Directory Publishers White Papers

(View All Report Types)
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Business Analytics: Helping You Put an Informed Foot Forward
sponsored by SAS
WHITE PAPER: What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Automate Active Directory Jobs with PowerShell Scripts
sponsored by Goverlan
EGUIDE: Active Directory has uses ranging from password management to generating child domains, but these tasks rely on fairly repetitive processes. Fortunately, that also makes these tasks suitable for automation. In this guide, learn how automating your Active Directory tasks with PowerShell scripts can make it possible.
Posted: 03 May 2018 | Published: 30 Apr 2018

Goverlan

Who, What, Where? How the Cloud Complicates Identity Management
sponsored by SearchWindowsServer.com
EBOOK: In the era of consumerization, cloud computing and heightened security worries, running an effective identity management program is no small task.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

SearchWindowsServer.com

Manufacturing ERP Buyer’s Guide – 2011 Edition
sponsored by SearchManufacturingERP
EBOOK: Compiled by SearchManufacturingERP.com editors, this directory includes ERP software products for process and discrete manufacturers of all sizes, as well as all verticals. It includes software that is meant to be deployed on-premise as well as Software as a Service (SaaS) or on-demand software.
Posted: 14 Aug 2009 | Published: 22 Jan 2009

SearchManufacturingERP

SSO for Office 365, Azure and On-Premises Environments
sponsored by Rackspace Technology
WHITE PAPER: Learn to optimize your Active Directory-federated services for power and productivity when using a hybrid architecture.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

TOPICS:  IT Management
Rackspace Technology

Definitive Guide to Exchange Server 2010 Migration: Chapter 3: Exchange 2003 to Exchange 2010: Making the Transition
sponsored by Dell, Inc. and Intel®
EGUIDE: In this chapter, our Exchange Server expert explains the prerequisites and imperative steps to help you smoothly transition to Exchange 2010.
Posted: 16 Aug 2011 | Published: 16 Aug 2011

Dell, Inc. and Intel®

Advanced Virtualization E-book - Chapter 5: Avoid Security Holes in the Virtual Data Center
sponsored by SearchServerVirtualization
EBOOK: In Chapter 5 of the Advanced Virtualization e-book, security experts Danielle Ruest and Nelson Ruest explain how to identify, map out and prevent some of the most common resource pool threats. The authors also debunk five common security misconceptions of server virtualization.
Posted: 29 Apr 2010 | Published: 29 Apr 2010

SearchServerVirtualization

Five Quick Tips on Microsoft Azure Management
sponsored by Rackspace Technology
EGUIDE: Since 2015, Microsoft claims its cloud service has seen an increase in adoption with more than 10,000 new customers signing up for Azure each week. This e-guide explores five resources to help you get better acquainted with some of the key features of Microsoft's cloud offering.
Posted: 01 Aug 2016 | Published: 29 Jul 2016

Rackspace Technology

BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

E-Guide: Top Considerations for Migrating to Exchange 2010
sponsored by Metalogix
EGUIDE: In this expert e-guide, discover what you need to know before migrating to Exchange Server 2010. Explore the new features and tools that Exchange boasts, and which features will not longer be supported. Find out the important prerequisites you'll need before making the transition.
Posted: 31 Jan 2012 | Published: 31 Jan 2012

Metalogix

DNS challenges have changed, but its vital role hasn't
sponsored by SearchNetworking.com
EBOOK: DNS challenges, from IPv6 to the complexities of IoT, must be overcome, since a smooth-functioning domain name system remains essential for networking.
Posted: 05 Mar 2018 | Published: 05 Mar 2018

SearchNetworking.com

Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010
sponsored by SearchDataCenter.com
EBOOK: While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

SearchDataCenter.com

CW ANZ: Object storage hits a sweet spot
sponsored by ComputerWeekly.com
EZINE: Enterprises in Australia are only getting started on object storage, which does away with the traditional file directories, making it easier to access and move data in a heterogeneous IT environment.
Posted: 11 Jun 2018 | Published: 11 Jun 2018

ComputerWeekly.com

Sharepoint E-zine Vol.4: Balancing SharePoint Governance
sponsored by SearchWinIT
EZINE: SharePoint has built-in features that allow site owners to create site maps without any custom coding at all.
Posted: 18 Nov 2008 | Published: 18 Nov 2008

SearchWinIT

Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021

ComputerWeekly.com

SharePoint E-Zine Volume 11: Managing Documents By Content Type
sponsored by SearchWinIT
EZINE: SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
Posted: 19 Jun 2009 | Published: 19 Jun 2009

SearchWinIT

Achieving the Best Possible Cloud Revenue Stream and Profit: Expert Insight
sponsored by DellEMC and Intel®
EGUIDE: This expert e-guide covers the current state of the hybrid cloud and unveils some best practices for optimizing your revenue stream and profits.
Posted: 06 May 2014 | Published: 06 May 2014

DellEMC and Intel®

Making Sign-on Simple and Secure
sponsored by SearchSecurity.com
EBOOK: Single sign-on (SSO) has a complicated history but this technical guide can bring you up to date quickly on how the main protocols for SSO - OpenID and Security Assertion Markup Language (SAML) - compare and how they can be connected to the pieces you already have.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  Security | SSO
SearchSecurity.com

What’s New in VMware View 5.1: Integration, Storage, Endpoint Support
sponsored by VMware, Inc.
EGUIDE: This expert guide provides an in-depth look at the new features of VMware View 5.1, allowing you to examine and analyze their potential benefits and drawbacks and decide if it would be a good fit for your virtual desktop needs.
Posted: 30 Jan 2013 | Published: 30 Jan 2013

VMware, Inc.

Market Guide For Identity Governance And Administration
sponsored by SailPoint Technologies
ANALYST REPORT: Due to the typical five-to-eight-year life span of identity governance & admin (IGA) tools, security and risk management (SRM) leaders must constantly prepare for the future. Access Gartner’s analyst report, Market Guide for Identity Governance and Administration, a resource to aid SRM leaders in anticipating future trends in the IGA market.
Posted: 22 Aug 2022 | Published: 22 Aug 2022

TOPICS:  .NET
SailPoint Technologies

Identity Management in the Cloud Era
sponsored by SearchWindowsServer.com
EGUIDE: This expert cloud handbook presents the latest approaches to identity management in today's cloud and mobile IT era. Learn more about re-assessing your identity management strategy, how Windows Server 2012 enables Active Directory cloud deployments, SaaS tools for improved identity management and much more.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

SearchWindowsServer.com

The Balancing Act of Choosing an Application Integration Tool
sponsored by Oracle Corporation
EGUIDE: When shopping for an application integration tool, it can be challenging to decide which drivers you should prioritize so that your ultimate choice provides the features you actually need. This e-guide provides expert advice to help you determine the optimal balance of features to look for in an application integration tool.
Posted: 24 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

Presentation Transcript: Getting Started with Unified Communications in an Exchange 2007 Environment
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: Check out this webcast transcript to learn how to implement Office Communications Server in a Microsoft Exchange environment, looking at unified communications solutions encompassing unified messaging, data web conferencing and audio conferencing.
Posted: 26 Feb 2009 | Published: 26 Feb 2009

DellEMC and Intel®

What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

SearchSecurity.com

Wireless LAN ITDC - Checklist #2
sponsored by SearchSecurity.com
EGUIDE: Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

Information Security Magazine – July/August 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com