IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 251 - 275 of 2769Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 10, 2014

Learn about making better product decisions with a Rational Focal Point solution for product portfolio management.

Tags : ibm, product management, decision support, smarter decisions, successful products, finding data, software tools, product portfolios
    
By: Code42     Published Date: Oct 10, 2014

Enterprise endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods. Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Due to the exploding volume, mobility and compliance requirements of enterprise data, the need to collect and preserve that data for the purpose of e-discovery becomes more critical—and more difficult. Traditionally, enterprises look to multiples tools and technologies to support their information management strategies, but that's a chaotic and expensive approach. Read this white paper to learn how the common approaches to e-discovery miss the mark and how CrashPlan endpoint backup can streamline the collection and preservation of electronically stored information.

Tags : leverage, e-discovery, method, enterprise, backup, endpoint, data, streamline
    
By: Code42     Published Date: Oct 10, 2014

New research dives deep into the trends and drivers for enterprise endpoint backup. The mobile mind shift is here, and as employees increasingly favor using mobile devices—both personal and company-issued—for work, enterprise IT must ensure data protection and enable user productivity. Let's face it—we're beyond the data center. Relying on traditional firewalls and local file shares is no longer enough when it comes to securing and backing up this critical data ""on the edge"" on your endpoints. A comprehensive data protection strategy means backing up data across an exceedingly fast-growing number of devices and operating systems. Get the latest backup trends (and what to do about them) in this study conducted by Forrester Consulting on behalf of Code42 in March 2014.

Tags : endpoint, backup, research, mobile, device, productivity, enterprise, protection
    
By: Code42     Published Date: Oct 10, 2014

Users always store business data on laptops and desktops, even when they shouldn’t. The adoption of corporate laptops and “bring your own device” only increases the amount of data stored on these endpoint devices, creating more complexity and greater challenges for IT departments mandated to safeguard the business from crippling data loss. Here’s the good news: data loss incidents can be more bearable if you know you’re doing everything possible to minimize your organization’s risk—which means sufficiently protecting all the corporate data and intellectual property stored on endpoints. Read the CrashPlan overview to learn about key CrashPlan features and see how CrashPlan enterprise endpoint backup can support data governance initiatives like legal holds.

Tags : enterprise, crashplan, endpoint, backup, department, safeguard, data loss, it management
    
By: Code42     Published Date: Oct 10, 2014

Full disk encryption is the ultimate data guardian on corporate endpoints. But when deployed without endpoint backup, it can also be the ultimate nightmare. Many organizations rely on full disk encryption to make data unreadable to unauthorized users. But without endpoint backup, the value of endpoint data is perpetually at risk. The right endpoint backup solution is necessary to ensure authorized users retain access to data should software or hardware fail. Download the executive brief to learn 8 considerations for choosing an endpoint backup solution that complements full disk encryption.

Tags : disk, encryption, data, backup, endpoint, deployed, guardian, solution
    
By: Code42     Published Date: Oct 10, 2014

ESG Research shows only 38% of organizations have a formal process to back up the endpoint devices employees use to do their jobs. Gone are the days when protecting data meant simply backing up the corporate file server. The IT landscape has shifted, and now data is ever-more distributed. IT organizations are responsible for data protection regardless of device type or owner. If it's company data, IT must protect it. Read as Jason Buffington, senior analyst at ESG, discusses the evolution and quandary of distributed data caused by BYOD and mobile workforce policies. You'll also learn important considerations that reveal the differences between consumer- and enterprise-grade backup.

Tags : data, employee, endpoint, device, demand, research, organization, formal
    
By: Code42     Published Date: Oct 10, 2014

Eliminate data loss risk by protecting all enterprise information. Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?

Tags : data management, enterprise, protecting, ballooning, risk, problem, laptop, tablet
    
By: IBM     Published Date: Oct 10, 2014

Confused by all the agile advice? Relax! With Agile for Dummies by your side you’ll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.

Tags : ibm, agility, software productivity, agile teams, agile practice, faster solutions, adoption mistakes, dummies
    
By: IBM     Published Date: Oct 10, 2014

This book gives you insight into what it means to leverage service virtualization in your testing environments.

Tags : ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
By: IBM     Published Date: Oct 10, 2014

Get the essentials about agile testing and service virtualization from several different perspectives – get an analyst’s take from Diego Lo Giudice of Forrester Research on how to remove agile testing bottlenecks and ways to calculate your potential return on investment for Service Virtualization

Tags : ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
By: IBM     Published Date: Oct 10, 2014

Delivering applications that meet the needs of the business can be a challenge in a complex business climate that is constantly changing. Diverse, multiple heterogeneous environments are the norm, all of which must be maintained and deployed. Multiple tools and technologies connect, support and create work.

Tags : ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed
    
By: IBM     Published Date: Oct 10, 2014

This paper will explore best practices for identifying and eliminating seven types of waste: Waiting, handoffs and task switching, motion, extra processes, extra features, partially completed work and defects.

Tags : ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed
    
By: IBM     Published Date: Oct 10, 2014

Continuous engineering is explained in easy to understand terms in this Dummies book, appropriate for all levels of product and systems development stakeholders.

Tags : ibm, continuous engineering, product designs, engineering resources, corralling complexity, analyzing continuously, traditional processes, market analytics
    
By: IBM     Published Date: Oct 10, 2014

This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.

Tags : ibm, agility, software productivity, agile teams, agile practice, faster solutions, adoption mistakes, dummies
    
By: IBM     Published Date: Oct 10, 2014

This paper outlines an approach for using this shift to gain a competitive advantage.

Tags : ibm, systems development, advancing product, traceability, engineering information, collaboration, engineering disciplines, collaboration process
    
By: IBM     Published Date: Oct 10, 2014

This IBM ebook explains what systems engineering is and how it can help you simplify the development of smart, connected products.  Learn how to speed time-to-market, ensure business agility, deliver high-quality smart products, and cut costs.

Tags : ibm, systems engineering, business agility, smart products, cut costs, agility, revolutionizing requirements, system modelling
    
By: IBM     Published Date: Oct 10, 2014

This paper discusses the practices that companies should explore to move beyond traditional PLM and ALM to realize the broader capabilities of systems engineering for reducing time to market, meeting regulatory compliance mandates and improving product quality.

Tags : ibm, systems engineering, business agility, smart products, cut costs, agility, revolutionizing requirements, system modelling
    
By: IBM     Published Date: Oct 10, 2014

In this paper, IBM proposes that organizations relying on the traditional waterfall process for systems and software delivery-that is, an engineering governance model-need to make changes to reduce risk and improve results

Tags : ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed
    
By: IBM     Published Date: Oct 10, 2014

Requirements definition and management is recognized as a necessary step for the successful delivery of systems and software projects; the discipline is also required by standards, regulations and quality improvement initiatives like Capability Maturity Model Integration (CMMI).

Tags : ibm, requirements management, cmmi, successful delivery, distinctively identified, specific solutions, defined requirement, managing requirements
    
By: IBM     Published Date: Oct 10, 2014

This case study examines the adoption of agile processes within a European embedded technology provider, focusing on the challenges encountered in deploying agile beyond beyond software development activities.

Tags : ibm, agility, software productivity, agile teams, agile practice, faster solutions, adoption mistakes, dummies
    
By: IBM     Published Date: Oct 10, 2014

This white paper explores some key challenges that automotive companies face in creating smarter, more sophisticated automobiles that are made up of many systems of systems and how a holistic approach can help address them.

Tags : ibm, automotive development, accelerating automotive, automotive innovation, automotive product, automotive companies, holistic approach, best practices
    
By: OpenText     Published Date: Oct 08, 2014

Digital capture is a key enabling technology in a business world striving to balance the shifting advantages and requirements of paper and digital documentation. This paper takes a closer look at the technology behind data capture, explaining some of the sub-technologies involved and highlighting the key challenges presented by data capture in the enterprise.

Tags : opentext, ecm, data capture technology, digital documentation, sub-technologies, enterprise, data capture, it management
    
By: HP     Published Date: Oct 07, 2014

So far, most data centers have virtualized their least-critical workloads as a matter of basic cost containment. Virtualizing mission-critical applications is still forthcoming for the majority,though, largely due to infrastructural concerns. Complicating matters is the shift in IT purchasing decisions from IT to business management. Integrated Computing Platforms (ICPs), private cloud computing, and public cloud services all leverage virtualization to achieve a number of IT and business goals, including increased ROI, reduced OpEx, and business process improvement. Now more than ever, it makes sense to explore the benefits of ICPs. Find expert data center considerations here.

Tags : virtualization, data center, cloud, infrastructure, integrated, optimization, solution, it management
    
By: IBM     Published Date: Oct 07, 2014

For two weeks each year, Wimbledon scales from a small business to a global enterprise. After deploying IBM Cloud Orchestrator software, the organization supports a highly agile and scalable cloud environment, rapidly provisioning and deprovisioning virtual IBM System x servers as needed.

Tags : ibm, ibm systems, ibm system x server, cloud, ibm cloud, enterprise cloud, software, cloud environment
    
By: IBM     Published Date: Oct 07, 2014

A comprehensive study by Solitaire Interglobal Ltd. (SIL) on the business impact of security incursions in today's IT environment. This ground-breaking research, based on 64,200 client data points explores how the vulnerabilities in today's virtualized, internet-connected, cloud-oriented environment can affect your businesses.

Tags : ibm, security, cloud, cloud security, solitaire interglobal, it environment, cloud environment, security incursions
    
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.