Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Webcasts // Feb 2013

    Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications and the business value they deliver attracts hackers and cyber criminals to target Web-based applications to steal data, disrupt operations,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile device environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This...

    Sponsored By IBM

  • White Papers // Feb 2013

    Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.

    Sponsored By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile environments

    As mobile device use in the workplace continues to increase rapidly, more organizations are placing mobile application security as a top security priority. For different types of mobile applications, there are many potential vulnerabilities attackers can exploit to gain access to sensitive data. Providing security for mobile applications requires the...

    Sponsored By IBM

  • White Papers // Feb 2013

    Safeguarding the cloud with IBM Security solutions

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds.

    Sponsored By IBM

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Delivering Success that Scales with the Largest Enterprises

    IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar ® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information...

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.

    Sponsored By IBM

  • White Papers // Feb 2013

    Secure By Design: Building Identity-based Security into Today’s Information Systems

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA&#8482) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.

    Sponsored By IBM

  • White Papers // Feb 2013

    IBM zSecure Compliance and Administration

    IBM Security zSecure&#8482 Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administration. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events...

    Sponsored By IBM

  • White Papers // Feb 2013

    Identity and Access Intelligence: Transforming Enterprise Security

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA&#8482) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • White Papers // Feb 2013

    IDC: Mobile Video Collaboration - The New Business Reality

    The powerful combination of mobility and real-time video communications is further enhanced by the bring-your-own-device (BYOD) trend in mobility. This consumerization of IT brings to bear a number of new concerns about liability, privacy, and security. As a result, enterprise IT stakeholders are rapidly building a strategy for BYOD through...

    Sponsored By Polycom

  • White Papers // Jan 2013

    Types of Electrical Meters in Data Centers

    There are several different types of meters that can be designed into a data center, ranging from high precision power quality meters to embedded meters (i.e. in a UPS or PDU). Each has different core functions and applications. This white paper provides guidance on the types of meters that might...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2013

    Introducing Social Business for the Mid-Market.

    Aberdeen has studied the business practices of 229 mid-sized companies surveyed for the 2011 Aberdeen Business Review and 61 mid-sized companies profiled in Aberdeen's 2011 Social Collaboration Research. Mid-market organization can achieve strategic benefits from optimizing their Social Business deployments and achieving Best-in-Class status. This report provides directional guidance for...

    Sponsored By IBM

  • White Papers // Oct 2012

    Big Data: Trends, Strategies, and SAP Technology

    The intelligent economy has arrived. The convergence of intelligent devices, social networking, pervasive broadband communications, and analytics is redefining relationships among producers, distributors, and consumers of goods and services. The growth in volume, variety, and velocity of data has created new challenges and opportunities.

    Sponsored By SAP

  • White Papers // Apr 2012

    The Different Technologies for Cooling Data Centers

    There are 13 basic heat removal methods to cool IT equipment and to transport unwanted heat to the outdoor environment. This paper describes these fundamental cooling technologies using basic terms and diagrams. 11 of these methods rely on the refrigeration cycle as the primary means of cooling. Pumped refrigerant systems...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2014

    Forrester Report: Measuring Mobile Apps

    Developers need to improve their mobile measurement savvy. Many application development professionals have little to no skills in collecting real-time and operational metrics; that’s usually been the province of infrastructure and operations pros. But such thinking is both antiquated and dangerous. As requirements elicitation shifts from long textual requirements documents...

    Provided By Hewlett-Packard (HP)

  • Downloads // Apr 2014

    Stadiums race to digitize (PDF download)

    Younger fans are leaving stadiums when they can't get connected, so sports teams are finally embracing technology as a way to improve the fan experience and increase the team’s bottom line. Download the full feature article from TechRepublic's Teena Hammond in magazine format as a free PDF that you can...

    Provided By TechRepublic

  • Case Studies // Mar 2014

    Rightsize for #GenMobile and save

    Find out how a rightsized network can save up to 400% compared with a traditional network. There are alot of savings that business can make by swapping from traditional internet networks which are tethered to desks, to Wi-Fi internet access that is not tethered to a desk. This infographic shares...

    Provided By Aruba Networks

  • Case Studies // Mar 2014

    New norms of Wi-Fi networking

    Mobile devices and apps now demand a greater level of intelligence within Wi-Fi infrastructures. IT managers need to report and manage levels of bandwidth being used and ensure that Business-critical mobile apps remain accessible. This paper illustrates how Aruba’s Mobile Virtual Enterprise (MOVE) architecture helps business's unify Wired and Wi-Fi...

    Provided By Aruba Networks

  • White Papers // Mar 2014

    Platform Boot Integrity Platform Foundation for Foundation Trusted Compute Pools

    In this article we will take a deep look into ensuring boot integrity of the platform which in turn boils down to ensuring the integrity of a number of platform components: the integrity of prelaunch and launch components covering firmware, BIOS and hypervisor. Boot integrity is foundational in embodying the...

    Provided By Intel

  • White Papers // Mar 2014

    An Introduction to Virtual Service Oriented Grids

    While the idea of virtual service-oriented grids may be a new business concept, the technologies that build the groundwork for this idea go back many decades to the early days of computing research. That being said, the combination of these technologies brings non-functional, yet significant capabilities to a system. Virtual...

    Provided By Intel

  • White Papers // Mar 2014

    Moving To Office 365 On The Cloud

    We plan and design for change. After the change happens, we begin to plan for the next change. What drives change? Many factors drive change in technology--lower cost of equipment, better compute power, greater bandwidth, new software, and so on. In this article, we look at how Office 365, a...

    Provided By Intel

  • White Papers // Mar 2014

    The Trusted Cloud: Addressing Security and Compliance

    This article will address one of the biggest barriers impeding broader adoption of cloud computing is security--the real and perceived risks of providing, accessing and control services in multitenant cloud environments. IT managers would like to see higher levels of assurance before they can declare their cloud-based services and data...

    Provided By Intel

  • White Papers // Mar 2014

    Automation Brings Promise to IT Operations Management, but at What Cost?

    Summary: IT operations organizations will remain under pressure to increase their value proposition to the business while reducing the associated cost. Increased automation and the reduction of systemic complexity are paramount to this objective. Key Findings: IT operations organizations that do not move at the pace of change the business...

    Provided By frontrange

  • White Papers // Mar 2014

    Top 5 Malware Trends for 2014 and How to Combat Them

    Malware will continue to evolve and attacks will become more sophisticated this year. Increased use of mobile devices makes it more challenging to protect systems and data. Companies need a security solution that protects PCs, tablets, and smartphones against malware and web threats. Read More...

    Provided By Webroot Software

  • White Papers // Mar 2014

    Technical Report: Using NetApp and VMWAre to Build Your Cloud

    Many organisations are recognising the importance of their virtualised systems and how they can work more efficiently. Find out some insights on how on to build your own cloud at the same time lowering maintenance costs and reduce the time required to implement new applications and solutions.

    Provided By NetApp

  • White Papers // Mar 2014

    Grid Computing: Operations Research Methods for Resource Management and Scheduling

    The grid computing paradigm is replacing localized computer clusters or the traditional "supercomputer" model for research and industry enterprises requiring increasingly large amounts of processing power and storage. Computational grids are distributed systems integrating geographically-separate resources into a single, massively parallel network well-suited to complex processing tasks. This article introduces...

    Provided By Intel

  • White Papers // Mar 2014

    The Consequences of an Increasingly Overwhelmed Network Infrastructure on Business Critical Application Performance

    By identifying the fast-growing discrepancy between the capabilities of network infrastructure and application performance needs, end user organisations should be in a better position to gauge the potential impact, or risk, faced by their organisation. Currently the explosion of big data is overwhelming many networks and their ageing infrastructures. This...

    Provided By Barracuda Networks

  • White Papers // Mar 2014

    SIP Trunks – Keeping your UC Systems Secure

    The appeal of Session Initiation Protocol (SIP) trunks as a means of connecting UC systems to the outside world is growing in popularity. SIP trunks offer lower operating costs, more flexibility in ordering service and capacities and advanced features, such as virtual phone numbers in different geographies, which let companies...

    Provided By ShoreTel

  • White Papers // Mar 2014

    Client Virtualization in a Cloud Environment

    Arguably computation models seen in client space are much more diverse than those in the server space proper. For servers, there are essentially two, the earlier model of static consolidation and the more recent dynamic model where virtual machines lightly bound to their physical hosts and can be moved around...

    Provided By Intel

  • eBooks // Mar 2014

    Executive's guide to tablets in the enterprise

    Tablets are proving their worth as a useful tool for many business users. This guide looks at the current tablet landscape, what lies ahead, and how the devices are being used to enhance productivity.

    Provided By TechRepublic

  • White Papers // Mar 2014

    The Changing Face of Unified Communications

    In business environments, few variables are as important as communication. Although this is a simple consideration, it has far-reaching effects. After all, companies that are not able to effectively communicate and collaborate with external partners, clients and customers may soon find themselves facing diminishing returns and decreased profit margins. Internal...

    Provided By ShoreTel

  • White Papers // Feb 2014

    System Design: Get it Right the First Time (Aberdeen Group)

    This Aberdeen Group report offers guidance to help you improve your system design practices, and bring innovative products to market in less time and at reduced cost to meet your product revenue goals.

    Provided By IBM

  • White Papers // Feb 2014

    Content Analytics in Public Safety

    Ensuring the safety and protection of the general public in the United States employs millions of people, investigating and responding to millions of incidents and offenses each year, supported by millions of unstructured data sources and records. In this context, it is easy to appreciate why content analytics solutions are...

    Provided By IBM

  • White Papers // Feb 2014

    Ethernet Fabrics: The Foundation of Datacenter Network Automation and Business Agility

    Datacenter automation can deliver numerous benefits, including increased operational efficiency, business agility, faster time to opportunity and time to value, and lower operational expenditures. Various IT constituencies — application, compute/virtualization, storage — have invested in automation tools and technologies to achieve those results, and now networking professionals are joining their...

    Provided By Brocade Communications Systems

  • White Papers // Feb 2014

    Science Meets Assortment Optimization Report

    There is a fundamental shift under way in how retailers view assortment optimization and what they are asking of their trade partners. Uniform approaches typically yield average results, but tuning the mix to local demand can yield superior performance. The surest way to reach your exact assortment destination? Local demand.

    Provided By IBM

  • White Papers // Feb 2014

    The Who, What, Where, When and How of Real-time Personalization

    Personalization is on the rise as companies strive to meet customer expectations for a more customized and relevant experience. When used effectively, the rewards of personalization can be enormous—increasing sales and revenue, and enhancing online conversion rates.

    Provided By IBM

  • White Papers // Feb 2014

    Mobile: The New Marketing Frontier

    Consumers are leveraging innovative and richly functional mobile devices to become connected and empowered like never before, reshaping the consumer/marketer relationship and raising the stakes for marketers to utilize the mobile channel to engage shoppers and drive revenue.

    Provided By IBM

  • White Papers // Feb 2014

    10 Tips for Moving Social Media and Mobile Marketing out of Silos

    Read this white paper for 10 tips on integrating customer data across your marketing, and find out how to deliver personalized, seamless interactions through mobile, social media, and other channels to create lasting—and profitable—customer engagement.

    Provided By IBM

  • White Papers // Apr 2014

    Merchants Seek Mobile Mastery - A Task-Oriented Review of the Mobile Experience

    For the past 4 years, the e-tailing group has strived to be in the forefront of mobile by adapting their industry respected mystery shopping to the mobile channel. Objectives for the 2013 survey were to assess the year-over-year trends, highlight top mobile retailers and key in on best practices. Retailers...

    Sponsored By LogMeIn

  • Videos // Feb 2014

    Video Case Study: Sentara Healthcare

    Sentara Healthcare, a regional healthcare services provider based in Virginia, shares their success in using HP Performance Anywhere Software. HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s privacy statement.

    Sponsored By Hewlett-Packard (HP)

  • Downloads // Apr 2014

    Dameware - Provide secure remote support to end-users located anywhere in the world.

    With DameWare Remote Support you can: Support end-users and computers located both inside & outside your firewall Remotely control the desktop of Windows®, Mac OS X® and Linux computers Take advantage of extensive security and encryption capabilities, including multiple authentication methods Centrally manage shared host lists, users & administrators,...

    Sponsored By SolarWinds

  • White Papers // Dec 2013

    Lenovo Recommends: 15 Steps to Reducing Security Risks In Enterprise Mobility

    This checklist is designed to help you identify key steps to take to minimize the potential for security breaches and loss of data associated with mobile devices. Although every enterprise is unique, these 15 points will provide you with a strong foundation for assessing your current mobile security plans and...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    The Compelling Case for Touch-Enabled Notebooks, Now!

    One of the most important changes to IT infrastructure resulting from the rapid rise of BYOD and mobility is the move to touch- or gesture-based interfaces. Most consumer apps and many versions of business applications are now touch-enabled and many more will be in the next 12 months. End...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    Multi-Mode Notebooks & the Next Wave of End User Computing

    This whitepaper examines multi-mode notebooks and the next wave of end user computing. End user computing in the enterprise has gone through more change in the last two to three years than in the 10 years prior. An era of new devices, new touch-enabled interfaces, new applications and literally thousands...

    Sponsored By Lenovo

  • White Papers // Apr 2014

    Guidelines for deploying Citrix BYOD solutions

    Read this white paper to learn how Citrix can help you design, implement, deploy, maintain and support a BYOD infrastructure that will enable your environment for BYOD transformation and success.

    Sponsored By Citrix

  • White Papers // Apr 2014

    Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones

    Android and iOS-based consumer devices including smartphones and tablets play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with solutions from Citrix.

    Sponsored By Citrix

  • White Papers // Apr 2014

    Enterprise Mobility Management: Embracing BYOD Through Secure App & Data Delivery

    Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

    Sponsored By Citrix

  • White Papers // Apr 2014

    The 10 Must Haves for Secure Enterprise Mobility Management

    While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

    Sponsored By Citrix

  • White Papers // Apr 2014

    Taking Your Enterprise Mobile: An Executive Checklist

    According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise...

    Sponsored By Citrix

  • White Papers // Apr 2014

    Using DaaS to Create the Ideal Desktop User Experience Without a PC

    With the ubiquity of end-user computing long established, organizations now are grappling with a tough dilemma: Users want enterprise-class performance and availability, but they demand the flexibility to use familiar devices and applications—anywhere, and at any time. Download this whitepaper to learn why Desktops as a service (DaaS) can be...

    Sponsored By Desktone

  • eBooks // Apr 2014

    Liberate Your Commerce Platform without Selling the Family Farm

    This ebook offer a possible solution to businesses that already have made big investments in enterprise commerce platforms, but that also struggle to keep up with the quickly changing landscape of shopping experiences and business models. Drupal’s flexibility, scalability, and rapid deployment capability make it possible to build shiny...

    Sponsored By Acquia

  • White Papers // Feb 2014

    Mobile Security: How to Protect the Enterprise in the Mobile Era

    Learn about the three pillars of mobile security, and how they give users the flexibility and access they need while providing a strong foundation that protects systems and data.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Making Smarter Mobile Access Decisions

    Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.

    Sponsored By Dell Software

  • Podcasts // Mar 2014

    Workday Rising 2013: News Highlights

    Workday Rising 2013 in San Francisco got off to an exciting start with news announcements from Workday co-founders and co-CEOs Dave Duffield and Aneel Bhusri. Watch the highlights from those announcements in this five-minute video.

    Sponsored By Workday

  • White Papers // Feb 2012

    Basics of IP Address Subnetting

    IP Address Subnetting is a complicated topic that can be confusing for many IT professionals. While you may be using one of the free subnet calculators available on the internet, knowing the reasons behind it and why it works the way it does is critical for true success. This white...

    Provided By Global Knowledge

  • White Papers // Jul 2012

    IT Roles Facing Extinction

    Today, there's a huge amount of focus on getting more efficiency using virtualization, the cloud, Web 2.0, networking, and mobility. Better efficiency and innovation will reduce the number of technicians needed for certain tasks within the datacenter. The following are some of the key areas where traditional IT administration skill...

    Provided By Global Knowledge

  • White Papers // Sep 2012

    Building a Cisco Certification Lab

    Building a flexible lab environment is an essential and critical part of any certification study environment. The first step, either the CCENT or CCNA, requires an environment that is complete enough to cover all of the exam topics, but simple and inexpensive enough to easily construct. Learning concepts is important,...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    How to Secure Your Wireless Network

    It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...

    Provided By Sophos

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Mar 2013

    Troubleshooting Cisco Switches

    When an outage or network incident takes place, it can often create an intense burden for the engineers called upon to assist. As is the case with many emergencies, the demand for action and results may supersede more effective ways of resolving the issue(s) at hand. Having a solid strategy...

    Provided By Global Knowledge

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • White Papers // Jun 2013

    Mobile Device Management Buyers Guide

    Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...

    Provided By Sophos

  • White Papers // Jul 2011

    Fundamentals of SCSI and iSCSI

    SCSI (Small Computer Systems Interface), which is present in all personal, defines an initiator/target client/server relationship that includes addresses, commands, and specified operations. The SCSI model has numerous interfaces, including TCP/IP, fibre channel, directly attached parallel bus, and firewire. Fibre Channel and iSCSI are the two major choices for building...

    Provided By Global Knowledge

  • White Papers // Jan 2014

    Surviving the technical security crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Provided By IBM

  • White Papers // Nov 2013

    Defending Against Denial of Service Attacks

    This whitepaper utilizes end-user interviews to better understand their DDoS defense plans where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and...

    Provided By F5 Networks

  • White Papers // Oct 2013

    Mitigating DDoS Attacks with F5 Technology

    Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains...

    Provided By F5 Networks

  • White Papers // Oct 2010

    WLAN Channel Access: How WiFi Networks Talk and How You Can Make Them Talk More Clearly

    Stations and APs that share a wireless channel can rely on two carrier sense mechanisms to identify when a channel is busy. In crowded WiFi environments, like the one created at the unveiling of the iPhone? 4 to the press, these two carriers are crucial for ensuring network function. This...

    Provided By Global Knowledge

  • White Papers // Apr 2013

    Foundational Focus: OSI Model - Breaking Down the 7 Layers

    The OSI model is a conceptual tool used to discuss and describe network functions. The use of a standard reference model is essential to communicate ideas as well as create new technologies. It is a good idea to be familiar with the OSI model, the features assigned to each layer,...

    Provided By Global Knowledge

  • White Papers // Aug 2013

    Infographic: Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Oct 2013

    Security in the Internet of Things White Paper

    The transition to the Internet of Things (IoT) from closed networks is accelerating at a rapid pace—and justly raising alarms about security.

    Provided By Wind River

  • Analyst Briefings // Nov 2013

    Analytics Trends 2013: The IT Perspective by Aberdeen Group

    The results of Aberdeen Group's 2013 Business Analytics surveys examine the shifting challenges IT professionals face as they harness an ever-deepening pool of data for analysis. It will also explore current trends in IT's role in successful BI solutions.

    Provided By IBM

  • White Papers // Oct 2013

    The DDoS Threat Spectrum

    Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging...

    Provided By F5 Networks

  • White Papers // May 2012

    Smarter Planet Leadership Series: Air Canada

    Perfecting the art of self service. How self service helped an airline transform their brand.

    Provided By IBM

  • White Papers // Oct 2011

    10 Current Security Threats for Individuals

    We now live in a world where new threats are poised to cause us harm in ways most of us never dreamed possible. The convenience and benefits of Internet access, always-on connectivity, and mobile devices have made us vulnerable to these attacks. It is time for us to adopt a...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    LAN Fundamentals: Logical Addresses vs. Physical Addresses

    There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion. A list...

    Provided By Global Knowledge

  • White Papers // Dec 2012

    IP Version 6 Transitions Mechanisms

    As with the adoption of any new technology, the move from IP version 4 to IP Version 6 will take a number of years to complete. During that transition phase, various mechanisms will be necessary to continue support of the older protocol as the newer gains widespread momentum. In addition,...

    Provided By Global Knowledge

  • White Papers // Jan 2014

    Empowering Your Mobile Workers White Paper

    A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Today’s most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company’s IT strategy has to be ready to support them with easy, reliable,...

    Provided By Box

  • Downloads // Dec 2008

    10+ basic Microsoft Outlook support issues

    Outlook offers a number of benefits, but it tends to throw the occasional obstacle in your path. Armed with the right information and a few tricks, you can smooth the way for your Outlook users -- and for yourself. This download is also available as an entry in...

    Provided By Susan Harkins