Thursday, February 10, 2011

Special Edition: Most popular papers in January | ZDNet White Paper Membership

Trouble viewing this mail? Read it online | Manage my newsletters | Previous Edition
 
White Paper Membership
ZDNet Member | Thur., February 10, 2011
Papers by:  Job Function | Industry | Company | Most Recently Added | Most Popular | Top Search Terms
Top 5 for January
Last month, popular white papers focused on Cloud Computing, Mobile, Windows 7, Virtualization, Defragmentation and Project Management. Check out the Top 5 white papers, by category, for January. Also, take a look at some of the papers that have been recently added to the directory.

Data Management

Small Business Protection Guide (Symantec)

IIS Cloud Computing WP (IBM)

Defrag Myth Busters - What You Should Know (Diskeeper)

Cloud Computing Essentials for Security and Availability (TechRepublic)

Data Center Projects: Standardized Process (APC)
Recently Added
Feb. 22 Webcast: Why Cloud Based Data Protection Makes Sense For SMBs (TechRepublic)
Classification of Data Center Operations Technology Management Tool (APC)
 

Recommended

Drivers and Detractors for Enterprise Mobility

New technologies and devices are providing ever more mobility options. Companies must decide where to invest to maximize mobility's productivity boost. Listen and quickly learn what trends are driving these mobility initiatives.


Networking and Communications

Remote Support For PCs, Macs, And Smartphones (LogMeIn)

Router Essentials (Global Knowledge)

Network Fundamentals (Symbol Technologies)

12 Things to Know When Troubleshooting Your Network (Global Knowledge)

An Overview Of MPLS VPNs: Overlay, Layer 3, And PseudoWire (Global Knowledge)
Recently Added
Network 2020: Connecting Everyone To Everything (Verizon)
Benefits Of IPv6 For Enterprises (Verizon)
 

Recommended

Drivers and Detractors for Enterprise Mobility

New technologies and devices are providing ever more mobility options. Companies must decide where to invest to maximize mobility's productivity boost. Listen and quickly learn what trends are driving these mobility initiatives.


Security

The 10 myths of safe web browsing (Sophos)

A Checklist for Network Security (Dell)

Targeted Trojans: The silent danger of a clever malware (Symantec)

Computer Hacking and the Techniques of Neutralization: An Empirical Assessment (University of Texas (Dallas)

Best Practices When Implementing SIP Trunks for PSTN Access (Cisco)
Recently Added
Feb. 23 Webcast: 99.984% Availability?! How Gmail Is Built With Scalability, Reliability And Security In Mind (Google)
Feb. 24 Webcast: Strategies For Protecting Virtual Environments: Balancing Security With Performance (Sophos)
 

Check out the IT and Business courses offered by Global Knowledge in the TechRepublic Training Directory!
Here are three POPULAR titles:


Servers and Server OS

Architectural Strategies For Cloud Computing (Oracle)

Building Full IT Infrastructure Protection: How Midsize Firms Can Rise to the Challenge (Symantec)

Deploying Virtual Environments Quickly And Easily (IBM)

Moving To Virtualization: A Guide To What's Possible From VMware (VMware)

Introduction to Cloud Computing Architecture (Sun Microsystems)
Recently Added
Value Beyond Virtualization (Quest Software)
Storage Infrastructure Considerations In A Virtual Server Environment (HP)
 

Technology, perspective, and insights shaping the world.
Visit SmartPlanet.com today! >>


Enterprise Applications

People + Processes + Technology: Creating A Winning Formula For Customer Support (Citrix Online)

The power of unifying communications and collaboration (IBM)

Model Support For The Business Intelligence Lifecycle (Sybase)

A New Way Of Working, Insights From Global Leaders (IBM)

The Dynamics Of Project Management (Project Perfect)
Recently Added
Information Management And The Cloud (Iron Mountain)
All SaaS Is Not Created Equal(Oracle)
 

Storage

Why Native Windows Defragmentation Isn't Enough (Diskeeper)

DMI DB2 - EBook: Top 5 IT Budget Killers (IBM)

SAN Conceptual and Design Basics (EMC)

The Essentials Series: Why You Need to Defragment (Diskeeper)

Energy Efficient Cooling For Data Centers: A Close-Coupled Row Solution (APC)
Recently Added
Advantages Of Cloud Email Archiving (Perimeter eSecurity)
Evaluating The Impact Of Undetected Disk Errors In RAID Systems (IBM)
 

Desktops, Laptops and OS

77 Features for Windows 7 that Every IT Professional Should Know About (Global Knowledge)

Windows 7 Tips and Tricks Part 1 (Dell & Microsoft)

Windows 7 Tips and Tricks Part 2 (Dell & Microsoft)

Windows 7 Tips and Tricks Part 3 (Dell & Microsoft)

Windows 7 Tips and Tricks Part 4 (Dell & Microsoft)
Recently Added
Achieving Successful Coexistence Between Lotus Notes And Microsoft Platforms (Quest Software)
Are Your PCs And Laptops Recovery And Discovery Ready? (Iron Mountain)
 

IT Management

10 Dying IT Skills (Global Knowledge)

2010 IT Skills and Salary Report (Global Knowledge)

Small Business Endpoint Protection Performance Benchmarks (Symantec)

Project Management Methods (U21Global)

How To Do Capacity Planning (TeamQuest)
Recently Added
When Reality Hits ITIL-Implementations (ManageEngine)
Addressing IT Governance, Risk And Compliance To Meet Regulatory Requirements And Reduce Operational Risk In Financial Services Organizations (IBM)
 

Software and Development

An Introduction to Agile Software Development (CollabNet)

Testing Mobile Business Applications: A Hybrid Approach (Caritor)

Best Practices for Mobile Application Architectures (iAnywhere Solutions, Sybase)

Top Ten Things Every DBA Should Know About SQL Server (Global Knowledge)

The Secret to Designing Great Products: Manage Requirements Effectively (Jama Software, Inc.)
Recently Added
Feb. 24 Webcast: Subversion Best Practices: Branching Successfully (CollabNet)
5 Tricks For Designing A High Performing And Engaging Website (Verio)
 

Professions and Industries

10 Tech Skills You Should Develop Over the Next Five Years (TechRepublic)

5 Rules of Effective Negotiating (Global Knowledge)

10 Ways to Enhance your Online Meetings (Adobe Systems)

Top IT Jobs for 2010 and Beyond (Global Knowledge)

How To Use the Six Laws of Persuasion during a Negotiation (Global Knowledge)
Recently Added
The Impact of Simulation Training on Call Center Agent Performance: A Field-Based Investigation (INFORMS)
Best Practices For Managing Financial Services Compliance (Symantec)
 

Explore Research Areas

Data management (Data Infrastructure, Data Tools, more...)

Desktops, laptops and OS (Client System Hardware, Components, Desktop Client OS, Handhelds, Portable Device Client, more...)

Enterprise applications (Customer Management, Enterprise Planning, Workflow Management, more...)

IT management (Business Functions, IT Budgeting, IT Infrastructure, Project Management, more...)

Networking and communications (LAN - WAN, Mobile and Wireless, Network Management, Network Technologies, more...)

Professions and industries (Government, Homeland Security, Education, Financial Services, more...)

Security (Authentication - Encryption, Intrusion - Tampering, Security Administration, more...)

Servers and Server OS (Server Hardware, more...)

Software and Web development (E-commerce - E-business, Internet and Web, Software Web Development Tools, more...)

Storage (Management, Storage Hardware, more...)

Sponsored White papers


 

Send us your feedback here.

Sign up for more free newsletters from ZDNet! | To manage your account settings or to remove yourself from all ZDNet communications, please visit our Subscription Center.

The e-mail address for your subscription is dazsherul.driver@blogger.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Copyright CBS Interactive, Inc. All rights reserved.
ZDNet is a registered service mark of CBS Interactive, Inc.

ZDNet
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment