ICQ White Papers

(View All Report Types)
Introducing IBM Lotus Sametime 7.5
sponsored by Insight
WHITE PAPER: Lotus Sametime 7.5 software will represent a significant upgrade in real-time collaboration capabilities. This paper will highlight Sametime 7.5 enhancements for instant messaging (IM), Web conferencing, telephony, video, VoIP and m...
Posted: 07 Dec 2006 | Published: 01 Mar 2006

Insight

Virtualizing Tier 1 Applications: A Critical Step on the Journey Toward the Private Cloud
sponsored by VMware, Inc.
WHITE PAPER: This IDC white paper explains how much of the Enterprise IT community is at a crossroads in extending their journey to the private cloud: Companies must virtualize their business critical applications in order to reap the benefits of cloud computing.
Posted: 14 Oct 2010 | Published: 01 Jan 2010

VMware, Inc.

Best Practices in Protecting the Technology Systems Revolutionizing Healthcare
sponsored by Emerson Network Power
WHITE PAPER: With technology infiltrating every aspect of healthcare, traditional approaches to power protection no longer suffice. This paper introduces a new hospital power protection model that leverages technologies and best practices forged in the data center.
Posted: 08 Aug 2013 | Published: 07 Jul 2009

Emerson Network Power

Transitioning to a Dynamic Data Center
sponsored by Hitachi Vantara
WHITE PAPER: The speed of change in global markets and the challenges of new modes of business demand companies operate in and react to quickly changing landscapes. Nowhere is this more critical than in the means and methods the enterprise uses to power its business, typically via IT services.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Hitachi Vantara

A Virtualization Roadmap from Dell and Intel
sponsored by DellEMC and Intel®
WHITE PAPER: Virtualization is more than a technology. It is a way of thinking about problems that allow us to go beyond the physical limitations nor­mally associated with entire classes of hardware, from servers to storage. Attaining the maximum benefits of virtualization, however, requires a plan and constant monitoring to ensure peak performance.
Posted: 29 Apr 2010 | Published: 29 Apr 2010

DellEMC and Intel®

What Enterprises Should Do About IPv6 in 2011
sponsored by Cisco Systems, Inc.
WHITE PAPER: The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

SAP Implementation and Operation in Integrated Environments
sponsored by VMware, Inc.
WHITE PAPER: Access this detailed technical brief to learn how creating a dynamic infrastructure can advance business performance and reduce operational efforts.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

VMware, Inc.

Realizing integrated interconnected service chain
sponsored by IBM
WHITE PAPER: Access this resource to explore how multi-sourcing and the cloud are changing the role of IT, and how you can realize an integrated, dynamic service chain that benefits the whole enterprise.
Posted: 17 Jul 2013 | Published: 30 Jun 2012

IBM

Mobilizing I.T. Support to Achieve Efficiency, Speed, and Effectiveness
sponsored by BMC Software, Inc.
WHITE PAPER: To survive in today's economy, your IT organization will face increasing pressure to do more with less and work from anywhere at anytime. Imagine how much more productive your service desk personnel could be if they were able to periodically manage and respond to issues from the field, rather than having to check in at their desktops.
Posted: 26 Jan 2010 | Published: 26 Jan 2010

BMC Software, Inc.

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.