Vertical Industries  >   Information Industry  >  

Directory Publishers

RSS Feed    Add to Google    Add to My Yahoo!
Directory Publishers White Papers (View All Report Types)
Case Study: Travel Agency Builds Business and Cuts Costs with the Right VDI
sponsored by VMware
WHITE PAPER: In this white paper, discover how a travel agency found an easily-deployable VDI solution that enabled them simplify IT management while streamlining business.
Posted: 27 May 2015 | Published: 31 Dec 2010


Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007


Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Business Analytics: Helping You Put an Informed Foot Forward
sponsored by SAS
WHITE PAPER: What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more.
Posted: 30 Jul 2010 | Published: 30 Jul 2010


Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Next Generation Data centre Index – Cycle III
sponsored by
ANALYST REPORT: Organisations that are investing in key areas of IT and changing their mindset in the way they approach IT are well ahead of those just trying to save money,  say analysts Clive Longbottom and Bob Tarzey.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

The Identity of Things (IDoT): Access Management (IAM) Reference Architecture for the Internet Of Things (IoT)
sponsored by ForgeRock
WHITE PAPER: This white paper describes how to apply identity services based on the underlying device architecture, as well as the native protocols and standards being used. Access now and discover which features play a significant role in applying identity services.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Tracking the 5 W's of Change in Active Directory, SharePoint, SQL Server, Exchange and VMware
sponsored by Dell Software
WHITE PAPER: This informative white paper explains the importance of visibility into your key infrastructure technologies and applications, central to most networks today.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell Software

Accenture Technology Vision 2014
sponsored by
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012


Buyer Pulse Buyer Case Study: Grand Island Public Schools Implements Identity Solution to Centralize Management and Increase Security
sponsored by Centrify Corporation
WHITE PAPER: Read this IDC Buyer's Case Study focused on how Grand Island Public Schools (GIPS) implemented the Centrify Identity Service for Mac and Mobile to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Posted: 29 Oct 2015 | Published: 30 Apr 2013

Centrify Corporation

Tracking Change & Malicious Activity in Critical Technologies
sponsored by Dell, Inc.
WHITE PAPER: This white paper can help you to make the most of your critical technologies' native auditing capabilities and to supplement those capabilities when they don't provide enough security.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

Dell, Inc.

Managing the Insider Threat with Active Directory Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper discusses the dangers malicious actors pose to Active Directory and gives suggestions for AD security best practices.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Dell, Inc.

Modernizing Your Active Directory Environment
sponsored by Dell Software
WHITE PAPER: Access this white paper and find out how legacy active directory (AD) structures can be updated to accommodate changes in technology. Discover top areas in which AD modernization should occur, and the benefits of updating each one.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Dell Software

Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010
sponsored by
EBOOK: While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at for a top-to-bottom, expert analysis of the Exchange migration process.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

Active Directory Backup and Recovery with Veeam
sponsored by Veeam Software
WHITE PAPER: This white paper reveals the main components needed for successful recovery. Read on to find out what you should consider when backing up AD, recovery of a full virtual machine, and more.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Veeam Software

A Computer Weekly buyer’s guide to hybrid cloud
sponsored by
ESSENTIAL GUIDE: Computer Weekly looks at how to find the best hybrid cloud provider for your organisation, the impact of hybrid cloud on the infrastructure manager and how Microsoft is catching up with the cloud market with Azure.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Meet HDAP: The World's First Large-Cluster, Elastic LDAP v3 Directory Built on "Big Data" Standards
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper reveals the advantages HDAP has over LDAP and why it is a better fit for enterprise identity management.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Radiant Logic, Inc.

A Closer Look at Microsoft Office 365 Security
sponsored by Rackspace
EGUIDE: This expert guide reviews the pros and cons of Office 365's security features. Access now to learn where Office 365's security falls short of your needs and what you can do about it.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


IDC Analyst Connection: In-Memory Technology for Modern Financial Applications
sponsored by Workday
WHITE PAPER: Read now to hear from Christine Dover, Research Directory of IDC's at Workday. Learn key considerations and benefits in the use of in-memory technology for your financial applications. Continue on to explore the benefits of employing in-memory processing technology.
Posted: 05 Mar 2015 | Published: 31 Dec 2014


Wireless LAN ITDC - Checklist #2
sponsored by
EGUIDE: Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

Access Images and Clinical Documents Anywhere, Anytime
sponsored by McKesson Corporation
WHITE PAPER: Access this white paper and learn how to achieve timely access to more of the patient's longitudinal record from a single user interface, as well as share this information across the care continuum.
Posted: 03 Sep 2015 | Published: 29 May 2015

McKesson Corporation

Forrester Market Overview: Solutions for Cloud Security Management
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 16 Jul 2015 | Published: 02 Jun 2015


How to select cloud formations for secure business collaboration
sponsored by
WHITE PAPER: Cloud computing offers massive scalability -  in virtual computing power, storage, and applications resources - all at almost immediate availability and low cost, and business managers are demanding their IT operations assess the benefits this new computing model can represent.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

Making Sign-on Simple and Secure
sponsored by Radiant Logic, Inc.
EBOOK: Single sign-on has a complicated history. This technical guide brings you up to date on how the main protocols for single sign-on -- OpenID and Security Assertion Markup Language (SAML) -- compare and how they can be connected to the pieces you already have. While SAML seems to be winning the field, OpenID shouldn't be ruled out.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  Security | SSO
Radiant Logic, Inc.

Computer Weekly – 6 October 2015: What's on your desktop?
sponsored by
EZINE: In this week's Computer Weekly, Microsoft has released Office 2016 and is urging customers to migrate to Windows 10 – but is a desktop upgrade worth the hassle? We report from the Dreamforce conference on the latest products from
Posted: 05 Oct 2015 | Published: 05 Oct 2015

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Customer story: Magma Mobile
sponsored by IBM
CASE STUDY: Magma Mobile needed an iaaS provider that could provide them with fast and responsive servers that would guarantee them a quality use-end experience.
Posted: 14 Feb 2014 | Published: 31 Dec 2013


Best Practices Checklist: Email Security Cloud and Virtual Migration
sponsored by Dell Software
WHITE PAPER: If you are considering migrating email security to the cloud, read this paper and discover best practices for planning and executing an email security migration that minimizes the risk of business disruption.
Posted: 13 Feb 2015 | Published: 31 May 2013

Dell Software

New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM
sponsored by
EGUIDE: This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.
Posted: 26 Mar 2013 | Published: 26 Mar 2013
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement