Transmission and Distribution White Papers

(View All Report Types)
IBM Service Management for the Intelligent Utility Network
sponsored by IBM
WHITE PAPER: The current utilities environment requires companies to decrease costs while increasing the ability to control utility assets. One key challenge is how to take advantage of new technologies to better manage the delivery of service to customers today and into the future. IBM Service Management for the IUN provides a blueprint for getting started.
Posted: 06 Dec 2010 | Published: 06 Dec 2010


Transforming Insight Into Action With Business Event Processing
sponsored by IBM
WHITE PAPER: This white paper explores key business event processing capabilities that are helping energy and utilities organizations to manage instrumented and intelligent utility networks detect outages, improve grid security, and prevent fraudulent use of energy.
Posted: 10 Oct 2011 | Published: 31 Dec 2009


How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013


3-Phase Power in the Data Center
sponsored by Server Technology, Inc.
WHITE PAPER: Greater equipment densities and power demands are driving the need for 3-phase power in the equipment cabinet. This white paper explains 3-phase power, its advantages and the cost savings associated with using it in the data center.
Posted: 04 Sep 2007 | Published: 01 Sep 2007

Server Technology, Inc.

Leading Energy Utility Company Increases Efficiency Through PeopleSoft Financials and HRMS Systems Upgrades
sponsored by Hexaware Technologies
WHITE PAPER: Explore the four phases of the lifecycle for the upgrade methodology of an on-site delivery model that provides upgrade services to enable one organization to achieve its business objects.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

Hexaware Technologies

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007


Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Intercepting Interference
sponsored by Motorola, Inc.
WHITE PAPER: Motorola’s industry leading wireless broadband expertise helps to substantially reduce the effects of interference for point-to-multipoint wireless access and distribution networks in both licensed and unlicensed frequencies. This solution paper gives the details.
Posted: 25 Sep 2009 | Published: 01 Sep 2009

Motorola, Inc.

Dynamic Data Security
sponsored by Xage
DATA SHEET: To help you achieve modern data success, this white paper explores how Xage Security’s Dynamic Data Security enables you to cooperate across different data platforms while ensuring authenticity, integrity and privacy. Access the white paper here to learn more about Dynamic Data Security.
Posted: 28 Feb 2023 | Published: 28 Feb 2023


Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
sponsored by Schneider Electric
WHITE PAPER: In this white paper, explore efficient methods of measuring Scope 3 emissions and propose an inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
Posted: 09 Mar 2023 | Published: 09 Mar 2023

Schneider Electric

Wi-Fi 6 & 6E
sponsored by Extreme Networks
EBOOK: Wi-Fi technology is ingrained into organizations’ day-to-day processes. And now, Wi-Fi 6 and Wi-Fi 6E are part of a wireless paradigm shift toward infinitely distributed connectivity. Download “Wi-Fi 6 & 6E for Dummies” to learn how to future-proof your company’s network.
Posted: 29 Mar 2023 | Published: 29 Mar 2023

Extreme Networks

Understanding DLP in the cloud
sponsored by TechTarget Security
EGUIDE: In this tip, uncover how data loss prevention (DLP) for the cloud works and how it can actually enhance security and compliance beyond traditional DLP solutions for physical environments.
Posted: 04 Jun 2012 | Published: 04 Jun 2012

TechTarget Security

Key Merits Of Opendata Dcim
sponsored by Modius
WHITE PAPER: To meet the challenges of wide-ranging, multi-site data collection, a DCIM system requires a scalable, contemporary IT architecture. Find out how the OpenData DCIM can deliver full visibility into the performance of your mission-critical infrastructure in this product overview.
Posted: 06 Jul 2022 | Published: 06 Jul 2022


Zero Trust Access Management
sponsored by Xage
WHITE PAPER: Amidst the rise in diverse networking and digital presence, traditional IT security methods are falling short. In this white paper, Xage presents an overview of their approach to the zero-trust access philosophy, looking at the shortcomings of prior approaches, and demonstrating the methodology behind their strategy. Read on to learn more.
Posted: 23 Feb 2023 | Published: 23 Feb 2023


Top 12 most commonly used IoT protocols and standards
sponsored by TechTarget
EGUIDE: Researchers estimate the number of IoT connections will reach 30.9 billion by 2025. Nowadays, IoT protocols are as critical to the existence of IoT as the things themselves. Technologists can select from multiple communication protocols when building a network to serve their IoT ecosystem. In this infographic, we list the most common ones.
Posted: 10 Aug 2022 | Published: 10 Aug 2022


Enhance Security With Automation
sponsored by Red Hat
EBOOK: As the cybersecurity landscape is constantly evolving, security teams need to constantly explore new tools and strategies. To help share these strategies, this e-book highlights 5 success stories from Red Hat Ansible Automation Platform customers that use automation to integrate and scale their security solutions. Read on to learn more.
Posted: 19 May 2023 | Published: 19 May 2023

Red Hat

Zero Trust Network Access
sponsored by Palo Alto Networks & ePlus
EBOOK: The rise of sophisticated cyberattacks has resulted in many businesses adopting Zero Trust Network Access (ZTNA) solutions, some of which are ZTNA 1.0 and some ZTNA 2.0. Explore this e-book to learn how ZTNA 2.0 solutions emerged to usher in secure access for today’s new norm: remote work.
Posted: 25 Apr 2023 | Published: 21 Apr 2023

Palo Alto Networks & ePlus

Zero Trust Network Access
sponsored by Palo Alto Networks
EBOOK: The rise of sophisticated cyberattacks has resulted in many businesses adopting Zero Trust Network Access (ZTNA) solutions, some which are ZTNA 1.0 and some ZTNA 2.0. Explore this e-book to learn how ZTNA 2.0 solutions have emerged to usher in secure access for today’s new norm: remote work.
Posted: 31 Aug 2022 | Published: 31 Aug 2022

Palo Alto Networks

Four DLP Best Practices To Enhance Security
sponsored by TechTarget Security
EGUIDE: Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

TechTarget Security

Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
sponsored by TechTarget
RESOURCE: Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
Posted: 06 Jul 2020 | Published: 06 Jul 2020


Accelerate Your It Strategy With High-capacity Networking
sponsored by Spectrum Enterprise
WHITE PAPER: Today’s government networks support an array of devices and cloud applications that continue to grow more complex and data-hungry. Access this white paper to learn how you can overcome your network bandwidth challenges by accelerating your IT strategy.
Posted: 25 Jul 2022 | Published: 26 Jul 2022

Spectrum Enterprise

The 4 Most Important Facets of Hybrid Cloud Security
sponsored by Microsoft
WHITE PAPER: Learn how the best solutions handle the crucial elements of hybrid storage security, from data access to data at rest.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

TOPICS:  IT Management

The Current State of Blockchain Compliance
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
Posted: 01 Mar 2017 | Published: 24 Feb 2017

All resources sponsored by BAE Systems Applied Intelligence

Einfluss und Nutzen des Enterprise Asset Managements
sponsored by IBM (German)
WHITE PAPER: Unternehmen, die in einem anlagenintensiven Umfeld tätig sind, haben es besonders schwer. Lesen Sie, wie Maximo Asset Management mit intelligenterer Infrastruktur zum Erfolg führt.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

TOPICS:  IT Management
IBM (German)

How to Slash Corporate Fax Telephone Charges 20 - 80%: Overview of V.34 Faxing and JBIG Document Compression
sponsored by FaxBack, Inc.
WHITE PAPER: An in-depth look at V.34 high-speed fax and JBIG document compression technology...designed to save companies significant money in reducing fax telephone charges.
Posted: 18 Sep 2003 | Published: 01 May 2004

FaxBack, Inc.

Video Tech Stack 101: The First Step To Your Video-First Strategy
sponsored by BytePlus
EBOOK: According to the Digital 2023 Global Overview report by Meltwater and We Are Social, 92.8% of internet users worldwide watch digital videos on a weekly basis. Read this e-book to learn about 7 key considerations you should make when building your video tech stack to create the optimal viewing experience.
Posted: 16 May 2023 | Published: 16 May 2023


Cloudflare Magic Transit Protects Networks While Improving Performance
sponsored by Cloudflare
WHITE PAPER: This white paper details Catchpoint test results for Cloudflare Magic Transit, which provides DDoS protection and traffic acceleration for your networks. The test results show that network performance (latency and packet loss) improved when traffic was routed over Magic Transit. Access the paper to see the specific takeaways from the test.
Posted: 22 Mar 2023 | Published: 22 Mar 2023


Presentation Transcript: WAN Acceleration and Optimization FAQ
sponsored by Riverbed Technology, Inc.
PRESENTATION TRANSCRIPT: In this paper Jeff Boles, Senior Analyst with the Taneja Group, outlines the significance of WAN optimization in the disaster recovery (DR).
Posted: 11 Feb 2009 | Published: 11 Feb 2009

Riverbed Technology, Inc.

WAN Acceleration and Optimization FAQ
sponsored by Riverbed Technology, Inc.
PRESENTATION TRANSCRIPT: Learn more about WAN acceleration and optimization by reading this interview conducted by Chris Griffin, Assistant Editor for Here he asks Jeff Boles, Senior Analyst with the Taneja Group, the questions your organization needs to know in order to increase the performance of its WAN.
Posted: 04 Aug 2009 | Published: 01 Aug 2009

Riverbed Technology, Inc.

WAN Acceleration and Optimization: Frequently Asked Questions
sponsored by Riverbed Technology, Inc.
PRESENTATION TRANSCRIPT: In this podcast, Jeff Boles, Senior Analyst with the Taneja Group, outlines the significance of WAN optimization in the disaster recovery (DR) space.
Posted: 16 Apr 2009 | Published: 16 Apr 2009

Riverbed Technology, Inc.

IT in Europe: Network Evolution E-Zine: How Networks are Adapting to Virtualisation
sponsored by TechTarget 
EZINE: This Network Evolution E-Zine examines new tools for managing networks that support virtualisation and automating change and configuration management, network core services, and daily administrative tasks.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

All resources sponsored by TechTarget 

Secure Data Communications for IBM z/OS Mainframe: Buyer’s Guide
sponsored by SSH Communications Security Corp.
WHITE PAPER: While mainframes are often the backbone of an enterprise data infrastructure, many of them still use FTP to transmit data. Information shared over FTP is usually unencrypted, untracked, and in plain text which makes it susceptible to attacks. Here, you will see a solution that offers secure, robust data communications. Read on to learn more.
Posted: 01 Dec 2022 | Published: 01 Dec 2022

SSH Communications Security Corp.