Web 2.0 Reports

Time to Change: New Thoughts on Supporting Business Change
sponsored by SAP America, Inc.
WHITE PAPER: Learn how a new, interconnected economy is forcing companies to manage an ever-growing information network -- and the best way to adopt new technologies to give you greater flexibility for faster growth while maintaining business integrity.
Posted: 29 Jan 2010 | Published: 29 Jan 2010

SAP America, Inc.

To Block or Not. Is that the Question?
sponsored by Palo Alto Networks
WHITE PAPER: This White Paper is a practical guide to how to properly deal with Enterprise 2.0 applications (and what they are to begin with), from getting visibility to how to create and enforce policies that allow for safe enablement.
Posted: 05 Jan 2010 | Published: 01 Dec 2009

Palo Alto Networks

Expanding Information Access Initiatives with Embedded Enterprise Search
sponsored by Vivisimo, Inc.
WHITE PAPER: This paper focuses specifically on what application developers—specifically, ISVs and solution integrators—need to do in order to satiate this emerging market demand. Read on to learn some of Vivisimo's capabilities and how ISVs and solution integrators can leverage them to address evolving search challenges within their respective applications.
Posted: 22 Dec 2009 | Published: 22 Dec 2009

Vivisimo, Inc.

Using Social Search to Drive Innovation through Collaboration
sponsored by Vivisimo, Inc.
WHITE PAPER: This paper, will try to help you strike a balance between solid business thinking and explosive enthusiasm for any new technology option with 2.0 in the description. Our goal is to give you a new way of looking at old challenges.
Posted: 22 Dec 2009 | Published: 22 Dec 2009

Vivisimo, Inc.

Presentation Transcript: Considerations for IT
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Read this transcript of the 'Considerations for IT' podcast to learn why companies have chosen Google Apps to improve their IT infrastructures. Learn which technical and business factors drove one company to adopt this technology. Determine how this technology can be used in your IT environment to improve Web application performance.
Posted: 15 Dec 2009 | Published: 15 Dec 2009

Google Apps

E-Book: Protecting Against Web Threats
sponsored by TechTarget Security
EBOOK: Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.
Posted: 10 Dec 2009 | Published: 10 Dec 2009

TechTarget Security

Preparing for the 2.0 World: How Enterprises Need to Think About Emergent Social Technologies
sponsored by Sun Microsystems, Inc.
WHITE PAPER: Social technologies, commonly called Web 2.0, were originally used to describe consumer technologies that enable groups to organize and share information and media. But enterprises quickly caught on to the value of these easy-to-use tools for capturing and sharing ad hoc information that may otherwise not be documented.
Posted: 11 Nov 2009 | Published: 16 Apr 2009

Sun Microsystems, Inc.

Corporate networks: Business 2.0 and beyond
sponsored by SonicWALL
WHITE PAPER: The performance and security needs of corporate networks have evolved greatly in the last five years. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and affordability are now the key factors in network decision-making. Read on to learn more.
Posted: 29 Oct 2009 | Published: 24 Jul 2009

SonicWALL

SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions
sponsored by TechTarget Search Windows Server
EZINE: Having some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing.
Posted: 20 Oct 2009 | Published: 20 Oct 2009

TechTarget Search Windows Server

Presentation Transcript - Best Practices: Protect Your Online Revenue Through Web Performance Testing
sponsored by Gomez
PRESENTATION TRANSCRIPT: This transcript will discuss optimizing application performance and quality, and various strategies that IDC sees in its research to help you improve your decision making about how you approach quality, management and performance optimization. Read on to learn more about how to protect your online revenue through web performance testing.
Posted: 09 Oct 2009 | Published: 09 Oct 2009

Gomez

Download the Fall 2009 edition of Perform Magazine
sponsored by Actuate
EZINE: Download Perform today for informative and insightful articles including how open source is changing the face of enterprise software, tips from the field on how to ignite enterprises to reach new levels of performance excellence, and deliver unmatched insight to users.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

Actuate

E-Book: Taking Action on Analytics - Using Data for Customer Loyalty and Retention
sponsored by Infor CRM
EBOOK: In this E-Book, hear from analysts and experts about recent trends in customer data and learn how winning organizations are truly taking action on analytics. Learn about the challenges that many organizations face when establishing and maintaining customer data management and retention programs and how to meet those challenges head on.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

Infor CRM

The Best of Both Worlds: How to Effectively Leverage Social Media Relationships with Real-Time Collaboration Tools
sponsored by Citrix Online
EBOOK: This eBook explores how organizations can connect and nurture relationships with prospects and customers by effectively leveraging social media and real-time collaboration tools.
Posted: 21 Aug 2009 | Published: 19 Aug 2009

Citrix Online

When Web 2.0 Becomes Security Risk 2.0
sponsored by Kaspersky
WHITE PAPER: Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky

Business Communication Tools for Tough Times
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small businesses in particular have to do more with less, without compromising the ability to deliver quality products and services to their customers. Unified communications and Web 2.0 collaboration tools can help your employees be more productive right from their desktops, simply, easily, and cost-effectively.
Posted: 14 Aug 2009 | Published: 14 Aug 2009

Cisco Systems, Inc.

Preparing for the Web 2.0 World: How Enterprises Need to Think About Emerging Social Technologies
sponsored by Sun Microsystems, Inc.
ANALYST REPORT: IDC expects that the significant adoption of Enterprise 2.0 technologies in the enterprise will have a dramatic impact on how organizations capture, discuss, distribute, and protect their information. If companies are not already planning for this change, they will find themselves increasingly exposed and vulnerable.
Posted: 13 Aug 2009 | Published: 01 Apr 2009

Sun Microsystems, Inc.

Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 06 Aug 2009 | Published: 06 Jul 2009

Sophos

Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Sophos

Whitepaper: How to Segregate & Load Balance 10G Traffic to 1G Tools
sponsored by Gigamon
WHITE PAPER: Check out this brief paper to learn how using a Data Access Switch with multi-rule mapping feature to share the load among multiple parallel processing Gigabit tools, 10-Gig network can be monitored comprehensively and cost-effectively.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

Gigamon

Driving Revenue and Increasing Value with Application Performance Management
sponsored by BlueCoat
EBOOK: As a leading provider of solutions for Service Providers, Blue Coat appliances give you the visibility, acceleration and security needed for optimizing your network. Read this e-book to learn how Blue Coat gives you the control you need to deliver a whole set of new managed services for your business and consumer customers.
Posted: 26 Jun 2009 | Published: 22 Dec 2008

BlueCoat

Web 2.0 and Sales Process Management
sponsored by Oracle Corporation
WHITE PAPER: How can Web 2.0 systems and applications support management of sales processes? Read this white paper to find out!
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Oracle Corporation