoft® Lync® are transforming the workplace. With presence, real-time voice, HD video, and rich collaboration capabilities seamlessly integrated into their office productivity suite, today’s employees can engage customers and connect with colleagues and partners from anywhere, at any time, using any device. Read...

    Provided By HP US

  • Downloads // Mar 2007

    Use Microsoft Message Queuing in C# for inter-process communication

    Microsoft Message Queuing (MSMQ) is a way to send messages to a queue for later processing. The messages are sent to the queue by a "Producer" application, and retrieved from the queue by a "Consumer" application. These two applications can be on the same machine, across a network, or even...

    Provided By Zach Smith

  • White Papers // Jun 2005

    Problem Management - Key Best Practices

    The ITIL framework supplies an excellent relational model on how to manage Incidents, Problems and Changes. But this model becomes much more powerful when best practices are applied; such as planning and documenting Roles and Responsibilities, proper Operational Metrics and defined processes for Knowledge Management, Root Cause Analysis, ROI Calculation...

    Provided By NetworkD

  • White Papers // May 2014

    HP Infographic: Are you on the path to great mobile app performance?

    Mobile app has been enormously in demand nowadays. This infographic provides the latest statistics about the rising expectations for mobile app performance. Discover how mobile app monitoring delivered huge benefits for both operations and customer service. Find out how-and learn new insights-by reading our report.

    Provided By HP US

  • White Papers // Feb 2014

    An IT Practitioner's Guide: Security best practices for file-based data movement

    Data security for file-based data movement is finally getting the attention it deserves. What was once a concern only in the financial services sector is now being treated seriously by all industries as they wake up to the liability and risk associated with the unsecured movement of files.

    Provided By IBM

  • White Papers // May 2014

    Implementation guide for a facilities management system

    Successful implementation of a facilities management system begins with a business case - and focuses on business goals as technology deployment proceeds. This guide addresses business goals in key facilities management areas and includes an overview of the software implementation process.

    Provided By IBM

  • Videos // Apr 2014

    HP Z Workstations. Take your designs to the top faster.

    This fast-paced video gives you tips and tools of the trade that show you how to get work done even faster on HP Z Workstations. Hear stories, insights and anecdotes from top-notch video producers, FX specialists, and production agencies on the front lines of the post-production industry. The information is...

    Provided By Hewlett-Packard (HP)

  • White Papers // May 2012

    A Simple Tool for Self Compacting Concrete Mix Design

    SCC can be made from any of the constituents that are generally used for structural concrete. In the mix design of SCC, the relative proportions of key components are generally considered by volume rather than by mass. On the basis of these proportions, a simple tool has been designed for...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)