ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vendors Research

  • Private Cloud Computing E-Zine Volume 1: Private cloud computing as a business strategy

    Sponsored by: TechTarget Data Center

    While many enterprises have moved to the private cloud model, have they adopted it entirely, and what are the roadblocks to getting there? In this inaugural edition of our Cloud Computing e-zine, we explore company strategies for private cloud adoption, some of the benefits of this model, and the challenges of a true private cloud infrastructure.

  • Lord Grey School builds a dynamic infrastructure for thin client computing

    Sponsored by: IBM and Intel

    Lord Grey School wanted to extend its thin client network into more classrooms, but its existing infrastructure lacked the capacity to support this expansion. Read this case study to see how the school solved the problem by deploying 18 new IBM® System x3550 M3 servers and an IBM System Storage® DS3400 disk storage system.

  • Getting cloud computing right

    Sponsored by: IBM

    Cloud computing can potentially be a disruptive change to the way an enterprise’s IT services are delivered. We propose that examining a candidate cloud solution provider’s reference architecture should be a standard element of a CIO’s cloud vendor evaluation strategy. Learn more now.

  • Presentation Transcript: How to Get Started with Cloud-based Disaster Recovery: Tips, Tricks and Vendors

    Sponsored by: Dell and VMware

    What about cloud for disaster recovery? Read this presentation transcript to learn how to set up cloud DR, the strengths and limitations of this technology, a list of vendors currently offering the service and more.

  • E-Guide: Best practices and considerations to ensure help desk management success

    Sponsored by: SysAid Technologies

    This e-guide from SearchDataCenter.com explains why it is essential analyze the performance of your service desk to ensure optimal results. Gain expert insight into how to improve IT help desk services with vendor support. And find out how to help staff be more productive by providing them with extra support.

  • Magic Quadrant for Data Warehouse Database Management Systems (Gartner)

    Sponsored by: Teradata

    The data warehouse DBMS market is undergoing a transformation, including many acquisitions, as vendors adapt data warehouses to support the modern business intelligence and analytic workload requirements of users. This document compares 16 vendors, including IBM & Netezza, to help customers find the right one for their needs.

  • Choosing a Cloud Provider with Confidence

    Sponsored by: GeoTrust, Inc.

    The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.

  • Trend Micro Endpoint Comparative Report Performed by AV-Test.org

    Sponsored by: Trend Micro, Inc.

    In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products.

  • Gartner Middle East CIO Leadership Forum

    Sponsored by: Gartner

    Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.

  • Channel Strategies E-Zine - December 2010/ No.4

    Sponsored by: TechTarget IT Channel

    Read how the rise of cloud computing and virtualization is creating new opportunities for the channel in WAN optimization, and find out what skill sets VARs need to target business people who rely on smart phones or iPads on the road.

  • Debunking the Myth of the Single-Vendor Network

    Sponsored by: Juniper Networks, Inc.

    Read this analyst report to see why most organizations should consider a dual-vendor or multivendor solution as a viable approach to building their network.  Not only are significant cost savings achievable with no increase in network complexity, but there is also an improvement in focus on meeting business requirements.

  • Presentation Transcript: Making Time for Endpoint Security

    Sponsored by: BigFix

    This presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum.

  • Top 10 Tips to Keep Your Small Business Safe

    Sponsored by: Trend Micro, Inc.

    Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.

  • IT Decision Checklist: Virtual Desktop Infrastructure Security

    Sponsored by: Trend Micro

    Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.

  • Dirk Hohndel on Intel and the Linux Foundation

    Sponsored by: Intel

    In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

  • Prepare for Vendor Audits and Improve Software Asset Management with Integrated IBM Solutions

    Sponsored by: IBM

    Read how effective software asset management supports both cost effectiveness and cost efficiency by matching inventory with actual deployments, thereby helping to reduce over- and under-licensing.

  • Optimizing the Virtual Environment

    Sponsored by: uptime software inc.

    In this white paper, you'll find both the pitfalls of virtual monitoring and management, and how to navigate the maze of competing virtual monitoring and management vendors. In the end, you'll have a clear idea of what solutions will work for you.

  • Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud

    Sponsored by: IBM

    This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more.

  • Pund-IT (Charles King): Workload-Optimized Systems – IBM Shows the Way, Again

    Sponsored by: IBM

    Charles King at Pund-IT defines the phrase “workload-optimized systems” citing IBM Smart Analytics System as a true example. Oracle’s misleading Exadata TPC-C benchmark claims against old DB2 results are cited by Charles as an example of confusion elsewhere in the market today. Read this report to learn more.

  • Vendor Middleware-Based Application Integration Solutions Beat Custom Links -  Provides SOA Messaging Backbone

    Sponsored by: IBM

    Read this white paper for a discussion of server and storage infrastructure, application integration demand growth, service-oriented architecture, and enterprise application portfolios.

  • Case Study: Healthcare I.T. at the Point of Care

    Sponsored by: CDW Healthcare

    After investing close to two years developing nursing documentation software, The Nebraska Medical Center stood poised to begin implementing this lynchpin of its patient safety focus. But first, it had to identify the right hardware solutions for its requirements. Read this white paper to learn more.

  • E-Book: New Enterprise Desktop Chapter 1: The Desktop Virtualization Recipe

    Sponsored by: Pano Logic, Inc

    This e-book will look at some of the trends that may lead to new application delivery methods. Technologies such as application and desktop virtualization, software services and cloud computing as well as a new generation of smart phones are all redefining application delivery.

  • Presentation Transcript: Inside The Cloud, Key Security Factors When Considering Managed Services

    Sponsored by: AT&T Corp

    This Presentation Transcript offers an overview of the cloud computing landscape as it relates to information security. Few organizations realize the vast and inherent risks that cloud computing presents, including data exposure, data loss, and a compromised infrastructure.

  • The IT Management Software Megavendors

    Sponsored by: BMC Software, Inc.

    The current recession and credit crunch deeply affected IT spending in the last quarter of 2008 and into 2009. This SWOT Analyst report for Q3 2009 regroups the market contenders by categories for an easier evaluation to enable vendor strategy professionals to substantiate decisions about their partnership and go-to-market strategies.

  • Presentation Transcript: Buying Your BI Solution from Your ERP Vendor: Strategic Business Enabler or IT Convenience?

    Sponsored by: IBM

    This presentation transcript explores the benefits and drawbacks of buying business intelligence (BI) solutions from enterprise resource planning (ERP) vendors, and shares survey results that reveal whether or not customers who have gone down the sole-sourcing path are happy with their decision.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.