Networking

As cloud computing grows, how will it impact the network and communications technologies and management?

  • Downloads // Sep 2014

    Code faster. Create faster code.

    Intel VTune Amplifier XE 2015 is the premier performance profiler for C, C++, C#, Fortran, Assembly, and Java. Collect rich performance data to tune for hotspots, threading, locks and waits, DirectX, bandwidth, and more. Gain fast insight into performance bottlenecks. Automate regression tests. Intel VTune Amplifier XE 2015...

    Sponsored By Intel Software

  • Downloads // Aug 2014

    Reliable & Secure File Transfer with Serv-U MFT Server

    Serv-U® Managed File Transfer (MFT) Server is a secure alternative to cloud-based and free FTP services. Deployed within your own data center, Serv-U gives you full control of file transfer security and administration. Serv-U allows you to upload and download files from anywhere via Web and mobile clients. Whether it...

    Sponsored By SolarWinds

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers' greatest...

    Sponsored By IBM

  • White Papers // Aug 2014

    Forrester Report: Build a Better Business Case for UC

    This report details Forrester Research, Inc.’s recommendation for IT professionals building out a Unified Communications and Collaboration infrastructure within their business. The key to success of a UC deployment is delivering benefits to both users and business units. This report guides IT professionals through the key needs, drivers, and likely...

    Sponsored By ShoreTel

  • White Papers // Aug 2014

    Unified Communications Buyers Guide: The Top Ten Requirements for a UC Solution

    This document offers an overview of the current top ten requirements to consider for a premise-based UC solution, with features called out as well as a ShoreTel case study.

    Sponsored By ShoreTel

  • White Papers // Aug 2014

    Quick Guide: SSL VPN Technical Primer

    More users are accessing applications remotely from a range of devices and environments, including personal mobile devices, home PCs, 3G/4G connections and wireless hotspots. So how can you provide remote access without increasing risks arising from unmanaged access points? Read the White Paper >>

    Sponsored By Dell Software

  • Case Studies // Jul 2014

    A Forrester Total Economic Impact Case Study

    Forrester Research conducted a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. Download this case study to understand the framework for evaluating the potential financial impact of Polycom voice solutions within their organizations....

    Sponsored By Polycom

  • White Papers // Jul 2014

    2014 Survey Report - Remote Collaboration Challenges & Strategies to Overcome

    Polycom surveyed 5,000 business professionals from all job levels around the world that focused on collaboration challenges to support a mobile and flexible working environment. Download this survey to learn what these Senior IT professionals say are their biggest remote collaboration challenges and discover the strategies they deploy to...

    Sponsored By Polycom

  • White Papers // May 2014

    The Complete Guide to Disaster Recovery Planning

    Whether man made or naturally occurring, disasters can be a real threat to a company’s survival. Some common disasters include : Catastrophic security compromise Fire Flood Earthquake Power failure This comprehensive guide will help you understand what a disaster recovery plan is and how to effectively implement one for your...

    Sponsored By Macquarie Telecom Australia

  • White Papers // May 2014

    IDC Product Flash: IBM Releases Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security

    Industry analyst firm IDC reviews the latest release of IBM Security identity and access management (IAM) solutions.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Downloads // Apr 2014

    Simplify remote IT administration with DameWare Remote Support

    Support hundreds of end-users without having to leave your desk. DameWare Remote Support is an easy to-use sysadmin tool that lets you manage servers and workstations remotely, and deliver faster support for end-users. From a single, user-friendly interface, initiate multiple remote sessions with Windows®, Linux®, and Mac OS® X systems....

    Sponsored By SolarWinds

  • White Papers // Apr 2014

    The 5 Technology Trends You Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • Downloads // Mar 2014

    Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    Powerful and Unified IT Monitoring Software: From physical to virtual to cloud, get the deep reporting and proactive monitoring you need to stay on top of IT performance, availability, and capacity. up.time® has customizable and role-based dashboards to monitor Servers, VMs, Applications, Services and the Network across all platforms, on-premise,...

    Sponsored By Uptime Software

  • Downloads // Mar 2014

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Fix spotty wireless coverage and improve connectivity with the wireless heat maps in SolarWinds® Network Performance Monitor. Display wireless coverage and signal strength using automated polling of adjacent access points. Map the location of connected clients within a few meters. Generate user-sourced wireless signal strength surveys for coverage in...

    Sponsored By SolarWinds

  • White Papers // Mar 2014

    Breaking Down Silos of Protection: An Integrated Approach to Managing Application Security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Mar 2014

    Combat the Latest Security Attacks with Global Threat Intelligence

    The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.

    Sponsored By IBM

  • White Papers // Feb 2014

    Mobile Connect

    Mobile users increasingly expect IT to extend support to critical enterprise applications, data and resources. That access offers benefits to your organization, but introduces significant risks. Find out how you can give your employees safe, easy access to the resources they need from iOS, Android™ and Windows 8.1. Read the...

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Reducing the Cost and Complexity of Endpoint Management

    IBM now offers simpler, more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations - helping provide continuous visibility, control and compliance while reducing costs and the burden on IT staffs.

    Sponsored By IBM

  • White Papers // Jan 2014

    The Role of the Network in Cloud Computing

    For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.

    Sponsored By IBM

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    In this paper, Hurwitz & Associates interviewed customers in a variety of industries to assess how they are approaching security for their cloud deployments leveraging IBM’s Security Intelligence Platform and suggests approaches to implementing cloud security.

    Sponsored By IBM

  • White Papers // Oct 2013

    Consolidation: The Foundation for IT and Business Transformation

    How many helpdesks do you have in your business right now? How many IT service management tools, or versions of the same business application is your organization using right now? If the answer to any of these is greater than one, your organization may be operating with a handicap that...

    Sponsored By ServiceNow

  • Downloads // Oct 2013

    Download a trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Most companies know that allowing employees to use personal devices improves productivity and job satisfaction. It can also reduce costs and allow for building virtual teams through geographically dispersed talent. But how can you make sure these devices don’t introduce new threats, impact compliance or monopolize bandwidth? Read the White...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Controlling Laptop and Smartphone Access to Corporate Networks

    With “bring your own device” (BYOD) policies enabling employees to select their own mobile devices for work, IT must be able to guarantee bandwidth to critical applications while limiting the negative impact of undesired traffic. So how do you find the balance? Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    There is good reason for IT to get involved in and maintain “bring your own device” (BYOD) procedures. These devices bring more than employee convenience — they promote agility and efficiency throughout your business. However, it’s on IT’s shoulders to form a pragmatic strategy to secure data from malware, theft...

    Sponsored By Dell Software

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Jan 2013

    Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. This report presents our results and findings...

    Sponsored By Webroot Software

  • White Papers // Jun 2015

    Ubiquitous Wi-Fi Implementations in Hotels: Key Planning Factors

    Wi-Fi is a Wireless Local Area Network (WLAN) that uses radio wave technology to connect electronic devices to the Internet. Wi-Fi is based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 specifications, a set of standards that define how WLANs communicate and enable high-speed wireless data transmission via...

    Provided By Northern Arizona University

  • White Papers // Jun 2015

    Thriving In Small Places (IT)

    In the last 10 years, office cubicle has shrunk 64% which means than productivity has been affected too. This whitepaper give you useful space hacks to help you be one with a smaller, more open and productive workplace.

    Provided By Hewlett-Packard (HP)

  • White Papers // Jun 2015

    The Evolution of IP Storage and Its Impact on the Network

    This ESG whitepaper highlights that by isolating the storage network, high-traffic non-storage events that could impact mission-critical workloads can be eliminated, providing more predictability for workload bandwidth, along with higher performance and availability. Read more and learn how to improve your IP storage network availability. Powered by Intel® ...

    Provided By HDS

  • White Papers // Jun 2015

    School District Enhances Interactive Learning Experience

    The Ligonier Valley School District is home to approximately 1700 students. Spread across more than 230 square miles, Ligonier Valley is one of the largest geographical school districts in Pennsylvania. The district’s students are housed in four buildings: Laurel Valley Elementary (K-5), RK Mellon Elementary (K-5), Ligonier Middle School (6-8),...

    Provided By Cisco Systems

  • White Papers // Jun 2015

    Cisco Intelligent WAN Technology Design Guide

    Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more...

    Provided By Cisco Systems

  • White Papers // May 2015

    The In-Car App Experience: Convergence and Integration

    The proliferation of connected devices is giving rise to the Internet of Things (IoT) and emerging technologies will enable users to remain connected through a variety of devices in any environment. The Automobile is low hanging fruit in the IoT market as these machines are already laden with sensors and...

    Provided By Smiths Point Analytics

  • White Papers // May 2015

    How to Build an Always-On Infrastructure

    Real-time customer expectations are driving the need for an always-on business environment. To keep pace with these demands, organisations need to deploy innovative, mobile solutions and manage explosive data growth, while also reducing risk and costs. To gain a competitive advantage, organisations need an always-on infrastructure that is future...

    Provided By HDS

  • White Papers // May 2015

    Perspective: Serving the Perfect Information Cocktail Strategies for Traditional and New-age Information Providers

    The information services industry is in the eye of the digital storm. Two major contenders within this industry - traditional and new-age media companies - must adopt strategies for the significant mass of millennials and demanding consumers. This also means that the hunt for new, innovative strategies was never more...

    Provided By Infosys

  • White Papers // May 2015

    Fraud Mitigation and Identity Verification for Card Not Present Transactions

    For too many merchants, online transaction fraud is far too real and devastating. Fraudsters are constantly working on new techniques to hone their craft which is why Telo is dedicated to providing merchants with tools like EveryoneAPI. It is essential that the users take advantage of these tools to protect...

    Provided By Telo

  • Downloads // May 2015

    A Network Performance Monitor Tool for You

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organisation’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Provided By SolarWinds

  • Downloads // Oct 2014

    Find the Root Cause of Your Toughest SQL Server Performance Issues in 4 Clicks!

    Slow SQL Server performance? Server health dashboards keep you guessing. Get to the root cause of performance problems in just four clicks. Only SolarWinds® Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint the root cause of slow SQL...

    Sponsored By SolarWinds

  • Downloads // Mar 2014

    Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    Powerful and Unified IT Monitoring Software: From physical to virtual to cloud, get the deep reporting and proactive monitoring you need to stay on top of IT performance, availability, and capacity. up.time® has customizable and role-based dashboards to monitor Servers, VMs, Applications, Services and the Network across all platforms, on-premise,...

    Sponsored By Uptime Software

  • Webcasts // Apr 2015

    Webinar: Top 5 Benefits of Contract Lifecycle Management

    The market for contract lifecycle management (CLM) solutions is taking off, with revenues expected to grow 12% in 2015. As paper-based processes become more expensive and less efficient by the day, CLM lets organizations create, negotiate, manage, and enforce their contracts uniformly and quickly, enhancing agility and compliance. In this...

    Sponsored By Open Text

  • White Papers // Apr 2015

    Lifecycle Management for Contracts & Legal Agreements

    Contracts are critical to the operations of every business, but paper-based processes introduce errors, format conflicts, and storage challenges - leading to higher costs and increased compliance risk. Read this Executive Brief to learn how OpenText Contract Center delivers automated, standardized, searchable, and secure lifecycle management for your contracts and...

    Sponsored By Open Text

  • White Papers // Apr 2015

    5 Critical Steps for Contract Management

    Too many organizations treat contract management as a necessary chore, but it presents a prime opportunity to maximize revenues and modernize processes. In this guide, you'll learn important steps for updating your contract workflow, including how to integrate buy-side and sell-side contracts, how to integrate with back-end management tools, how...

    Sponsored By Open Text

  • White Papers // Jul 2015

    Network Performance Monitoring Tool from SolarWinds!

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Sponsored By Solarwinds APAC

  • White Papers // Apr 2015

    Monitoring network performance doesn’t have to be hard or expensive

    See how easy and affordable it can be with SolarWinds Network Performance Monitor in under an hour. No consultants, no costly professional services, and no lengthy implementation cycle. With SolarWinds Network Performance Monitor you can quickly detect, diagnose, and resolve network performance issues and outages so you can spend...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Download a FREE Trial of IP Address Manager from SolarWinds!

    Are you still using spreadsheets to manage your IP space? The explosion of IP-enabled devices in corporate networks has increased the complexity of IP space management beyond what can be handled with spreadsheets or other home-grown tools. SolarWinds IP Address Manager makes it easier than ever to manage and...

    Sponsored By Solarwinds APAC

  • White Papers // Jan 2015

    Download a Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Check VM Health in Minutes. It's FREE!

    It's time for your FREE VMware & Hyper-V Healthcheck with Virtualization Manager. So much change occurs in your VM environment, it can be hard to stay ahead of potential problems like: Storage I/O bottlenecks Memory & CPU over-utilization VM sprawl wasting resources Capacity shortfalls Over & undersized VMs And on...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Check Virtualization Health in Minutes. It's FREE!

    It's time for your FREE VMware & Hyper-V Healthcheck with Virtualization Manager. So much change occurs in your VM environment, it can be hard to stay ahead of potential problems like: Storage I/O bottlenecks Memory & CPU over-utilization VM sprawl wasting resources Capacity shortfalls Over & undersized VMs And on...

    Sponsored By Solarwinds APAC

  • Downloads // Apr 2015

    Reduce Troubleshooting Time Up to 59% in Your Virtual Environment

    Know exactly where to look when there’s a problem. SolarWinds® Virtualization Manager shows your entire virtualisation stack from VM to storage, highlighting performance bottlenecks along the way. Immediate view of normal, informational, warning, and critical alerts of your virtual infrastructure Detailed visibility into all virtualisation layers showing live performance and...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Download a Trial of IP Address Manager from SolarWinds!

    Are you still using spreadsheets to manage your IP space? The explosion of IP-enabled devices in corporate networks has increased the complexity of IP space management beyond what can be handled with spreadsheets or other home-grown tools. SolarWinds IP Address Manager makes it easier than ever to manage and...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Download a trial of SolarWinds Application Monitor & find out.

    3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates, alerts, reports & dashboards. Great value! Baseline thresholds, asset management and specialized SQL monitoring all in 1 product! ...

    Sponsored By Solarwinds APAC

  • White Papers // Apr 2015

    Why is the app slow? Download a trial of SolarWinds Application Monitor & find out more

    3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates, alerts, reports & dashboards. Great value! Baseline thresholds, asset management and specialized SQL monitoring all in 1 product! ...

    Sponsored By Solarwinds APAC

  • Downloads // Jan 2015

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Sponsored By Solarwinds APAC

  • Downloads // Apr 2014

    Simplify remote IT administration with DameWare Remote Support

    Support hundreds of end-users without having to leave your desk. DameWare Remote Support is an easy to-use sysadmin tool that lets you manage servers and workstations remotely, and deliver faster support for end-users. From a single, user-friendly interface, initiate multiple remote sessions with Windows®, Linux®, and Mac OS® X systems....

    Sponsored By SolarWinds

  • Downloads // Aug 2014

    Reliable & Secure File Transfer with Serv-U MFT Server

    Serv-U® Managed File Transfer (MFT) Server is a secure alternative to cloud-based and free FTP services. Deployed within your own data center, Serv-U gives you full control of file transfer security and administration. Serv-U allows you to upload and download files from anywhere via Web and mobile clients. Whether it...

    Sponsored By SolarWinds

  • Downloads // Mar 2014

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Fix spotty wireless coverage and improve connectivity with the wireless heat maps in SolarWinds® Network Performance Monitor. Display wireless coverage and signal strength using automated polling of adjacent access points. Map the location of connected clients within a few meters. Generate user-sourced wireless signal strength surveys for coverage in...

    Sponsored By SolarWinds

  • White Papers // May 2014

    IDC Product Flash: IBM Releases Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security

    Industry analyst firm IDC reviews the latest release of IBM Security identity and access management (IAM) solutions.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers' greatest...

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security AppScan Mobile Analyzer

    IBM Security AppScan® Mobile Analyzer is designed to help secure your organization’s mobile applications, by detecting dozens of today’s most pervasive published security vulnerabilities. Now available for general availability IBM Security AppScan Mobile Analyzer: Scans mobile applications at the appropriate stage of your development lifecycle, Identifies security vulnerabilities to malware...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Feb 2014

    Reducing the Cost and Complexity of Endpoint Management

    IBM now offers simpler, more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations - helping provide continuous visibility, control and compliance while reducing costs and the burden on IT staffs.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking Down Silos of Protection: An Integrated Approach to Managing Application Security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    In this paper, Hurwitz & Associates interviewed customers in a variety of industries to assess how they are approaching security for their cloud deployments leveraging IBM’s Security Intelligence Platform and suggests approaches to implementing cloud security.

    Sponsored By IBM

  • White Papers // Feb 2015

    Get On Your Way to a Secure Mobile Enterprise

    This infographic shows the key points on the path to a secure mobile enterprise, and how holistic protection from IBM can help organizations move beyond device security and extend protection to sensitive content, applications and transactions.

    Sponsored By IBM

  • White Papers // Jul 2015

    Redefine Flash

    The speed and efficiency of flash have given rise to a new wave of apps and approaches that redefine what is possible in IT. But experiencing the full effect of this new technology depends on having the right architecture. With EMC’s flexible solutions, organizations of all sizes can harness the...

    Sponsored By EMC

  • Downloads // Jul 2015

    Why is the app slow? Download a trial of SolarWinds Application Monitor & find out.

    3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates, alerts, reports & dashboards. Great value! Baseline thresholds, asset management and specialized SQL monitoring all in 1 product! ...

    Sponsored By Solarwinds APAC

  • White Papers // Apr 2015

    HP Access Control Printing Solutions (HP AC)

    Transform printing practices for a more efficient and secure environment. HP Access Control (HP AC) Printing Solutions makes it easy to monitor and control imaging and printing costs—and to collect and track data by device and user—to help establish more responsible behaviours, lower expenses, and eliminate unclaimed documents.

    Sponsored By Hewlett-Packard (HP)

  • Downloads // Apr 2014

    Stadiums race to digitize (PDF download)

    Younger fans are leaving stadiums when they can't get connected, so sports teams are finally embracing technology as a way to improve the fan experience and increase the team’s bottom line. Download the full feature article from TechRepublic's Teena Hammond in magazine format as a free PDF that you can...

    Provided By TechRepublic

  • Downloads // Nov 2006

    Use this template to configure QoS on your Cisco router

    Using quality of service (QoS) on Cisco network devices helps provide both bandwidth and priority to certain types of network traffic. Configuring QoS on your Cisco router can be tricky, but this template can help. As a companion download to David Davis' article, "Configure QoS on your Cisco...

    Provided By David Davis

  • Tools & Templates // Feb 2010

    Server Deployment/Migration Checklist

    One configuration error or overlooked step can send your server deployment off a cliff. This simple checklist will help you complete the process efficiently and avoid costly mistakes.Visit our Network Administrator blog for more networking resources.

    Provided By Erik Eckel

  • Research // Dec 2014

    Conferencing Loud & Clear

    We spend hours in phone conferences with colleagues, clients, and customers every day, but poor sound quality can turn a productive collaboration into a time-wasting drag. Next-generation conference phones deliver whole-room coverage and crystal-clear audio that keeps participants engaged. Have you ever dialed into a conference call, only to...

    Provided By VTech

  • Downloads // Dec 2010

    10 PowerShell commands every Windows admin should know

    PowerShell combines the speed of the command line with the flexibility of a scripting language, making it a valuable Windows administration tool. Here are a few basic commands you'll want to master. This download is also available as an entry in our 10 Thing blog.

    Provided By Brien Posey

  • Downloads // Sep 2002

    Network outage report template

    This Microsoft Word template will help you report a network or Web site outage, document the steps taken to resolve the issue, and indicate who was notified of the problem.

    Provided By TechRepublic

  • Downloads // Oct 2007

    How do I... Use C# to upload and download files from an FTP server?

    Many third party components exist that enable developers to implement upload and download capabilities in their applications. With C# and the .NET Framework Microsoft has given developers this capability without the need to use third party components. Zach Smith demonstrates how to upload and download files from a FTP server...

    Provided By Zach Smith

  • White Papers // Mar 2015

    Collaboration Unchained: Tapping the Potential of Unified Communications

    Emails, phone calls, and in-person meetings remain fundamental to how many large organizations communicate—internally and externally. However, the emergence of collaborative technologies is enabling customers, competitors and employees to innovate, disrupt and challenge the ways in which work gets done and value is created. This report produced with WSJ. Custom...

    Provided By NTT Communications

  • White Papers // Aug 2014

    What to Look For When Evaluating NGFW

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

    Provided By Dell Software

  • White Papers // Jan 2015

    Migrating Linux applications from x86 to IBM Power Systems: A discussion of best practices

    PowerVM is a complete virtualization solution that is integrated and packaged with Power Systems. This is a very robust implementation of virtualization developed by IBM, based on best practices learned over the course of four decades of experience with the IBM mainframe. Read More..

    Provided By IBM