Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Downloads // Nov 2013

    IBM Security AppScan

    IBM® Security AppScan® enables organizations to assess the security of their applications and achieve regulatory compliance by identifying vulnerabilities and generating reports with intelligent fix recommendations to ease remediation.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Worklight Developer Edition

    IBM® Worklight is an open, comprehensive, and advanced mobile application platform that helps organizations extend their business to mobile devices. Try it today.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Endpoint Manager

    IBM Endpoint Manager lowers the total cost of managing and securing mobile devices, laptops, desktops, and servers – physical or virtual, on or off-network, personally or corporate-owned.

    Sponsored By IBM

  • White Papers // Nov 2013

    We’re no.1 for a Reason

    Alaska Communications is proud to be recognized as a world leader in Ethernet, and the first and only carrier in Alaska with Carrier Ethernet 2.0 Certified services. Our Business Ethernet is designed to provide the best performing and most reliable network for even the most demanding and complex network environments....

    Sponsored By Alaska Communications

  • White Papers // Nov 2013

    Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

    Mobility has brought down the wall between business and personal, spiking corporate productivity and putting work/life balance within reach. The bring-your-own-device (BYOD) phenomenon is a way to be constantly connected for work, family, and play. Companies that do not adapt and allow people to work where, when, and how they...

    Sponsored By Cisco

  • Webcasts // Nov 2013

    On-demand Webcast - Enterprise mobile security done right with Samsung KNOX and Centrify

    Centrify for Samsung KNOX is included as a standard feature set of Samsung KNOX and provides complete Active Directory based Mobile Device Management and Zero Sign-On sign-on for KNOX devices. As a result of Centrify's integration with KNOX, organizations can leverage Centrify's cloud service to comprehensively manage Android users and...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Sponsored By Centrify

  • White Papers // Oct 2013

    HP ProLiant Gen8 Servers Pave the Way for Growing Small and Midsize Companies (IDG Tech Dossier)

    This dossier provides an in-depth look at HP's Gen8 servers and provides decision-making guidance on their technical features and performance capabilities that make them ideal for SMB customers. Sponsored by HP and Intel® Xeon® Processor : Intel, the Intel logo, Xeon, and...

    Sponsored By HP & Intel® Xeon® Processor

  • eBooks // Oct 2013

    Top 6 Project Breakdowns (and How to Fix Them)

    Project management is either one of those things that you are really good at, and you can breeze right through without any issues, or it's something that drives you crazy. Every business owner has experienced some form of project failure, but why? Study the top reasons that projects fail to...

    Sponsored By ConnectWise

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • White Papers // Oct 2013

    IDC paper - Extending PC Life-Cycle Management and Client Virtualization with VMware Horizon Mirage

    PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than...

    Sponsored By VMware

  • Downloads // Oct 2013

    Intel® VTune ™ Amplifier XE 2013

    Advanced performance and thread profiler for C, C++, C#, Fortran, Java, and MPI developers. New pre-sets deliver easier ‟point and shoot” profiling set-up. A threading timeline, data filtering, frame analysis, and source display make it easier to tune your application for today’s and tomorrow’s processors. Powerful bandwidth and memory access...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • White Papers // Oct 2013

    Comparing Data Center Power Distribution Architectures

    Significant improvements in efficiency, power density, power monitoring, and reconfigurability have been achieved in data center power distribution, increasing the options available for data centers. This paper compares five power distribution approaches including panelboard distribution, field-wired PDU distribution, factory-configured PDU distribution, floor-mount modular power distribution, and modular busway, and describes...

    Sponsored By APC by Schneider Electric

  • White Papers // Oct 2013

    IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks, such as: ...

    Sponsored By Kaspersky Lab

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Sponsored By Dell & Microsoft

  • Podcasts // Sep 2013

    Implementing Single Sign-On for Office 365: Why must it be so complex?

    Learn more from Microsoft expert Randy Franklin Smith. View the webinar now!

    Sponsored By Centrify

  • Webcasts // Aug 2013

    On-demand Webcast: Choosing the right online productivity suite: Office 365 vs. Google Apps

    Today's productivity suites offer far more than just word processing, spreadsheets, and email. They're also no longer restricted to the desktop. Cloud-based suites from Microsoft and Google provide the standard productivity apps as well as collaboration, conferencing, and file storage. But choosing between Office 365 and Google Apps (or whether...

    Sponsored By Centrify

  • White Papers // Aug 2013

    Business Insight: Enabling User Mobility with Enterprise Security Solutions

    The belief that “work is something you do, not somewhere you are,” is taking hold for much of the corporate work force. Savvy business leaders have embraced the benefits of user mobility, including: Increased productivity Improved customer relationships (through increased face time) Greater resilience in the face of...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    iPads and iPhones have emerged as powerful and secure mobile platforms for corporate, academic and government organizations. The problem? When using 4G/3G hotspots, mobile devices must support VPN connectivity to ensure security; however,when inside corporate networks, mobile devices should be able to take advantage of the security offered by next-generation...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Controlling Laptop and Smartphone Access to Corporate Networks

    Organizations today are grappling with the double-edged sword that is mobility. Smartphones, tablets and laptops are not only conduits of greater access and information flow, but can also serve as a vehicle for malware and other security threats. Companies that rely strictly on Remote Desktop Protocol (RDP) solutions are more...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Making Smarter Mobile Access Decisions

    Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Aug 2013

    Enterprise Information Security in Transition: An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Aug 2013

    A Prescription for IT Efficiency

    Ever-growing concerns over hospital and patient security should incite IT professionals in the healthcare sector to focus on reducing risk. Because of its age, Windows XP poses a measurable security risk on every desktop where it’s still deployed. A timely move to modern Windows brings with it enhanced security, faster...

    Sponsored By Dell & Microsoft

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Jul 2013

    360 Degrees: A Holistic Guide for Your SAP HANA Journey

    From its conception, this special edition has had a simple goal: to help SAP customers better understand SAP HANA and determine how they can best leverage this transformative technology in their organization. Accordingly, we reached out to a variety of experts and authorities across the SAP ecosystem to provide a...

    Sponsored By SAP

  • White Papers // Jul 2013

    IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps

    With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integration with iOS application platforms, from the mobile device and endpoint functionality to server-side concerns, with an approach that also addresses the...

    Sponsored By IBM

  • White Papers // Jul 2013

    Magic Quadrant for Data Center Network Infrastructure

    The requirements for data center networking equipment have evolved rapidly, with emerging technologies increasingly focused on supporting more automation and simplified operations within a virtualized data center. This new Magic Quadrant focuses on how vendors are meeting the emerging requirements.

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • Case Studies // Jul 2013

    Equifax

    As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it...

    Sponsored By IBM

  • White Papers // Jul 2013

    File Sharing: Risk or Remedy?

    Ever-increasing file sizes. Document-centric, complex collaboration needs. Two big reasons organizations are turning to cloud file sharing (CFS) as a lightweight but effective solution. Read this complimentary report and learn more about: Document-centric collaboration and how to complement your existing ECM ecosystem with CFM applications Feature...

    Sponsored By Box

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Protection in the Age of BYODs

    You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world. Is your IT department a roadblock that employees go...

    Sponsored By Kaspersky Lab