Tech Industry

The latest updates from tech advertising, marketing and e-commerce.

  • White Papers // Mar 2015

    The Evolving Role of the CIO - A Google for Work Collection

    Mobility and the cloud rank as the most critical technologies in the workplace today. They also transform the role of the CIO as IT becomes a strategic partner in the business and shifts from enforcer to enabler. In this Google for Work collection, we harness the collective experience of Google’s...

    Provided By Google, Inc.

  • White Papers // Feb 2015

    6 Ways IT Will Move From the Back Office to the Boardroom

    In today’s world, IT is no longer confined to just tech support. IT is becoming business critical across all departments. From HR to marketing, finance to sales, IT solutions and infrastructure allow all employees to be successful in their role, as well as improving business processes and efficiency. Download...

    Provided By Polycom, Inc.

  • White Papers // Feb 2015

    Drones for Good

    The Government of UAE, in collaboration with Indra, has launched "The UAE Drones for Good Award", recognizing the most promising prototypes that will improve people's lives. The following infographic explores how civilian drones are changing the world, looking at implications for different industries. Furthermore it depicts the top 5 industries...

    Provided By Drones for good

  • White Papers // Jan 2015

    Getting The Most From Your Virtualized Data Center With Converged Systems

    In this paper, we look at the greatest challenges faced by IT departments, and how traditional processes and organizations are poorly-equipped to handle today's workplace. We discuss the benefits of converged systems that are engineered to handle virtualised workloads. Finally, we look at HP ConvergedSystem for Virtualisation as a simple...

    Provided By HP and Intel UK

  • White Papers // Nov 2014

    What CIOs Need to Know to Capitalize on Hybrid Cloud [French]

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility — the flexibility to use a variety of services, the scalability to keep pace with business volume, the...

    Provided By EMC

  • White Papers // Nov 2014

    Big Picture Global Survey: Dual Perspectives on ITaaS [French]

    This global survey by IDG Research Services of more than 350 IT and business unit directors at enterprises of 1,000 employees or more reveals significant differences in the perception and priorities of business and IT when it comes to many aspects of running IT like a business. .Find out more...

    Provided By EMC

  • White Papers // Nov 2014

    Build a hybrid cloud: Create A Strategy

    This paper provides context and guidance on how to create a proactive, effective approach to cloud computing and will address these important questions in the process. How do we prepare for the arrival of cloud computing? What considerations should a cloud computing strategy address? How do we utilize cloud to...

    Provided By IBM

  • White Papers // Nov 2014

    Build a hybrid cloud: Define your ecosystem

    Moving to a cloud environment is no longer just an information technology IT strategy it’s a business decision as well. Cloud is motivating business and IT to emerge from their respective silos. This paper discusses how to convert cloud’s considerable benefits into business opportunities with an astute understanding of your...

    Provided By IBM

  • White Papers // Nov 2014

    Build a hybrid cloud: Create A Strategy

    This paper provides context and guidance on how to create a proactive, effective approach to cloud computing and will address these important questions in the process. How do we prepare for the arrival of cloud computing? What considerations should a cloud computing strategy address? How do we utilize cloud to...

    Provided By IBM

  • White Papers // Nov 2014

    Australian insights from the 2014 Smarter Consumer Study - Infographic

    The IBM® Smarter Consumer Study, now in its fifth year, is based on surveys conducted by the IBM Institute for Business Value. For this year’s study, IBM researchers surveyed 30,554 consumers in 16 countries, including 1,822 from Australia. Shoppers spanned ages 18 to 60+ with substantial representation of every age...

    Provided By IBM

  • White Papers // Nov 2014

    Case Study Loft Group - Innovating e-learning and transforming solution delivery with SoftLayer cloud technology

    Established in 2007, Loft Group is a creative digital agency focused on providing business consultancy through software solutions. The company constructs purpose-built digital infrastructure to help customers harness communications and human connections for access through virtually any channel. Loft Group needed a scalable, high-performance infrastructure to deliver its born-on-the-cloud e-learning...

    Provided By IBM

  • White Papers // Oct 2014

    The Security Industry’s Dirty Little Secret

    One of hackers’ dirty little secret weapons used to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community where they are well known and have been in widespread use for several years there are...

    Provided By McAfee

  • White Papers // Oct 2014

    2014 Ponemon Cost of Data Breach Study- Australia

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in Australia.

    Provided By IBM

  • White Papers // Oct 2014

    2014 Ponemon Cost of Data Breach Study-India

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in India.

    Provided By IBM

  • White Papers // Oct 2014

    2014 Gartner Magic Quadrant: Global Managed Security Services

    Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. This Gartner Magic Quadrant report positions IBM among the leaders in managed security services providers, based on "ability to execute"...

    Provided By IBM

  • White Papers // Oct 2014

    2014 Ponemon Cost of Data Breach Study Sponsored by IBM - Global Analysis

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations.It answers critical questions such as: How much can a data breach cost? And are you doing enough to prevent it from happening to you?

    Provided By IBM

  • White Papers // Oct 2014

    Why Customers Are Moving Beyond the Status Quo with VMware Horizon 6 (with View)

    In the competitive marketplace that surrounds us today, customers shouldn’t have to settle for legacy desktop or application delivery simply because they’ve relied on a certain vendor in the past. This white paper reviews how three customers decided to partner with VMware, and how they benefited from the latest VDI...

    Provided By VMware

  • White Papers // Oct 2014

    DBAs: Control the Cloud

    DBAs know that staying vital in their profession means working with, and in, the cloud. In this new white paper, see how DBAs can avoid “database isolation management,” and how a broad perspective gives DBAs control over any database environment . Get this paper today.

    Provided By Dell Software

  • Webcasts // Sep 2014

    ZDNet APAC webinar: Business Intelligence on the move

    Join us for this LIVE event! Monday, 29 September at 3pm Australian Eastern Standard Time Business Intelligence used to be the domain of the experts, with small crews of data analysts controlling the flow of business insights. But a great democratisation is unfolding and not only is Business Intelligence being...

    Provided By ZDNet

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Provided By Centrify

  • White Papers // Sep 2014

    The Cross-Browser Configuration Conundrum

    With the proliferation of available browsers, plus the boom in usage of devices to navigate the Internet, cross-browser testing has become a vital part of website development. Developers must ensure that, no matter which browsers are used to view their website the site will look and function the same way.

    Provided By Micro Focus

  • White Papers // Sep 2014

    Forrester - Expand Your Virtual Infrastructure With Confidence And Control

    Is your virtualized infrastructure operating at peak efficiency and performance? If your infrastructure is growing while your IT headcount is flat, most likely you have a hard time answering that question with confidence. In December 2013, VMware commissioned Forrester Consulting to evaluate how small and midsize companies manage virtualization...

    Provided By VMware

  • White Papers // Aug 2014

    Building a Better Network Security Strategy

    In today's global, always-on world, network security is crucial. Enterprises need to ensure that employees accessing their networks are secure at all times. A comprehensive network security solution needs to include a number of factors, including • Network reliability • Resources for managing the network • Network features and...

    Provided By HP

  • White Papers // Aug 2014

    The Migrate-Manage-Govern Strategy to Active Directory Transformation

    Active Directory (AD) environments today have become extremely complex and increasingly cumbersome to manage. This can lead to security and compliance challenges that impede the adoption of useful new technologies. Learn how the migration strategy outlined in this white paper can help you transform AD from an administrative burden into...

    Provided By Dell Software

  • White Papers // Aug 2014

    12 Essential Tasks of Active Directory Domain Services

    Discover the 12 major tasks of Active Directory Domain Services (AD DS) administration and management, and how delegation can be an excellent way for administrators to reduce the their workload and streamline management of their AD DS infrastructures. Read the white paper and learn how the implementation of proper...

    Provided By Dell Software

  • eBooks // Jul 2014

    Help Desk Best Practices

    A help desk is critical to the operations of an IT services business. As a centralized intake location for technical issues, it allows for a responsive and timely solution to get clients and their staff back to business as usual. In addition to handling immediate IT issues, a help desk...

    Provided By LabTech Software

  • White Papers // Jul 2014

    Whitepaper: SaaS and cloud-based integration: Business Impact in Multi-country Payroll

    This briefing paper published by Webster Buchanan Research examines the evolution of SaaS in multi-country payroll, explaining the business implications of different approaches and exploring both the potential benefits and concerns. It then examines the potential impact of newer, cloud-based integration techniques on the global strategies of companies.

    Provided By Workday

  • White Papers // Jul 2014

    Whitepaper: The Real SaaS Manifesto

    Due to the proliferation and incorrect use of the term, Software-as-a-Service has often been misunderstood by both software vendors and business people. This whitepaper defines the key terms every company should know, understand, and evaluate when considering a SaaS vendor for their business.

    Provided By Workday

  • White Papers // Jul 2014

    Five Key Issues for DNS - The Next Network Management Challenge

    The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers).  Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates...

    Provided By F5

  • White Papers // Jul 2014

    NSS Labs Report: Breach Detection Systems Comparative Analysis

    In recent NSS Labs testing, Trend Micro™ Deep Discovery scored the highest in breach detection of all products, including those from AhnLab, Fidelis, FireEye, Fortinet, and Sourcefire. Download NSS Labs' 2014 Security Value Map (SVM) for Breach Detection Systems to compare test results and see why Deep Discovery should...

    Provided By Trend Micro

  • White Papers // Jul 2014

    Pay for Performance...Are You Ready?

    This white paper discussed the elements that comprise a pay-for-performance system and how compensation professionals can effectively implement one. Download your copy of the white paper to learn more about: Pay for performance vs. increase for performance Cost of labor vs. cost of living Differentially rewarding

    Provided By IBM

  • White Papers // Jun 2014

    Follow the money, Follow the crime

    A white paper discussing the benefits of outsourcing managed security services and outlining effective strategies, as well as 10 of the most important criteria to consider, when choosing a managed security services provider.

    Provided By IBM

  • White Papers // Jun 2014

    Gartner Magic Quadrant paper

    Latest Gartner Magic Quadrant report positions IBM among the leaders in managed security services providers, based on "ability to execute" and "completeness of vision."

    Provided By IBM

  • White Papers // Jun 2014

    Hybrid Model Of E-Learning With Knowledge Management

    The world is moving towards digitalization of knowledge which makes E-learning an important issue and prime concern that can be enhanced by combining it with another separate world of knowledge called knowledge management. This paper introduces the complementary structure of E-learning and knowledge management and their relationship. E-learning is used...

    Provided By International Journal of Scientific & Technology Research

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • White Papers // May 2014

    Factors Affecting Programmer's Performance on Web-Based Programming

    Today, the changes that occur in the field of IT are repositioning its role from just to support back office to strategic role. Thus, this change has led to high demand for IT professionals who have the competence and also updated on the utilization of new technologies. This research is...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // May 2014

    MuTeBench: Turning OLTP-Bench into a Multi-Tenancy Database Benchmark Framework

    Database benchmarks have been used for decades to load test systems and to compare systems or system configurations with each other. However, their methods and assumptions are hardly suitable for multi-tenant cloud database services. Those systems have to provide both performance isolation of a lot of tenants with dynamic workloads...

    Provided By IARIA

  • Webcasts // May 2014

    Webinar: Why It's Time to Retire that Aging HR System and Embrace the Cloud!

    You need the latest workforce cost reports at your fingertips. And your organization's employees want to go mobile. But you're struggling with a system designed back in the 80s that was last upgraded years ago. In this webinar, HR leaders share the benefits of moving to the cloud.

    Provided By Workday

  • White Papers // May 2014

    Management Trust, Organizational Trust, and Organizational Performance: Empirical Validation of an Instrument

    The researchers defined trust as \"The willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party\". The purpose of this...

    Provided By Oklahoma State University

  • White Papers // May 2014

    ENCRYPTING THE INTERNET

    The evolution of the Internet has resulted in large quantities of information being exchanged by businesses or private individuals. The nature of this information is typically both public and private, and much of it is transmitted over the hyper text transfer protocol (HTTP) in an insecure manner. A small amount...

    Provided By Intel Corporation