- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- Gartner Magic Quadrant for Secure Email Gateways, 2014
- Gartner Magic Quadrant for Enterprise Information Archiving
- Advanced Cyber Attacks - Is Your Org Ready?
- Threat Monitoring: Fast Responses to Security Incidents
July 2014- These are exciting times for enterprise application developers, as companies challenge them to build solutions that better exploit mobile devices, cloud infrastructures, sensor networks, big data, and APIs for widely used services such as Facebook and Gmail. Application development, however, isn't all intellectual exhilaration. It has its pain points, too, such as the toil that goes into creating and modifying batch workload jobs. This paper explores how app developers can use automation to deal with ...
July 2014- As organizations seek to continue leveraging the advantages of virtualization technologies, many are embracing virtualization of end user desktops via approaches such as Virtual Desktop Infrastructure (VDI). But while VDI solutions promise significant security and operational efficiency improvements, they also bring with them unique deployment challenges. If organizations hope to reap the full benefit of a VDI deployment, they must assure the best possible end-user experience, or adoption will stall and the project will fail. ...
July 2014- This inographic describes the simple steps to an effective SharePoint deployment and user acceptance
July 2014- This collection of articles substantiates growing concerns over application performance in cloud and/or virtualized environments. While cost reduction is a primary reason enterprises move from traditional datacenter infrastructure to distributed computing, the economics don't pan out if application performance and, subsequently, user adoption suffer. However, a good understanding of performance in the cloud or in virtualized environments demands a wholly different approach to monitoring, as explained in the following articles authored by technology strategists ...
July 2014- In December 2013, Compuware commissioned Research in Action to conduct a global, independent survey of 740 senior IT professionals' attitudes and concerns relating to cloud computing. The results revealed that businesses worry that the reduced visibility and control that accompanies their move to the cloud hampers their ability to deliver a high quality end-user experience with applications. The study shows that the Service Level Agreements (SLAs) offered by cloud providers are failing to address the needs of ...
This collection discusses the common performance issues encountered when managing jobs in a Hadoop environment. Whether you are running Hadoop on-premise or utilizing a cloud-hosted MapReduce environment, or a combination of the two, this collection will give you real-world examples of how to improve the distribution and utilization of your big data deployment.
Some of the key challenges we have seen include:
• Jobs running slow or failing without a clear ...
July 2014- This DNS ebook describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced traffic management and protection from cyber threats.
July 2014- Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market. It represents an evolution of a mature market in which the wide variety of offerings and capabilities means vendors must be chosen carefully.
July 2014- This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and then details the secret to achieving success with cloud solutions.
July 2014- Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers (MSPs) to accelerate the planning, deployment and maintenance of their corporate cloud.
July 2014- Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today's new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the technology industry looks obsessed with the idea of automation, continuous delivery and programmability. With good reason, because the evidence is all around us-saving time is ...
July 2014- IDG Research Services surveyed DNS administrators from large organizations to understand the challenges of deploying an available, secure, high-performance DNS infrastructure. Download the infographic to understand the key issues you need to think about to ensure your DNS servers don't fail.
July 2014- Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of accelerating these web applications is to improve the end-user experience with faster page-load times and more responsive interactivity. Read this article to learn more about ...
June 2014- Software Defined Networking (SDN) has recently hit the headlines with claims of better network utilization and easier management and many see it as the 'silver bullet' for every networking challenge. Unfortunately, most SDN solutions are targeted at large data centres and is unlikely to overcome the challenges being experienced by most enterprise technology managers and executives. To learn more about SDN and the challenges it will help you overcome (along with what it won't), download ...
June 2014- The world is moving inexorably from IPv4 to IPv6. However, many organizations feel that they currently have no need for IPv6. If a business has plenty of IPv4 addresses, a reliable Network Address Translation (NAT) infrastructure, and no IPv6-specific applications, it can experience little compulsion to take on the perceived expense and disruption of integrating IPv6 into its network. However, there are many compelling reasons for making the move to IPv6. To learn more ...
June 2014- With the evolution of IP surveillance technology, the emphasis has moved from simple monitoring of video footage to intelligent systems that are capable of identifying abnormal events or monitoring behaviour. As intelligence increases in these systems, so too do the applications for this technology. Consolidating all applications within an organisation onto a single infrastructure provides many benefits but can also pose many challenges. To learn more about how to overcome these challenges and make the ...
June 2014- Learn top five ways to get more from your SharePoint deployment using the RadiantOne Federated Identity Service. See how you can extend Microsoft SharePoint to larger populations outside of the Microsoft stack with ease, and ensure collaboration across all your constituencies and devices.
June 2014- With Linear Scalability and High-Availability, HDAP is Changing the Way You Store, Search and Manage Identity Information. HDAP delivers elastic computing to the enterprise identity infrastructure. With HDAP, companies can radically scale their access and throughput, using the first highly-scalable and secure directory that's based on big data and search technology.
In this whitepaper, we show how a federated identity service acts as a hub to empower your most critical identity initiatives, including single sign-on, web access management, federation with partners, and moving to the cloud.
Learn how a federated identity service based on virtualization offers simple, logical, secure, and standards-based access to all sources of identity inside your organization or enterprise-regardless of location, protocol, or format.
Today, enterprises rely heavily on applications for nearly all business-critical processes. These applications are delivered via a combination of hardware, software and services, known as the application delivery chain. To make this delivery chain work together effectively, IT must take a new and converged approach to network performance monitoring and application performance management.
This whitepaper discusses:
•Why NPM alone is not enough
•How application-centric APM is incomplete
June 2014- DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as ...
June 2014- Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it's essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.
June 2014- As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud acquisition and use continues to be driven by line of business, in 2014, traditional IT departments will stop asking "why cloud?" and instead get busy integrating cloud into the existing portfolio, extending data center infrastructures with elastic cloud technologies, and consuming new bespoke ...
March 2014- In this study, IDC examines the current state of the IT organization with respect to innovation. Based on a recent global study of 145 CIOs and IT executives, we delve into the disconnect between the CIO's aspiration to be chief innovation officer and the work that still needs to be done. We explore how innovative ideas are being initiated and cultivated within organizations and the methods currently being employed by CIOs as they evolve the profession ...
The notion of the CIO being the "chief innovation officer" is attractive. Challenging business conditions have morphed from being a phase in the economic cycle to being the new normal. Very few organizations can conduct their business in a pre-Lehman Brothers manner, and so innovation is highly relevant to economic survival. This in turn represents an opportunity to move the CIO center stage in terms of business relevance.
Unfortunately, this move does not ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services