Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Videos // Aug 2014

    Video: TruPhone Western Pegasus

    Find out how global gauge supplier, Western Pegasus, maximize business opportunities across the world with Truphone’s unique mobile solution.

    Sponsored By Truphone

  • White Papers // Aug 2014

    2014 International business communication trends

    A recent survey of Australian businesses found that over 40 per cent of businesses face major challenges in managing the cost of international communications. With three in five respondents sending employees abroad for business four times a year, and one in 10 experiencing mobile bills of over $5000 from a...

    Sponsored By Truphone

  • White Papers // Aug 2014

    The disconnect between Australian business travellers and IT directors on international mobile usage

    A survey of IT managers and business travellers found a significant disconnect around policy when staying connected for business, and uncovered a number of business impacts to limiting mobile usage globally.

    Sponsored By Truphone

  • White Papers // Aug 2014

    Security Considerations When Undergoing a Network Refresh

    Corporate networks are under a constant state of siege - not just from threats but from the pressure of supporting the ever-growing number of clients, devices and platforms that have resulted from the BYOD phenomena. Network demands will only increase as we move to the internet of things adding sensors...

    Sponsored By HP

  • White Papers // Aug 2014

    Building a Better Network Security Strategy

    In today's global, always-on world, network security is crucial. Enterprises need to ensure that employees accessing their networks are secure at all times. A comprehensive network security solution needs to include a number of factors, including • Network reliability • Resources for managing the network • Network features and...

    Sponsored By HP

  • Downloads // Aug 2014

    Improving Customer Service with First-Class Remote Support

    Want to provide excellent customer support, while minimizing operational costs? Organizations like you are turning to remote support solutions to connect to various devices and pull system diagnostics, push configurations and view the device to deliver personalized, hands-on support. Rescue from LogMeIn, provides a sophisticated set of core...

    Sponsored By LogMeIn Rescue

  • White Papers // Aug 2014

    Google Infographic: Personal Devices at Work

    Employees behaviours are changing. This infographic explores the implications of BYOD and how Google Apps for Business helps users work seamlessly across all the personal devices they choose to use. View the infographic and see the latest trends.

    Sponsored By Google Apps for Business

  • White Papers // Jun 2014

    Gartner Whitepaper: Notebook Total Cost of Ownership: 2013 Update

    The gap between desktop and notebook total cost of ownership continues to close, but tablets are also being considered as notebook replacements. Infrastructure and operations leaders should use this analysis to support their endpoint adoption decision.Find out how much your Notebook solution is costing you with this whitepaper report from...

    Provided By Brought to you by Dell and Intel® Core™ vPro™ processor family

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • White Papers // Jan 2014

    Unified Communications

    Organizations are largely relying on TCO and ROI models in determining whether or not to invest in a unified communications (UC) solution. But what other factors are they considering? Read the white paper “Mobility And Business Outcomes Are Driving The Adoption Of Unified Communications” to get a clear picture of...

    Provided By IBM

  • White Papers // Jul 2014

    Preparing for IEEE 802.11ac

    This business white paper discusses the history that led to the IEEE 802.11ac standard and the considerations you need to weigh before you decide to deploy it. This new WLAN technology is being introduced in the market in two waves. Topics that will be addressed in this paper are: ...

    Provided By HP US

  • White Papers // Feb 2014

    FTP vs MFT: Why it’s time to make the change

    Get the facts you need to make the case for managed file transfer. Read the report to get head-to-head comparisons of cost, reliability, visibility, security & management and get the information you need to make a compelling case for moving to MFT.

    Provided By IBM

  • White Papers // Jan 2014

    Sophisticated attacks WP

    We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you...

    Provided By IBM

  • Downloads // Apr 2014

    Stadiums race to digitize (PDF download)

    Younger fans are leaving stadiums when they can't get connected, so sports teams are finally embracing technology as a way to improve the fan experience and increase the team’s bottom line. Download the full feature article from TechRepublic's Teena Hammond in magazine format as a free PDF that you can...

    Provided By TechRepublic

  • White Papers // May 2014

    STAC Report: IBM BigInsights vs Apache Hadoop, using SWIM - How PC accelerates

    In an audited benchmark conducted by STAC®, the Securities Technology Analysis Center, InfoSphere BigInsights for Hadoop was found to deliver an approximate 4x performance gain on average over open source Hadoop running jobs derived from production workload traces. The result is consistent with an approximate eleven times advantage in raw...

    Provided By IBM

  • White Papers // Jul 2014

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Provided By HP US

  • White Papers // Jul 2014

    Maximize your UC&C Outcomes

    Unified communications and collaboration (UC&C) solutions like Microsoft® Lync® are transforming the workplace. With presence, real-time voice, HD video, and rich collaboration capabilities seamlessly integrated into their office productivity suite, today’s employees can engage customers and connect with colleagues and partners from anywhere, at any time, using any device. Read...

    Provided By HP US

  • Downloads // Mar 2007

    Use Microsoft Message Queuing in C# for inter-process communication

    Microsoft Message Queuing (MSMQ) is a way to send messages to a queue for later processing. The messages are sent to the queue by a "Producer" application, and retrieved from the queue by a "Consumer" application. These two applications can be on the same machine, across a network, or even...

    Provided By Zach Smith

  • White Papers // Jun 2005

    Problem Management - Key Best Practices

    The ITIL framework supplies an excellent relational model on how to manage Incidents, Problems and Changes. But this model becomes much more powerful when best practices are applied; such as planning and documenting Roles and Responsibilities, proper Operational Metrics and defined processes for Knowledge Management, Root Cause Analysis, ROI Calculation...

    Provided By NetworkD

  • White Papers // May 2014

    HP Infographic: Are you on the path to great mobile app performance?

    Mobile app has been enormously in demand nowadays. This infographic provides the latest statistics about the rising expectations for mobile app performance. Discover how mobile app monitoring delivered huge benefits for both operations and customer service. Find out how-and learn new insights-by reading our report.

    Provided By HP US

  • White Papers // Feb 2014

    An IT Practitioner's Guide: Security best practices for file-based data movement

    Data security for file-based data movement is finally getting the attention it deserves. What was once a concern only in the financial services sector is now being treated seriously by all industries as they wake up to the liability and risk associated with the unsecured movement of files.

    Provided By IBM

  • White Papers // May 2014

    Implementation guide for a facilities management system

    Successful implementation of a facilities management system begins with a business case - and focuses on business goals as technology deployment proceeds. This guide addresses business goals in key facilities management areas and includes an overview of the software implementation process.

    Provided By IBM

  • Videos // Apr 2014

    HP Z Workstations. Take your designs to the top faster.

    This fast-paced video gives you tips and tools of the trade that show you how to get work done even faster on HP Z Workstations. Hear stories, insights and anecdotes from top-notch video producers, FX specialists, and production agencies on the front lines of the post-production industry. The information is...

    Provided By Hewlett-Packard (HP)

  • White Papers // May 2012

    A Simple Tool for Self Compacting Concrete Mix Design

    SCC can be made from any of the constituents that are generally used for structural concrete. In the mix design of SCC, the relative proportions of key components are generally considered by volume rather than by mass. On the basis of these proportions, a simple tool has been designed for...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Jun 2014

    Whitepaper: Datacom’s Multi-cloud Services

    Each cloud has its pros and cons: private can be too expensive, public often doesn’t fit organisations’ application requirements and hybrid can be too complicated. And each cloud services provider brings different challenges to the table, such as the inability to scale on demand, uncontrollable costs and unreliable security.Find out...

    Provided By EMC

  • White Papers // Apr 2014

    Using Convergence to Simplify Mobility

    Common misconceptions about unified communications (UC) and mobility may lead IT to dismiss UC solutions, but there’s more to UC than VoIP and more to mobility than cell phones. Find out what UC really is and how it can solve a host of problems for your mobile workers, whether they...

    Provided By Windstream Communications

  • Downloads // Dec 2010

    The 10 most useful Gmail shortcuts

    If you're a keyboard fan, you may want to view Google's built-in list of seventy billion Gmail shortcuts. But if you're a keyboard fan with a lot of work to do, maybe this short list will be more helpful.This download is also available as an entry in our 10...

    Provided By Jody Gilbert

  • Downloads // Aug 2010

    10 tips for effective Active Directory design

    The way you design your Active Directory can make a huge difference in how well your network functions and how easy it is to administer. These best practices will help you maximize efficiency, simplify maintenance, and readily manage AD as needs change. This download is also available as

    Provided By Brien Posey

  • White Papers // Jun 2014

    Osterman Report: Office 365 for the Enterprise

    Osterman Research outlines how third parties are required to strengthen security, compliance and control.

    Provided By Mimecast

  • White Papers // Jun 2014

    The Importance of Continuity in Office 365

    Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?

    Provided By Mimecast

  • Downloads // Jul 2008

    Track a user's Internet Explorer History with IEHistoryView

    Tracking a user's browsing history can be both an expensive and a daunting task, especially if you're a one-man shop in a small company. IEHistoryView from NirSoft is a simple, yet powerful, tool you can use to quickly see a user's browsing history. This download is also available as an...

    Provided By Wally Bahny

  • White Papers // May 2011

    Authentication Schemes for Session Passwords Using Color and Images

    Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text...

    Provided By Andhra University

  • White Papers // Mar 2013

    A New Algorithm of the Data Mining Model in Cloud Computing Based on Web Fuzzy Clustering Analysis

    Cloud computing are Internet-based services to increase the use and delivery models, usually involving the Internet to provide easy to dynamically scalable and often virtualized resources. To solve these problems, the proposed web data mining method based on cloud computing: the massive data mining tasks decomposed into parallel processing on...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Dec 2007

    Develop and Execute a Channel Strategy

    Channels are the means by which one sells products to the customers. Channel strategy helps identify those sales channels and processes that yield the highest return for one's company. Channel strategy includes recommendations for both identifying and managing channel partners. Channel marketing is a dynamic and complex arena where mistakes...

    Provided By Microsoft Tips

  • White Papers // Jul 2013

    Essential IPAM Vol 1: TCP/IP Networking

    This article examines TCP/IP networking with an emphasis on protocol layers and the interactions of these layers. Specifically this paper will provide an overview of: Networking Models IP Addressing IP Packets and IP Routing The Transport Layer, UDP and TCP

    Provided By SolarWinds

  • Downloads // Apr 2008

    How do I... Install and configure a DNS server in Windows Server 2008?

    As many of you are probably aware, DNS is now the name resolution system of choice in Windows. Without it, computers would have a very tough time communicating with each other. However, most Windows administrators still rely on WINS for name resolution on local area networks and some have little...

    Provided By Steven Warren

  • White Papers // Apr 2014

    Forrester report: Measuring Mobile Apps

    A new Forrester report says developers need to improve their mobile measurement savvy. Get a fresh perspective on the importance of metrics and monitoring. Read the report and discover the value of applications performance measurement.

    Provided By HP US

  • White Papers // Apr 2014

    5 truths about app monitoring

    Mobile apps have changed the world. App monitoring has to change too. Find out how-and gain fresh insights-by reading our white paper.

    Provided By HP US

  • Videos // May 2014

    Connected Intelligence: unleash the power of Big Data in the New Style of IT Operations

    A video that will give you insights on how to deliver end-to-end visibility of infrastructure performance across newer virtualised and cloud environments. Watch this video now and learn how HP helped organisations improve their efficiencies and service qualities.

    Provided By HP US

  • White Papers // May 2014

    HP whitepaper: Know the Big Three

    This white paper discusses the top three mobile application security threats facing businesses today. Read this report and learn some insights on how to mitigate the risks from security vulnerabilities.

    Provided By HP US