- Using Reversible Debugging for Linux to Increase Software Dev Productivity
- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
- Game Changer: Unlocking Employee Access to Information
- Big Data Needs Big Pipes
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain
February 2010- This white paper discusses how MOSS-based collaboration solutions can help airlines improve employee productivity and reduce costs. It explains the challenges faced by internal departments and how MOSS features can help address them.
December 2009- This EMC Perspective explores how virtualization is being used in today's businesses to provide immediate and significant benefits to Microsoft-centric IT organizations. This paper targets the business and technical decision-maker who has heard about virtualization but wants to know more about how virtualization can provide a significant return on investment (ROI) while reducing the total cost of ownership (TCO).
February 2010- In some business environments, e-mail has become the dominant form of communication with customers and partners. This white paper discusses how to make corporate e-mail more reliable through the use of telecommunication concepts and tools so maximum availability can be ensured.
Businesses often struggle to meet the demands of a complex .NET infrastructure that requires ever-increasing flexibility and agility. They typically lack a comprehensive view of .NET application behavior and the issues associated with distributed transactions. This limits their ability to achieve real-time diagnosis of code failures or identify and eliminate critical performance bottlenecks.
This white paper details methods for effectively diagnosing .NET application errors using Microsoft’s System Center Operations Manager 2007 and both ...
It’s a truth we all know – the vast majority of applications will experience a failure or performance bottleneck at some time, whether due to expected or unexpected errors. An effective application monitoring and management solution enables organizations to proactively identify application issues and to generate real-time alerts when those issues occur, helping to ensure optimal application availability and reliability.
This white paper explores approaches for effectively monitoring business applications to ensure they ...
The growing complexity of distributed enterprise application environments creates challenges for effectively managing and monitoring applications. Organizations may lack the solutions necessary for “keyboard-to-eyeball” production level monitoring and troubleshooting. Without these solutions, it is time-consuming and difficult to identify sources of application failures and bottlenecks.
This white paper addresses how to troubleshoot common application problems that occur on production servers. Learn how to effectively pinpoint the sources of application crashes and functionality failures. ...
November 2009- This paper provides an in-depth look at AutoVirt 3.0 management software for unstructured data on Windows networks. Learn how IT departments use AutoVirt’s global namespace and policy engine to automate copying, migration, and replication jobs.
March 2009- You are buying more software than you need! You've long suspected this but cannot prove it. Your software vendors certainly will not help as metrics on "need" are never used to assess the number of licenses required. Your IT organization can't help because it can only refer to its Software Asset Management tools, which concern themselves with being in compliance with license terms not saving money. As IT costs come under greater scrutiny, this dirty ...
September 2009- The current recession is unlike any other in living memory in that we will occupy a very different world when growth returns. In order to survive in what is likely to become an austere decade, a new spirit of collaboration between finance and IT is required. This white paper explores some of the issues organizations grapple with when pursuing a strategy of cost reduction and offers simple ideas for eliminating most unnecessary spend, without any ...
December 2010- Understand the data loss risks for businesses when migrating to Microsoft Exchange 2007. Learn the sources of these risks, the consequences of not fully safeguarding data during this transition, and how archiving can play an important role in protecting against data loss in the transition. Discover the fail points in the migration that causes data loss such as site failures as well as the risks from the lengthy timeline to fully execute a migration. Finally, see ...
March 2009- This paper –- co-authored by AvePoint and Microsoft -– reviews best practices for propagating SharePoint customizations, services, and solutions throughout a complex SharePoint environment, and introduces tools and strategies available to automate and streamline this process.
February 2009- This document is intended to aid IT administrators and other stakeholders responsible for managing Microsoft SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.
April 2009- This white paper is intended to aid IT administrators responsible for managing Microsoft SharePoint deployments in planning and implementing a comprehensive, reliable, and efficient data protection strategy appropriate to their organizational needs. It outlines the planning, guidelines, and implementation considerations for SharePoint backup and disaster recovery, then briefly reviews the singular attributes of DocAve Backup and Recovery.
May 2009- Pacific Timesheet is Web-based timesheet software that provides payroll, project, job costing, time, and attendance features in one system. Other modules include automated approvals, billing and pay rates, time-off scheduling, custom reporting, iPhone timesheet, IVR integration, time clock integration and DCAA compliant. The company says it supports all major operating systems and browsers. The software is available in license or ASP/online.
June 2009- Pacific Timesheet is Web-based timesheet software that provides payroll, project, job costing, time, and attendance features in one system. Other modules include automated approvals, billing and pay rates, time-off scheduling, custom reporting, iPhone timesheet, IVR integration, time clock integration, and DCAA compliance. The software supports all major operating systems and browsers. It is available in license or ASP/online.
May 2009- Binary Tree's patent-pending "Migration Factory" process enables large organizations to migrate up to 10,000 users a week from Lotus Notes to Microsoft Exchange and Outlook. This process uses Binary Tree's CMT for Exchange software and a field-proven migration methodology to migrate more than 10 TB of messaging data and up to 10,000 users a week from geographically dispersed locations.
June 2009- This white paper introduces the key areas in which Windows 7 differs from Vista - areas you'll need to focus on if you're thinking of moving to Windows 7, either from Vista or from XP. Even the most ardent fans of XP should take a look at Windows 7. Use it as a starting point for your own evaluation research. The areas examined in this white paper include deployment, hardware support, speed, robustness, security, ease of use, and ...
June 2009- ASP.NET provides a robust framework for building Web applications that minimizes the amount of code that's required to be written. Although most developers rely on Visual Studio or Web Developer Express when building applications, there's no substitute for knowing the framework when it comes to increasing productivity. The more you know about built-in functionality in the .NET framework and ASP.NET, the less code you have to write, which ultimately makes your applications more ...
June 2009- Security is an important part of any IT infrastructure, but as technology progresses, there will always be people who will try to infiltrate your network to do their malicious deeds. As security technology improves, so do the skills of these notorious hackers. This white paper addresses key things you can do to protect your organization from the 10 most dangerous security threats to your networks.
When moving from IBM Lotus Notes to Microsoft Exchange Server and Microsoft Office SharePoint Server, making sure the two platforms can coexist during the migration is critical to success! Why? A migration could take weeks, months or years – so for a smooth transition period, enterprise applications must be able to operate between Notes, Microsoft Exchange Server and Microsoft Office SharePoint Server.
In the Quest white paper, “Achieving Successful Coexistence Between Notes and Microsoft ...
April 2009- Document management in the age of vast and relatively cheap computer storage space has made organizing files more difficult than ever before. Selecting a document management system is a daunting task and should be carefully considered. The amount of time spent managing documents outside of a document management system should be investigated to determine if there is a compelling reason to use a system.
January 2007- This whitepaper serves as a guide for physicians, medical administrators and their staff members who are charged with hiring an IT services company in the large specialty-practice setting. The guide aims to arm the consumer with relevant questions and information to make the selection process as efficient as possible.
April 2009- Ever since Microsoft rolled out Terminal Services for the Windows NT platform, changes to the basic design have been relatively unnoticed. Enhancements to this popular and long-running feature have taken place mostly in the background build addressing security and authentication. Not until now has the product undergone so much change gearing towards the needs of an enterprising environment. This white paper discusses how Microsoft has addressed the transparency of Remote Desktop Services, the new name ...
October 2008- Microsoft Exchange is often the single most important application for the businesses that use it. Should Exchange or Exchange data be unavailable, the entire organization comes to a halt, at least temporarily, until adjustments are made. A consistent method of validating the recoverability of Exchange is paramount to any everyday or disaster recovery plan.
October 2008- Windows Server applications are often mission-critical. The impact of natural, random and man-made disasters on these applications, especially email, and their subsequent disruption can cripple an organization. This white paper from AppAssure Software offers advice for protecting your existing Windows Server infrastructure from disruptive application outages.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services