June 2010- In preparation for disasters, it’s critical to have a backup site that can be used if your primary location goes down. Does your business have the right procedures and equipment to recover after a disaster? Get answers. Download this article about a new enterprise data center and learn more about protecting your IT infrastructure.
Cloud computing is an emerging computing model by which users can gain access to their applications from anywhere, through any connected device. A user-centric interface makes the cloud infrastructure supporting the applications transparent to users.
The applications reside in massively scalable data centers where computational resources can be dynamically provisioned and shared to achieve significant economies of scale. Thanks to a strong service management platform, the management costs of adding more IT resources ...
January 2010- The electrical power generation, transmission, and distribution system has survived for decades with limited intelligence. But the emergence of independent power producers, green power sources, and new regulatory regimes is making it imperative to add smarts to the grid.
February 2009- Business trends like mobility and outsourcing present IT with the challenging task of opening the network to a dynamic workforce, while at the same time protecting critical assets from the vulnerabilities that openness and user mobility bring. Learn how Juniper Unified Access Control (UAC) helps enterprises tackle the range of network and application access problems. Learn how UAC can address five common networking challenges.
October 2009- Audio conferencing has evolved significantly since the days of the neighborhood telephone party line. And the technology is undergoing another noteworthy transition, thanks to two significant factors: VoIP and the use of Web conferencing as a business tool. Take an in-depth look at the uses and costs of traditional audio conferencing, as well as the multitude of cost and productivity benefits companies realize with computer-based audio conferencing.
October 2009- Software developers don’t work in a bubble. Whether they’re in adjacent cubes or adjacent time zones, developers must communicate efficiently to ensure project success. Relying only on instant messaging, e-mail, and phones to connect with one another works, but slowly -- it's kind of like running in a pool. Learn the key challenges remote developers and teams face while exploring the advantages of leveraging an online collaboration solution to instantly connect, eliminate travel, ...
October 2009- Today, stakeholders and projects pepper the globe. Successfully navigating the project lifecycle –- from risk management and estimating to managing scope and facilitating knowledge transfer –- now requires a different recipe. This new eBook explores how companies can implement virtual collaboration tools throughout the project lifecycle to effectively manage projects from start to finish.
October 2009- There’s no “one size fits all” when it comes to telecommuting. This new Forrester white paper explores how implementing best practices to create a telecommuting program and standardized policy significantly reduces operational costs and increases employee productivity -- a winning combination in a tough economy.
October 2009- By 2011, the mobile workforce in the U.S. is expected to reach 120.1 million people. Embracing this trend is more of a question of "how" rather than "if": How will you measure, manage, and build relationships with increasingly distributed teams and workers? Learn how to effectively manage workers in an increasingly mobile environment.
October 2009- Proven technologies such as Double-Take® Backup from Double-Take Software make it possible to reliably and cost-effectively back up branch office from a central location, in real-time to disk or tape – and even utilize existing tape backup solutions. Learn about how Double-Take Backup reduces the window for data loss, is more efficient than tape, and less costly than tape or other replications solutions.
February 2009- Telework isn't just a way to reduce commuting costs; it's a strategic advantage and a promising work practice that achieves multiple goals. This document outlines the factors spurring telework and identifies its challenges. Plus, see how Adobe addresses the unique technology requirements associated with teleworking.
April 2009- Government has a tremendous responsibility to lead by example. Nowhere is this truer than in its efforts to lead the way with sustainable business. This article shows how government agencies can operate their agencies in efficiently, be environmentally proactive, save money, and improve constituent services by managing documents and work digitally with ECM.
March 2008- Voice over wireless LANs (VoWLANs) require such things as pervasive coverage and quality of service, among other factors. This white paper examines such requirements and whether a voice-capable WLAN can be deployed in a cost-effective manner.
March 2008- The Department of Transportation's Next-Generation 9-1-1 initiative seeks to establish the foundation for public emergency communications services in a wireless mobile society.
October 2008- This white paper describes the ePass Authentication USB Token, where to use it, and why to use it. It also lists all the ePass family products and their basic specifications.
December 2008- KVM technology is designed for IT organizations that need to ensure the health of its computing infrastructure within tight staff resource constraints. With KVM, IT staff can instantly take control of devices anywhere at any time in order to solve problems, perform essential management tasks, and respond to changing business requirements. This white paper outlines the specific attributes of the user experience that KVM buyers should consider when choosing a solution--and how those attributes impact ...
January 2009- A leading industry analyst was quoted saying: “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just a protocol for internal and external file integration mechanism”. Not only has FTP widely spread throughout organizations, but its popularity seems to have no limit and is continually increasing. Unfortunately there has been an increasing number of security incidents where FTP was identified as a critical factor. To put ...
October 2007- According to a study published recently in the Journal of Computer Mediated Communication, about 80% of publicized data breaches came from internal sources. This suggests that organizations that have focused their IT security efforts only on protecting the perimeter are at high risk for potentially disastrous insider security breaches. Recognizing the magnitude of the insider threat, Carnegie Mellon University's Software Engineering Institute issued a research report that recommends 13 best practices to help detect and prevent insider ...
March 2008- The concern over the environmental impact of the increased usage of computing technology has far reaching ramifications on the sustainability of business IT operations. Already increasing energy costs and expanding power utilization needs are having a direct impact on business profitability. Add to this the social concerns over the global climate crisis and conservation efforts that have led to regulatory compliance initiatives, and businesses are increasingly pressured to find new solutions to ensuring IT business ...
May 2013- Has your Enterprise made the strategic decision to consolidate remote site IT infrastructure into central data centers? Then you have probably discovered that consolidation projects are fraught with technical, organization, and implementation challenges that require a well thought-out strategy. Download this paper by Riverbed and discover a clear 5-step approach to making sure every consolidation project is successful.
January 2008- This white paper from Dynamsoft focuses on the growing problem for development teams who try to use Microsoft Visual SourceSafe (VSS) remotely. The paper will highlight the causes of this problem and reveal options to resolve the problem. This paper is just as beneficial to those who make the buying decisions within the company since it will give them a better understand of the problems their developers are facing and the solution that could save ...
January 2008- This paper from Dell describes how Dell Remote Access Controller (DRAC) 4 enables users to remotely monitor, troubleshoot and repair servers, even when the server operating system is down. It describes about the features DRAC 4 offers. DRAC 4 security features mitigate the security risks that exist while data is being transmitted across the network. The paper briefly describes the security features that DRAC 4 uses to help ensure authentication, authorization, privacy and data integrity.
January 2008- Using Dell Remote Access Card 5 (DRAC 5) one can easily remotely monitor, troubleshoot, and repair servers even when the server is down. It offers a rich set of features like virtual media, virtual Keyboard Video Mouse, and so on, which have the potential to make the system prone to security risks. This Dell paper briefly describes the security features that DRAC 5 uses to help ensure authentication, authorization, privacy, and data integrity. DRAC 5 provides an Administrator with ...
January 2008- The Johns Hopkins Desktop Computing Services (DCS) group is a subsidiary of the IT organization that supports 9,000 desktop PCs in The Johns Hopkins Hospital, pediatrics and surgery departments, remote sites, and other labs, clinics, and administrative areas. The DCS group needed effective ways to accelerate diagnostics and repair of both software and hardware problems. The Johns Hopkins IT Group worked with Intel Solution Services to evaluate the remote PC management capabilities of Intel vPro technology1 ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services