ComputerWeekly.com Research Library

Powered by Bitpipe.com

Enterprise Software Research

  • Next-generation capabilities of enterprise application-aware firewalls

    Sponsored by: SonicWALL

    The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.

  • Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT.

    Sponsored by: dataguise, Inc.

    Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more.

  • SAP Enterprise Applications on Cisco UCS

    Sponsored by: Cisco Systems, Inc.

    The Cisco Unified Computing System (UCS) server platform has been designed with the performance and reliability to power memory-intensive, mission-critical applications, as well as virtualized workloads. Check out this solution center to learn more about SAP enterprise applications that are optimized on the UCS server platform.

  • VeriSign Mobile Enterprise Services: Enabling Next-Generation Mobile Messaging for Enterprises

    Sponsored by: VeriSign, Inc

    This Solution Paper provides an overview of the rapidly growing mobile messaging and alerts market, and introduces a solution that addresses that market: VeriSign Mobile Messaging, an offering of VeriSign Mobile Enterprise Services (VMES).

  • SAP Travel Management at T-Com, eLearning for 140,000 Employees with datango

    Sponsored by: datango AG

    The IT department of T-Com Human Resources was faced with the challenge of training 140,000 employees to perform reporting processes for their own business travel as quickly as possible. Read this case study to find out how T-Com found their way to datango in their search for a customizable context sensitive online help system.

  • The Power of Mobile Peripherals

    Sponsored by: BlackBerry

    This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.

  • SAP Solutions for Small Businesses and Midsize Companies: Leveraging Economies of Scale

    Sponsored by: SAP AG

    As your company grows, you have the opportunity to benefit from economies of scale; but growth can be fraught with challenge. Production disruptions and operational inefficiencies can quickly negate the advantages you hope to achieve. Watch this informative video to learn about SAP solutions for small businesses and midsize companies.

  • SAP Outsourcing for Mid-Market Companies: A Comparison of Three Leading Providers

    Sponsored by: itelligence, Inc.

    Running a business on SAP requires that the application be available 7x24, data be secure, and that the application can grow with an organization. The decision to select an outsourcer goes far beyond finding a data center. Read this paper and learn what questions to ask in order to select an outstanding SAP outsourcing provider.

  • Preparing for the Web 2.0 World: How Enterprises Need to Think About Emerging Social Technologies

    Sponsored by: Sun Microsystems, Inc.

    IDC expects that the significant adoption of Enterprise 2.0 technologies in the enterprise will have a dramatic impact on how organizations capture, discuss, distribute, and protect their information. If companies are not already planning for this change, they will find themselves increasingly exposed and vulnerable.

  • JBoss Operations Network: Measuring Business Impact and ROI

    Sponsored by: Red Hat

    In today's economic climate, IT organizations are looking for ways to achieve cost savings in the short term. Based on this study, the IT organizations achieved this goal by realizing an average payback period for JBoss Operations Network of a short 5.3 months - recovering their initial investments well within the first half-year of deployment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.