White Papers

 

Displaying 1–15 (of 5863)

Popularity is determined by a calculation of page views and community comments.

Title Date
Federal Life Sciences and Health Care Market Opportunities for EMC Isilon Scale-Out Network-Attached Storage Summary
This thought piece provides an understanding of the market and position EMC Isilon capabilities based on statistics from the National Science Foundation (NSF). It also shows results from specific uses of the technology by life science and healthcare organizations.

sponsored by: EMC & Arrow
08-29-2014
Data Visualization: Charting the Best Course for Your Organization Summary
The following white paper examines how data visualization can help organizations tap into the full value of their information. Also gain insight on key considerations to help guide you to the right choice when selecting a data visualization solution.

sponsored by: SAS
04-23-2014
Is Your Data Center Ready for Today’s DDoS Threats? Summary
This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.

sponsored by: Fortinet, Inc.
04-23-2014
Secure Virtual Desktop Infrastructure for HIPAA Compliance Summary
This white paper explores the benefits of a virtual desktop infrastructure (VDI) for healthcare facilities trying to implement mobile devices for improved secure patient data access.

sponsored by: Imprivata
04-23-2014
Executive Brief: Process Suite Overview Summary
The following white paper explores the importance of implementing a process suite within the IT environment that consists of a complete, process automation ability and a case management solution. Learn how with this kind of technology businesses can expect to enable higher agility, productivity, and competitiveness.

sponsored by: OpenText
04-23-2014
Enterprise Data Management in an 'In-Memory' World Summary
The following white paper explores the tactics, best practices, and architecture needed to make sure that your in-memory solution is running as smooth and efficiently as possible.

sponsored by: SAS
04-23-2014
Embracing SaaS: A Pacesetter Perspective Summary
Check out the following infographic to get a firsthand look at how businesses are gaining substantial competitive advantage by deploying the use of a SaaS solution.

sponsored by: IBM
04-23-2014
The cloud influence on governance, risk and compliance Summary
Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.

sponsored by: SearchDataCenter.com
04-23-2014
Managing IT projects for business change. Dealing with trouble. Summary
Jeff Morgan and Chris Dale offer advice on managing unanticipated events that can disrupt IT projects in this extract from their book, Managing IT Projects for Business Change.

sponsored by: ComputerWeekly.com
04-22-2014
Unlock the value of your .NET architecture Summary
For businesses running on .NET architectures, the options for integration on-premise and cloud applications are limited. Instead of relying on custom integration code, you may want to consider a service-oriented architecture (SOA) -- but what should you take into consideration when evaluating SOA technology?

sponsored by: MuleSoft
04-22-2014
AIIM SharePoint Industry Watch Summary
The following white paper explores the importance for organizations to adopt a social business initiative. Learn why this move is imperative, who is for and against the adoption of social, which areas of the businesses can glean deeper insights from social, and much more.

sponsored by: IBM
04-22-2014
Computer Weekly – 22 April 2014: Adapting to life after Heartbleed Summary
In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?

sponsored by: ComputerWeekly.com
04-22-2014
HIPAA Compliance: Sign on to Robust Access Controls Summary
View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.

sponsored by: Imprivata
04-22-2014
Leveraging Talent Summary
Learn how to make the most of your IT workforce and how to nurture talent by following these strategies used by HR professionals.

sponsored by: ComputerWeekly.com
04-22-2014
Forging a CEM Strategy That Can Power Commerce Summary
With a seemingly exhaustive number of methods to communicate -- not to mention an expected $280 billion in U.S. e-commerce sales in 2015 -- contact center technology today requires a new approach.

sponsored by: SearchCRM
04-22-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>