Tech Industry

Best practices for business technology. Whether it's infrastructure, mobile, security, or operational advice, you'll find leading experts and compelling insight here.

  • White Papers // Apr 2015

    Forbes Insights: Tooling Up for Collaboration

    Collaboration is key. To most organisations, in fact, it is a significant source of comparative advantage. As such, the number of meetings—opportunities to share concerns, plan strategies, prioritise focuses, coordinate responses and track progress toward goals—is on the rise. The following report combines quantitative research sponsored by join.me by LogMeIn...

    Sponsored By LogMeIn Australia

  • White Papers // Mar 2015

    Visibility into data center security and operations management with Trend Micro and VMware

    VMware and Trend Micro have partnered to deliver the first security and operations management solution designed for virtualized environments. Read More..

    Sponsored By Trend Micro

  • White Papers // Mar 2015

    Fortifying for the future: Insights from the 2014 IBM Chief Information Security Officer Assessment

    IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more...

    Sponsored By IBM

  • White Papers // Mar 2015

    Seize the Data. Create better products with HP Haven

    Learn how HP Haven Big Data solutions customers harness data of any type -- structured and unstructured -- to create better products. And see patterns and relationships that unveil new opportunities.HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Seize the Data. Reduce your risks with HP Haven

    Learn how HP Haven Big Data Platform helps enterprises to see patterns and relationships that unveil new opportunities that help you maximize financial gain and minimize risks. Harness data of any type -- structured and unstructured -- to your own advantage.HP is the sponsor of this material. By submitting your...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Seize the Data -- What's Your Data Doing for You?

    Learn how HP Haven Big Data Platform delivers innovation across the enterprises by engaging customers, reducing risks, better understanding your business and helping to predict future trends and opportunities.HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest....

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Mar 2015

    Technology Business Research: Notebook Reliability

    TBR discusses the reliability found in Dell Notebooks today. This report breaks down the areas most critical to customer satisfaction and how Dell is able to consistently deliver across these criteria. Realise the potential that Dell products, such as Latitude laptops powered by Intel® Core™ vPro™ processor family, can offer...

    Sponsored By Dell and Intel®

  • White Papers // Mar 2015

    Enterprise Mobility Management Smackdown

    Are you looking for an independent overview of the Enterprise Mobility Management (EMM) solutions and curious about the different features and functions each EMM vendor is offering?If so, this is a report you MUST read! Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom...

    Sponsored By Dell and Intel®

  • White Papers // Feb 2015

    Surviving Disruption

    Disruption is coming. Are you ready? It's not enough to know that a threat is coming. You need to know whether it's coming right for you. In this spotlight on managing disruption that first appeared in the Harvard Business Review, industry leaders Maxwell Wessel and Clayton Christensen propose a systematic...

    Sponsored By Jama Software

  • eBooks // Feb 2015

    A Modern Take on the Agile Manifesto

    When the Agile Manifesto was published in 2001, our workplace looked very different from how it does today. Despite major changes in how we work, our interpretation of the Manifesto hasn't changed in over a decade. So what does today's Agile look like? Do the values of the Manifesto still...

    Sponsored By Jama Software

  • eBooks // Feb 2015

    Failure: Analyze It, Don't Humanize It.

    Beat the Law of Market Failure-an expert's POV. Alberto Savoia, formerly of Google and originator of the brilliant theory of "pretotyping," has created a product builder's philosophy that encourages a healthy, objective, and best of all, productive analysis of failure that takes the pain out of failure and improves ideas,...

    Sponsored By Jama Software

  • White Papers // Feb 2015

    ESG: Public Cloud Trends

    Early server virtualization was based on consolidation and cost containment. Today, automation, elasticity, and usage-based tracking is transforming virtualized data centers into private cloud infrastructures.

    Sponsored By NetApp

  • White Papers // Feb 2015

    The Future of Convergence Is Here

    Discover the major problems that have been facing today’s IT world. The changing landscape of IT over the past decade has seen more and more computer, network and storage solutions, creating a complicated web of siloed technologies that drive up costs and create headaches for those in charge of support....

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    How one Australian Company Built Efficiencies Around their All-Star Team

    When Australian-based IT solution provider, PowerNET, decided to undergo a massive business transformation, they knew they needed to become more efficient. By implementing ConnectWise and best practices shared throughout their community, PowerNET gained visibility into their operations and a platform for growth.

    Sponsored By ConnectWise

  • White Papers // Feb 2015

    Gigaom Research & Puppet Labs Present: Next steps to DevOps — a game plan for adoption and implementation

    As is now well known, DevOps seeks to align business goals with the goals of development and operations teams. Associated with it are other practices such as continuous delivery (CD) and continuous integration (CI). Organizations wanting to embrace DevOps often limit their success by falling victim to common barriers...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    Puppet Labs DevOps Salary Report

    The 2014 State of DevOps Report revealed strong correlations between DevOps practices and strong IT performance, and also showed that high-performing IT teams have a beneficial impact on the business performance of the organizations they belong to. Among our questions about tools & practices, location, industry and company size,...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    Checklist: Characteristics of a Successful DevOps Team

    No matter how you’re using DevOps practices — whether your company has a DevOps department or cross-functional teams that share DevOps tools and practices — there are distinct characteristics of DevOps teams that align with high IT performance.

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey....

    Sponsored By Neustar

  • White Papers // Feb 2015

    Four Tools to Capture DDoS Attacks in Monitoring

    Most cloud DDoS mitigation services are offered on-demand, meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out - quickly - that it is under attack? Sometimes it is difficult to know. This piece lists four monitoring...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Video: Rodney Joffe Explores Cybercrime’s Underground Economy

    More and more criminals are using DDoS attacks as a distraction or "smokescreen" for other cybercrimes like theft of data or even funds. Watchin this video for a behind-the-scenes tour of what this "underground economy" of the Internet really looks like a place where criminals sell stolen credit cards and...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Don't Let Your DDoS Defense Fall Behind

    Today’s DDoS incidents tend to be briefer and some can be as much as 100 times larger than even just a few years ago. Sometimes criminals use a DDoS attack as a smokescreen to distract IT security teams from other multivector attacks aimed at stealing funds, customer data and intellectual...

    Sponsored By Neustar

  • White Papers // Jan 2015

    Enabling the Modern Business through IT

    CIOs today are asked to drive transformational change, get the most out of your current IT investments with even higher performance, and be the strategic advisor to your business partners. What if you could transform your company’s future by increasing the flexibility and agility of your IT infrastructure to support...

    Sponsored By NetSuite

  • White Papers // Jan 2015

    Seven Signs You're on the Road to Real-Time ERP

    A step-change in the pace of business today brings enterprise resource planning (ERP) systems face-to-face with the largest transformation in their role since they were first introduced in the early 1990s. The rise of a new generation of business automation demands real-time information processing and visibility on a scale that...

    Sponsored By NetSuite

  • White Papers // Nov 2014

    How to Measure the ROI of Cloud Data Protection

    This white paper helps managers demonstrate the profitability of reducing operational costs in server backup and recovery through investment in cloud server data protection (subscription), rather than traditional backup methods. Comparative cost categories used in calculating this ROI are summarized in a convenient checklist. These include capital costs of hardware...

    Sponsored By HP

  • White Papers // Nov 2014

    Protect Critical Healthcare Data

    Protecting healthcare data is more important—and more challenging—than ever before. With most patient information now residing in digital format, healthcare organizations must rely on IT solutions to protect patient privacy and safeguard against disasters that may cause physical damage to patient information. In 1996, the Health Insurance Portability and Accountability...

    Sponsored By HP

  • White Papers // Oct 2014

    What CIOs need to know in order to capitalize on Hybrid Cloud

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility, the flexibility to use a variety of services, the scalability to keep pace with business volume, the efficiency...

    Sponsored By EMC

  • White Papers // Oct 2014

    Why Cloud Backup? Top 10 Reasons HP Autonomy Solutions

    Download this white paper to discover the top 10 reasons why organisations are turning to cloud server backup. Learn how you can reduce costs and free your IT staff to focus on more mission-critical projects.

    Sponsored By HP

  • White Papers // Jan 2014

    Discovering Vulnerable Web Applications

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management

    Sponsored By Qualys

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Sep 2015

    Many Firms Are Overconfident In Their Disaster Recovery Ability

    In today’s world, workers expect 24x7 availability and IT services. IT administrators are increasingly tasked with making critical apps accessible at any time, from any place, and on any device, but they are often not given the resources that they require to meet these demands. Companies struggle to keep up...

    Provided By Dell and Intel

  • White Papers // Aug 2015

    IG Policy versus IG Reality - bringing your wild content under control

    As the non-profit association dedicated to nurturing, growing and supporting the user and supplier communities of ECM Enterprise Content Management, AIIM is proud to provide this research at no charge. In this way, the entire community can leverage the education, thought leadership and direction provided by our work. Our objective...

    Provided By Hewlett-Packard (HP)

  • White Papers // Aug 2015

    Select the Right Security Solution for Protecting Enterprise Endpoints

    Selecting a solution to protect endpoints is more important than ever. Not only can a successful cyber attack be expensive, it can ripple through the enterprise. This guide shows what to look for to gain preemptive protection wherever systems are, without impacting user productivity.

    Provided By IBM

  • White Papers // Jul 2015

    IT Service Excellence Tool Kit

    The IT Service Excellence Tool Kit provides a blueprint for managing successful service delivery and provides secrets for exceeding your clients’ expectations. From service desk, help desk and patch management best practices to client communication, reporting and risk management, this book is a must read for all IT service providers...

    Provided By LabTech Software APAC

  • White Papers // Jul 2015

    A Guide to Finding Success in the Cloud

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

    Provided By LabTech Software APAC

  • White Papers // Jul 2015

    IT Help Desk Best Practices

    A help desk is critical to the operations of an IT services business. As a centralized intake location for technical issues, it allows for a responsive and timely solution to get clients and their staff back to business as usual. In addition to handling immediate IT issues, a help desk...

    Provided By LabTech Software APAC

  • White Papers // Jul 2015

    Remote Monitoring and Management eBook: The Key to Proactive, Efficient IT Service Delivery

    In order for IT service providers to succeed, it’s paramount that they find a competitive advantage and continually develop new ways to find additional revenue streams. IT service providers need to be able to do it all for their clients – from managing entire technology infrastructures to responding quickly to...

    Provided By LabTech Software APAC

  • White Papers // Jul 2015

    Managed IT Services: Why It's Good for Business

    As technology becomes increasingly complex, more companies are outsourcing their IT management and maintenance functions. The idea of outsourcing IT has become so appealing that worldwide spending for IT outsourcing is increasing. IT service providers are responding to this growing need by introducing a new business model, managed services, which...

    Provided By LabTech Software APAC

  • White Papers // Jul 2015

    A Complete Guide to Pricing Your IT Services

    Have you ever wondered how to determine whether your IT business is truly profitable or if you should be charging more for your IT services? Answers to pricing questions like these start with a thorough understanding of your overhead burden.In this eBook, we show you how to calculate your overhead...

    Provided By LabTech Software APAC

  • White Papers // Jul 2015

    Set Your Business Up For Success: Achieving Client Satisfaction in the First 30 Days

    The key to achieving client satisfaction and building long-term client relationships is starting off on the right foot. It is important that the groundwork be laid in advance to ensure a smooth onboarding process, as this is the time when new clients are most critical of the work being performed.This...

    Provided By LabTech Software APAC

  • White Papers // Jul 2015

    Patch Management Best Practices

    Patch management is one of the largest concerns of IT service providers and their clients. With new vulnerabilities being discovered almost daily, keeping systems up-to-date with patches is often a full-time job, especially in larger environments. In addition, the lag time between when a vulnerability is discovered and when a...

    Provided By LabTech Software APAC