Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Downloads // Oct 2013

    Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • White Papers // Oct 2013

    Comparing Data Center Power Distribution Architectures

    Significant improvements in efficiency, power density, power monitoring, and reconfigurability have been achieved in data center power distribution, increasing the options available for data centers. This paper compares five power distribution approaches including panelboard distribution, field-wired PDU distribution, factory-configured PDU distribution, floor-mount modular power distribution, and modular busway, and describes...

    Sponsored By APC by Schneider Electric

  • White Papers // Oct 2013

    IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks, such as: ...

    Sponsored By Kaspersky Lab

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Sponsored By Dell & Microsoft

  • Podcasts // Sep 2013

    Implementing Single Sign-On for Office 365: Why must it be so complex?

    Learn more from Microsoft expert Randy Franklin Smith. View the webinar now!

    Sponsored By Centrify

  • Webcasts // Aug 2013

    On-demand Webcast: Choosing the right online productivity suite: Office 365 vs. Google Apps

    Today's productivity suites offer far more than just word processing, spreadsheets, and email. They're also no longer restricted to the desktop. Cloud-based suites from Microsoft and Google provide the standard productivity apps as well as collaboration, conferencing, and file storage. But choosing between Office 365 and Google Apps (or whether...

    Sponsored By Centrify

  • White Papers // Aug 2013

    Business Insight: Enabling User Mobility with Enterprise Security Solutions

    The belief that “work is something you do, not somewhere you are,” is taking hold for much of the corporate work force. Savvy business leaders have embraced the benefits of user mobility, including: Increased productivity Improved customer relationships (through increased face time) Greater resilience in the face of...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    iPads and iPhones have emerged as powerful and secure mobile platforms for corporate, academic and government organizations. The problem? When using 4G/3G hotspots, mobile devices must support VPN connectivity to ensure security; however,when inside corporate networks, mobile devices should be able to take advantage of the security offered by next-generation...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Controlling Laptop and Smartphone Access to Corporate Networks

    Organizations today are grappling with the double-edged sword that is mobility. Smartphones, tablets and laptops are not only conduits of greater access and information flow, but can also serve as a vehicle for malware and other security threats. Companies that rely strictly on Remote Desktop Protocol (RDP) solutions are more...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Making Smarter Mobile Access Decisions

    Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Aug 2013

    Enterprise Information Security in Transition: An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Aug 2013

    A Prescription for IT Efficiency

    Ever-growing concerns over hospital and patient security should incite IT professionals in the healthcare sector to focus on reducing risk. Because of its age, Windows XP poses a measurable security risk on every desktop where it’s still deployed. A timely move to modern Windows brings with it enhanced security, faster...

    Sponsored By Dell & Microsoft

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Jul 2013

    360 Degrees: A Holistic Guide for Your SAP HANA Journey

    From its conception, this special edition has had a simple goal: to help SAP customers better understand SAP HANA and determine how they can best leverage this transformative technology in their organization. Accordingly, we reached out to a variety of experts and authorities across the SAP ecosystem to provide a...

    Sponsored By SAP

  • White Papers // Jul 2013

    IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps

    With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integration with iOS application platforms, from the mobile device and endpoint functionality to server-side concerns, with an approach that also addresses the...

    Sponsored By IBM

  • White Papers // Jul 2013

    Magic Quadrant for Data Center Network Infrastructure

    The requirements for data center networking equipment have evolved rapidly, with emerging technologies increasingly focused on supporting more automation and simplified operations within a virtualized data center. This new Magic Quadrant focuses on how vendors are meeting the emerging requirements.

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • Case Studies // Jul 2013

    Equifax

    As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it...

    Sponsored By IBM

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Protection in the Age of BYODs

    You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world. Is your IT department a roadblock that employees go...

    Sponsored By Kaspersky Lab

  • White Papers // Apr 2013

    Impact of Hot and Cold Aisle Containment on Data Center Temperature and Efficiency

    Both hot-air and cold-air containment can improve the predictability and efficiency of traditional data center cooling systems. While both approaches minimize the mixing of hot and cold air, there are practical differences in implementation and operation that have significant consequences on work environment conditions, PUE, and economizer mode hours. The...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    Implementing Hot and Cold Air Containment in Existing Data Centers

    Containment solutions can eliminate hot spots and provide energy savings over traditional uncontained data center designs. The best containment solution for an existing facility will depend on the constraints of the facility. While ducted hot aisle containment is preferred for highest efficiency, cold aisle containment tends to be easier and...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    Deploying High-Density Pods in a Low-Density Data Center

    Simple and rapid deployment of self-contained, high-density pods within an existing or new low-density data center is possible with today’s power and cooling technology. The independence of these high-density pods allow for predictable and reliable operation of high-density equipment without a negative impact on the performance of existing low-density power...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    The business of social business.

    A new IBM Institute for Business Value study reveals how organizations can use social approaches to create meaningful business value.

    Sponsored By IBM

  • White Papers // Apr 2013

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Sponsored By IBM

  • White Papers // Apr 2013

    The future of email and application is social.

    This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

    Sponsored By IBM

  • White Papers // Apr 2013

    Rethinking Your Enterprise Security: Critical Priorities to Consider

    In this informative white paper, explore the changing landscape of enterprise security. Learn why traditional security approaches fall short in the face of new and emerging workplace trends, and see how you can address critical security priorities - read on to learn more

    Sponsored By HP

  • White Papers // Apr 2013

    Getting the Most Out of Your Next-Generation Firewall

    Network administrators are encountering the highest levels of change in history as they attempt to balance security with productivity. Rapidly evolving business trends are challenging them to provide widespread but safe Internet access, allowing employees to use legitimate business applications while using their device of choice. Applications have evolved to...

    Sponsored By Cisco

  • White Papers // Mar 2013

    Go from analysis to action on your desktop: IBM Cognos Insight guides business analysts to faster, better outcomes

    Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate...

    Sponsored By IBM

  • White Papers // Mar 2013

    IDC Analyst Paper - Expert Integrated Systems: A Next Generation Computing Platform

    This white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform....

    Sponsored By IBM

  • White Papers // Mar 2013

    Systems with integrated expertise

    With expert integrated systems, you could consolidate workloads to reduce the total cost of ownership for your IT infrastructure. A new category of systems could help simplify your IT infrastructure, help you deliver new services more rapidly and add capacity cost-effectively.

    Sponsored By IBM

  • White Papers // Mar 2013

    Businesses are ready for a new approach to IT

    With IBM PureSystems, you can consolidate workloads to reduce the total cost of ownership for your IT infrastructure. Simplify your IT infrastructure and reduce data center complexity. Deliver new services more rapidly and add capacity cost-effectively.

    Sponsored By IBM

  • Webcasts // Feb 2013

    The new frontier. Securing mobile apps

    Smartphones, tablets, and other app-enabled devices are overtaking PCs as the dominant collaboration devices in enterprises. Many organizations are struggling with understanding the implications of developing and deploying apps to new mobile platforms such as iOS and Android. Which risks should app developers be concerned with? What are the new...

    Sponsored By IBM