Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • White Papers // Jan 2014

    Virtual Desktops in the Cloud: Changing the Face of Desktop Security

    With an increasingly competitive and hostile business operating environment, it is important to identify and minimize risks, while embracing changes that allow us to thrive and grow in the marketplace. This paper will briefly examine the evolution of the personal computing environment and how organizations can reduce security risk while...

    Sponsored By Desktone

  • White Papers // Jan 2014

    BYOD & the Implications for IT: How to Support BYOD without Putting Your Company at Risk

    The predictions that many industry pundits have been making about the rise of BYOD (bring your own device) are coming to fruition. The surprise is that it is happening at a much-accelerated rate at businesses of all sizes, around the world. While BYOD is increasingly important for employee satisfaction, it...

    Sponsored By Desktone

  • White Papers // Jan 2014

    Guidance for Calculation of Efficiency (PUE) in Data Centers

    Before data center infrastructure efficiency can be benchmarked using PUE or other metrics, there must be agreement on exactly what power consumptions constitute IT loads, what consumptions constitute physical infrastructure, and what loads should not be counted. Unfortunately, commonly published efficiency data is not computed using a standard methodology, and...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    High Efficiency Indirect Air Economizer-based Cooling for Data Centers

    Of the various economizer (free cooling) modes for data centers, using fresh air is often viewed as the most energy efficient approach. However, this paper shows how indirect air economizer-based cooling produces similar or better energy savings while eliminating risks posed when outside fresh air is allowed directly into the...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Specification of Modular Data Center Architecture

    There is a growing consensus that conventional legacy data center design will be superseded by modular scalable data center designs. Reduced total cost of ownership, increased flexibility, reduced deployment time, and improved efficiency are all claimed benefits of modular scalable designs. Yet the term “modular”, when and where modularity is...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Data Center Projects: Growth Model

    Long term data center or network room capacity planning may seem impossible in the face of evolving IT technology and business requirements. Nevertheless, data center facilities have a lifetime that may span many generations of IT equipment, so planning – or lack of planning – can have a large impact...

    Sponsored By Schneider Electric

  • White Papers // Jan 2014

    Google Apps - The leader in Cloud Business Email

    According to a report by The Radicati Group, 27% of the world’s business inboxes now live in the cloud. This whitepaper takes a detailed look into cloud business email and addresses reasons why The Radicati Group has positioned Google as one of the leaders of the pack. Read more.

    Sponsored By Google

  • White Papers // Jan 2014

    Adding Zero-Day Offense to Vulnerability Management

    This paper describes why your organization is vulnerable to zero day attacks and what you can do to add a zero-day offense to existing vulnerability management processes. It also describes how the Qualys Zero-Day Risk Analyzer enhances capabilities of the QualysGuard Cloud Platform with targeted intelligence and workflow to...

    Sponsored By Qualys

  • White Papers // Jan 2014

    Bring ROI to Your BYOD - Forrester Documents Benefits of Managed Mobility

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this study, you’ll learn how to improve workplace flexibility, reduce overhead and admin costs and increase productivity.

    Sponsored By IBM

  • eBooks // Jan 2014

    Putting the Design in Responsive Design

    Mobile devices are rapidly becoming the predominant consumer choice, with adoption increasing daily as PC sales diminish in response.Designing your digital site for desktop or laptop, as well as tablets and smartphones within a single codebase, is called responsive design. The promise of responsive design? A single, digital site optimized...

    Sponsored By Acquia

  • Tools & Templates // Jan 2014

    Calculate how much Brocade VCS Fabric technology can lower your TCO

    The era of the costly and complex networks is over. Brocade® VCS® Fabric technology can dramatically improve your network efficiency, utilization, and performance while significantly reducing TCO at the same time. See for yourself by completing the calculations and discovering your potential savings.

    Sponsored By Brocade

  • White Papers // Jan 2014

    IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Management

    For IT personnel looking to manage cross-platform workloads, IBM VMControl can provide an advanced solution. Read the white paper and learn why this technology beats the competition in terms of automated provisioning, systems integration and resource pooling. Also see how this environment offers advanced image management and higher resilience.

    Sponsored By IBM

  • White Papers // Jan 2014

    5 Common Mistakes in Application/IT Infrastructure Monitoring

    Everyone knows they need monitoring to ensure their site uptime and keep their business humming. Yet many sites still suffer from outages that are first reported by their customers. Having managed data center operations for decades, we have lots of experience with monitoring systems of all kinds, and these...

    Sponsored By LogicMonitor

  • Case Studies // Jan 2014

    MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

    Sponsored By F5

  • White Papers // Jan 2014

    The Top Three Characteristics for a Successful Enterprise Mobility Strategy

    Mobile devices can benefit your business by not only allowing your employees to be productive while on-the-go, but also by enhancing your business processes and service delivery. However, IT must create a proactive, institution-wide mobile strategy in order to capitalize on these benefits. Read this white paper to learn...

    Sponsored By SAP

  • White Papers // Jan 2014

    Virtualization and Cloud Monitoring - 9 reasons why SaaS makes more sense

    SaaS monitoring systems are architected to allow for seamless, unified monitoring of the entire IT ecosystem, regardless of whether it's physical, virtual, or in the cloud. But the “SaaS versus on-premise” equation is different for every technology. There are some solution types where a SaaS approach has special benefits that...

    Sponsored By LogicMonitor

  • White Papers // Jan 2014

    Upgrade keys to a Successful OS Migration

    April 8, 2014 marks the end of support for Windows XP, so the time is now to develop an OS migration strategy. Check out this infographic highlighting the Keys to an OS upgrade and learn more about the technology and resources available.

    Sponsored By Dell & Microsoft

  • White Papers // Jan 2014

    Establishing a Logical Perimeter The Evolution of Network Security

    The boundaries of the modern enterprise have undergone massive changes, and these shifts are causing IT, security and networking teams to fundamentally reevaluate the way they think about and manage the network. It is no secret that near-universal Internet connectivity has changed society and user behavior along with it. Users...

    Sponsored By Palo Alto Networks

  • White Papers // Jan 2014

    Still Using Proxies for URL Filtering? There’s a Better Way

    Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and...

    Sponsored By Palo Alto Networks

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • White Papers // Dec 2013

    Cloud Resource Management the Right Way

    Find out how Red Hat® CloudForms gives IT administrators and managers a comprehensive solution to optimize their virtual, private cloud, and hybrid cloud infrastructures with advanced capacity planning and sophisticated resource management capabilities.

    Sponsored By Red Hat

  • White Papers // Dec 2013

    Lenovo Recommends: 15 Steps to Reducing Security Risks In Enterprise Mobility

    This checklist is designed to help you identify key steps to take to minimize the potential for security breaches and loss of data associated with mobile devices. Although every enterprise is unique, these 15 points will provide you with a strong foundation for assessing your current mobile security plans and...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    The Compelling Case for Touch-Enabled Notebooks, Now!

    One of the most important changes to IT infrastructure resulting from the rapid rise of BYOD and mobility is the move to touch- or gesture-based interfaces. Most consumer apps and many versions of business applications are now touch-enabled and many more will be in the next 12 months. End...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    Multi-Mode Notebooks & the Next Wave of End User Computing

    This whitepaper examines multi-mode notebooks and the next wave of end user computing. End user computing in the enterprise has gone through more change in the last two to three years than in the 10 years prior. An era of new devices, new touch-enabled interfaces, new applications and literally thousands...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    3 ways clinicians can leverage a patient portal to craft a healthcare community

    You probably have several goals for your patient portal of choice. Is “community” one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process.

    Sponsored By Healthtech Holdings

  • White Papers // Dec 2013

    Patient Portals: A Platform for Connecting Communities of Care

    Connecting patient health data across the care continuum is essential to achieve improved care, increased access to personal health records and lowered costs. A successful approach rests in having the hospital serve as the connectivity hub for bringing patients, care givers and healthcare professionals together in a secure, online environment....

    Sponsored By Healthtech Holdings

  • White Papers // Dec 2013

    Gartner Names Rally a Magic Quadrant Leader

    Your market moves fast. AndAgile is a proven business advantage for keeping pace with rapidly changing markets. See why so many organizations like yours have chosen Rally to help make this important Agile transition.

    Sponsored By Rally Software

  • White Papers // Dec 2013

    The Seven Deadly Sins of Agile Measurement

    With Agile scaling to larger and larger projects, programs and organizations, how can you understand the impact it's having, and how do you know what to measure to find out? Get your copy of The Seven Deadly Sins of Agile Measurement. Find out what matters and what doesn't. This paper...

    Sponsored By Rally Software

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Keep only the data you want

    In today’s information economy, organizations are facing unfathomable data growth rates. In fact, Aberdeen Group estimates that data is growing at a rate of 56% year over year. And now, the big data phenomenon means data is growing in every single operational and analytic application. In fact, data is growing...

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Security AppScan

    IBM® Security AppScan® enables organizations to assess the security of their applications and achieve regulatory compliance by identifying vulnerabilities and generating reports with intelligent fix recommendations to ease remediation.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Worklight Developer Edition

    IBM® Worklight is an open, comprehensive, and advanced mobile application platform that helps organizations extend their business to mobile devices. Try it today.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Endpoint Manager

    IBM Endpoint Manager lowers the total cost of managing and securing mobile devices, laptops, desktops, and servers – physical or virtual, on or off-network, personally or corporate-owned.

    Sponsored By IBM

  • White Papers // Nov 2013

    We’re no.1 for a Reason

    Alaska Communications is proud to be recognized as a world leader in Ethernet, and the first and only carrier in Alaska with Carrier Ethernet 2.0 Certified services. Our Business Ethernet is designed to provide the best performing and most reliable network for even the most demanding and complex network environments....

    Sponsored By Alaska Communications

  • White Papers // Nov 2013

    Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

    Mobility has brought down the wall between business and personal, spiking corporate productivity and putting work/life balance within reach. The bring-your-own-device (BYOD) phenomenon is a way to be constantly connected for work, family, and play. Companies that do not adapt and allow people to work where, when, and how they...

    Sponsored By Cisco

  • Webcasts // Nov 2013

    On-demand Webcast - Enterprise mobile security done right with Samsung KNOX and Centrify

    Centrify for Samsung KNOX is included as a standard feature set of Samsung KNOX and provides complete Active Directory based Mobile Device Management and Zero Sign-On sign-on for KNOX devices. As a result of Centrify's integration with KNOX, organizations can leverage Centrify's cloud service to comprehensively manage Android users and...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Sponsored By Centrify

  • White Papers // Oct 2013

    HP ProLiant Gen8 Servers Pave the Way for Growing Small and Midsize Companies (IDG Tech Dossier)

    This dossier provides an in-depth look at HP's Gen8 servers and provides decision-making guidance on their technical features and performance capabilities that make them ideal for SMB customers. Sponsored by HP and Intel® Xeon® Processor : Intel, the Intel logo, Xeon, and...

    Sponsored By HP & Intel® Xeon® Processor

  • eBooks // Oct 2013

    Top 6 Project Breakdowns (and How to Fix Them)

    Project management is either one of those things that you are really good at, and you can breeze right through without any issues, or it's something that drives you crazy. Every business owner has experienced some form of project failure, but why? Study the top reasons that projects fail to...

    Sponsored By ConnectWise