Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • White Papers // Jul 2013

    Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // May 2013

    The Move to Exchange 2013: Migraine or Migration?

    Executing a trouble-free migration of your mission-critical Exchange messaging solution is far from simple. Learn how the key considerations and planning tools available in this white paper can make your Microsoft® Exchange 2013 migration a success.

    Sponsored By Dell Software

  • White Papers // May 2013

    Top 10 Steps to Ensure a Successful Migration to Exchange 2013

    For organizations migrating to Microsoft® Exchange 2013, it’s not an issue of whether to migrate, but rather how to begin the process. Learn top 10 ways to ensure a successful and cost-effective Exchange migration in this white paper from Dell™.

    Sponsored By Dell Software

  • White Papers // Apr 2013

    Implementing Hot and Cold Air Containment in Existing Data Centers

    Containment solutions can eliminate hot spots and provide energy savings over traditional uncontained data center designs. The best containment solution for an existing facility will depend on the constraints of the facility. While ducted hot aisle containment is preferred for highest efficiency, cold aisle containment tends to be easier and...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    Impact of Hot and Cold Aisle Containment on Data Center Temperature and Efficiency

    Both hot-air and cold-air containment can improve the predictability and efficiency of traditional data center cooling systems. While both approaches minimize the mixing of hot and cold air, there are practical differences in implementation and operation that have significant consequences on work environment conditions, PUE, and economizer mode hours. The...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    Enterprise Security in Transition - An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Feb 2013

    Building Identity-based Security into Today’s Information Systems - Secure By Design

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.

    Sponsored By IBM

  • White Papers // Jan 2013

    Restructuring, Consolidating, and Merging Active Directory, What You Need to Know Before You Start

    You can’t afford to make any mistakes when changing Active Directory domains. Whether merging, restructuring or consolidating domains, learn why having a solid plan is critical for your business using the best practices in this white paper.

    Sponsored By Dell Software

  • White Papers // Aug 2012

    Mobilizing the Enterprise with Off-the-Shelf Apps and Custom Mobile Solutions

    This whitepaper compares and contrasts these two approaches - "off-the-shelf" mobile apps vs. custom mobile solutions - summarizes their pros and cons and pinpoints the role for each in mobilizing enterprises.

    Sponsored By SAP

  • White Papers // Jul 2014

    Forrester White Paper: Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions

    This Trend Micro-commissioned profile of North American, European, and Asia Pacific IT security decision-makers from companies with 100 to 5,000 employees evaluates the current endpoint security solution market based on Forrester’s own market data, and a custom study of the same audience.

    Provided By TrendMicro

  • eBooks // Jun 2014

    Beyond Next-Generation Firewalls

    Cyberattacks are increasing every year, in both number and variety. But whether the malicious goal is money, espionage or disruption, you can protect your network and your business by applying the right security technology. Malicious actors have been innovating at a ferocious pace, and three- or four-year-old firewalls simply...

    Provided By Dell Software

  • White Papers // Jun 2014

    Fast and Furious: How to Get The Best Digital Customer Experience.

    A smartphone in every pocket and ubiquitous wireless have combined to change the way consumers do pretty much everything. From researching to shopping to buying to communicating about the entire experience in the moment. The challenge for IT is in developing engagement opportunities that make sense on the mobile platform,...

    Provided By Century Link & HP

  • eBooks // Jun 2014

    Hybrid Cloud - Strategies for Innovative Businesses

    The public cloud turned traditional IT on its head. When anyone can spin up servers in an instant and you only pay for what you use, the barriers to innovation melt away. In businesses of all sizes, innovators and experimenters are using the public cloud to get around traditional barriers...

    Provided By Rackspace

  • White Papers // Jun 2014

    Magic Quadrant for Intrusion Prevention Systems

    According to Gartner, “Leaders produce products that embody NGIPS capabilities, provide high signature quality and low latency, innovate with or ahead of customer challenges (such as providing associated advanced targeted attack, ATA, technologies to make enriched IPS intelligence) and have a range of models. Leaders continually win selections and are...

    Provided By Sourcefire, Inc.

  • White Papers // Jun 2014

    Addressing the Full Attack Continuum

    Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure.These advanced attacks are very difficult to detect, remain...

    Provided By Sourcefire, Inc.

  • White Papers // Jun 2014

    6 Tasks You Can't Do with Traditional IT Operational Tools

    Traditional IT monitoring tools designed for static physical environments can overwhelm administrators with low-level information and often do not provide visibility into the factors that are causing poor performance. Read this guide to find out how taking control of your vSphere environment with vCenter™ Operations Management is the smart choice...

    Provided By VMware

  • Case Studies // Jun 2014

    Schneider Electric Case Study

    Global energy management giant based in France rolled out Box to 67,000 employees, enabled BYOD, and boosted productivity. Use Box for RFPs, vendor collaboration, executives, sales presentations. Cut server costs by 30%. Energy industry, large company, EMEA, global, sales LOB, BYOD, server replacement.

    Provided By Box

  • White Papers // Jun 2014

    The New World of Collaboration

    The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now...

    Provided By Box

  • White Papers // Jun 2014

    Three Best Practices to Help Enterprises Overcome BYOD Challenges

    An increasing number of white-collar workers in the United States use a mobile device for work. This new Bring-Your-Own-Device (BYOD) environment presents challenges for IT managers and business leaders. This paper discusses how IT managers can address those challenges, as well as best practices for ensuring security and productivity.

    Provided By AVI-SPL

  • White Papers // Jun 2014

    The State of Video Conferencing Security

    Video conferencing equipment, found in almost every boardroom around the world, may be opening up companies to serious security breaches. Demonstrations have proved that there is a myriad of information that can be gleaned—from confidential discussions to the ability to zoom in and read top-secret documents—once a video conference system...

    Provided By AVI-SPL

  • White Papers // Jun 2014

    Osterman Report: Office 365 for the Enterprise

    Osterman Research outlines how third parties are required to strengthen security, compliance and control.

    Provided By Mimecast

  • White Papers // Jun 2014

    The Importance of Continuity in Office 365

    Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?

    Provided By Mimecast

  • White Papers // May 2014

    EMC’s Flash Strategy

    Beyond the hardware, a key part of EMC’s differentiation and strategy (and likely a glimpse at the future in our newly software-defined world) is software. This is not only the caching algorithms and management protocols for all the hardware mentioned above, but also EMC Fully Automated Storage Tiering (FAST) that...

    Provided By EMC

  • White Papers // May 2014

    Top Things You Should Know About 802.11ac

    802.11ac is faster, goes further, even for legacy 802.11n clients and is more secure. Plus, 802.11ac is more power efficient, extending battery life over 30%. Get the 802.11ac In-Depth Whitepaper and find out more about this state-of-the-art Wi-Fi technology!

    Provided By Aruba Networks

  • White Papers // May 2014

    Wi-Fi Access For Mobile Devices In High-Security Environments

    The Aruba Tunneled Internet Gateway lets mobile device users wirelessly access the Internet without compromising the security of the restricted network. Unsecure Internet traffic is logically and cryptographically separated from restricted network traffic across the entire network.

    Provided By Aruba Networks

  • Downloads // May 2014

    The gadget with a conscience (PDF download)

    Fairphone has pulled off the impossible by selling a phone that makes social responsibility its flagship feature. Here's the unlikely story of how the team did it, and what's next. Download the full feature article from Jo Best in magazine format as a free PDF that you can read on...

    Provided By TechRepublic

  • White Papers // May 2014

    Bloor Research: Essential Email Security

    Email as a business record, requires high standards of security to be applied so that employees of an organisation can communicate and collaborate with each other and with customers and business partners effectively and efficiently without falling prey to the threats posed by email-borne malware and data leakage or exfiltration....

    Provided By Mimecast

  • Downloads // May 2014

    Recover from a Network Configuration Error in Under Five Minutes

    Researchers say that over 80% of network outages are caused by human error. Many errors are made when someone makes changes to a device configuration. When a network outage occurs, the standard triage questions are "what just happened", "did something fail or was something changed", and "how do we get...

    Provided By SolarWinds

  • White Papers // May 2014

    Living with BYOD in Your Organization

    Explore the benefits and risks of BYODA and how to effectively manage BYODA within your organization. Download the White Paper to learn about the 5 key factors about BYOD and BYOA as well as some essentials steps in effectively managing your device and how to protect your organization.

    Provided By Citrix Online

  • White Papers // May 2014

    Successfully Supporting the Mobile Knowledge Worker

    Learn six tactics for delivering valued services and support to the fast-growing group of mobile knowledge workers. Download to learn how to develop and support policy, how to communicate and collaborate with stakeholders and why you should adopt the "new IT everything" attitude plus much more!

    Provided By Citrix Online

  • White Papers // May 2014

    EMC VNXe: Enterprise Features, Entry-level Simplicity

    The need for advanced IT capabilities isn’t limited to big companies. Competent IT is an important philosophy these days, and organizations of all sizes are coming to depend on the functional capability, good economic value, and the competitive advantage that technology can provide. EMC’s new VNXe provides functional capabilities typically...

    Provided By EMC

  • White Papers // May 2014

    Why Data Domain: Slow backups got you down?

    Traditional backups are just too slow, inefficient and unreliable for the typical data centre of today. If it’s bad now, it’s only going to get worse with more severs and more data to protect. Someone once said, the definition of insanity is continuing to do the same thing over and...

    Provided By EMC

  • White Papers // May 2014

    The Forrester Wave™: File Sync and Share Platforms

    Consumerization Has Made File Sync And Share A Must-Have Capability The explosive proliferation of powerful mobile devices has led to employee demand for solutions that will allow seamless access to enterprise content from any device. Solutions like Dropbox, originally developed for consumer usage, have barged into the enterprise, forcing IT...

    Provided By EMC

  • White Papers // May 2014

    Best Practices for Security and Compliance with Amazon Web Services

    Organizations must take an active role in protecting systems and applications as part of the AQS shared security model. This paper discusses what part of the shared responsibility equation customers are responsible for and recommended practices that help create a security cloud-computing environment.

    Provided By Trend Micro

  • White Papers // May 2014

    Mitigating Targeted Attacks Requires an Integrated Solution

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Provided By Trend Micro

  • White Papers // May 2014

    IBM's New Ultra-dense, Hyper-Scale NeXtScale Server Environment

    IBM NeXtscale System is changing system design dynamics in the HPC marketplace with ultra-dense servers. Enterprises looking for raw computing power and throughput to handle technical computing, cloud, grid and analytics should evaluate this new ultra-dense, highly scalable systems design. Read the paper by Clabby Analytics to learn more.

    Provided By IBM

  • Videos // May 2014

    The Fast, Simple, Scalable and Complete Storage Solution

    Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability,...

    Provided By IBM

  • Downloads // May 2014

    IBM Platform LSF Evaluation/Download

    IBM Platform LSF is a powerful workload management platform for demanding, distributed HPC environments. It provides a comprehensive set of intelligent, policy-driven scheduling features that enable you to utilize all of your compute infrastructure resources and ensure optimal application performance.

    Provided By IBM

  • White Papers // May 2014

    STAC Report: IBM BigInsights vs Apache Hadoop, using SWIM - How PC accelerates

    In an audited benchmark conducted by STAC®, the Securities Technology Analysis Center, InfoSphere BigInsights for Hadoop was found to deliver an approximate 4x performance gain on average over open source Hadoop running jobs derived from production workload traces. The result is consistent with an approximate eleven times advantage in raw...

    Provided By IBM

  • White Papers // May 2014

    The Cloud Revolution

    Today, cloud computing not only has changed how data is stored, but is permanently altering the role of information technology. In this ebook, we’ll look at IT’s new role in business strategy: producing new revenue streams, guiding the way through the hosted options, taming new cloud-based app workflows, and using...

    Provided By Acquia