Enterprise Portal Rationalization: Using a Service-Oriented Architecture to Stop Web Asset Sprawl
sponsored by Oracle Corporation
WHITE PAPER:
This paper provides an overview of the problem of Web sprawl, and an account of the rationalization strategies organizations are adopting to gain the upper hand on sprawl. Adopting a service-oriented architecture based on integrated application platform infrastructure emerges as the key to rationalizing sprawl.
Posted: 03 Apr 2009 | Published: 01 Mar 2009
|
|
|
HP white paper: Complete Data Protection for VMware Virtual Environments
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This paper examines the issues of backup and recovery in VMware virtual server environments, and outlines the key features of HP Data Protector.
Posted: 26 Jun 2009 | Published: 01 Nov 2008
|
|
|
Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness
sponsored by Sirius Computer Solutions
WHITE PAPER:
IT systems are vulnerable to a variety of disruptions. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.
Posted: 08 Jul 2009 | Published: 26 Jun 2009
|
|
|
Leadership Makes the Difference during Times of Global Financial Crisis: Optimizing Business Cycles through Technology Investment
sponsored by SAP America, Inc.
WHITE PAPER:
Investing in the right IT platform and end-to-end business processes enables companies to simplify the IT landscape and reduce total it cost.
Posted: 26 Jan 2009 | Published: 23 Jan 2009
|
|
|
Control IT With Configuration Audit and Control
sponsored by Tripwire, Inc.
WHITE PAPER:
Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals
Posted: 01 Mar 2007 | Published: 01 Feb 2007
|
|
|
How To Hit Every SAP Change Deadline in 2025
sponsored by Basis Technologies
EBOOK:
Businesses must adapt SAP systems to access new functionalities, but change failure can disrupt operations. This white paper outlines 5 steps to ensure successful SAP changes in 2025, from prioritizing Clean Core compliance to effectively allocating resources. Learn how to hit every SAP change deadline. Read the full white paper.
Posted: 13 Nov 2024 | Published: 14 Nov 2024
|
|
|
NextGen Self-Scheduling and NextGen Smart Rebooking Powered by Luma
sponsored by NextGen
PRODUCT OVERVIEW:
Streamline patient scheduling and reduce cancellations with NextGen® Self-Scheduling and Smart Rebooking powered by Luma. These automated solutions improve the patient experience, increase completed appointments, and optimize practice workflows. Read the full product overview to learn more.
Posted: 04 Dec 2024 | Published: 04 Dec 2024
|
|
|
Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|
|
CW APAC – Trend Watch: AI infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE:
Firms are starting to trust artificial intelligence in some of their most important processes. In this handbook, focused on AI infrastructure trends in the Asia-Pacific region, Computer Weekly looks at how it should be deployed, data and sustainability challenges and the advantages of large language models.
Posted: 17 May 2024 | Published: 17 May 2024
|
|
|
Internet Security Report Q2 2024
sponsored by WatchGuard Technologies, Inc.
ANALYST REPORT:
This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.
Posted: 18 Dec 2024 | Published: 11 Dec 2024
|
|
|
Internet Security Report Q2 2024
sponsored by WatchGuard Technologies, Inc.
ANALYST REPORT:
This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.
Posted: 11 Dec 2024 | Published: 11 Dec 2024
|
|