White Papers


Displaying 1–15 (of 1882)

Popularity is determined by a calculation of page views and community comments.

Title Date
Predictive Marketing Analytics Removes the Guesswork Summary
Predictive marketing can eliminate the guesswork in the highly competitive marketplace and improve the customer journey on the road to increased sales.

sponsored by: SearchCRM
Worldwide Shipping Organization's HR Team Gains New Organizational Structure Summary
In this case study, learn how Maersk Group, a large worldwide shipping organization, enabled their HR team to gain increased transparency across organizational units, the ability to browse the organization structure and access relevant key data, and more.

sponsored by: SAP
Can Tape Storage Save Us From the Zettabyte Apocalypse Summary
Uncover the top 5 reasons why tape storage can be essential in managing the upcoming "zettabyte apocalypse" of new data. Discover how tape storage can provide your enterprise with resiliency, growth in capacity, LTFS enhancements, and more.

sponsored by: Iron Mountain
Can Secure Cloud Storage Solve the Long-Term Archiving Dilemma? Summary
Explore the cloud-based archive solutions market, and discover the benefits of object storage as flexible software construct for digital archives. Together, cloud services and object storage can provide your enterprise with the ability to leverage an object storage repository without building a large infrastructure for it.

sponsored by: Iron Mountain
BYOD and mHealth: Navigating Security and HIPAA Summary
Learn best practices to implement when using a BYOD device for patient care. Discover which applications are secure and compliant with HIPAA standards and which you should steer clear from.

sponsored by: Optum
Learn the Virtues of Data Classification for Remedying Dark Data Challenges Summary
Research firm IDC states that up to 90% of big data environments today are made up of dark data. Learn how to define, understand, and identify dark data symptoms. Plus, explore ways to remediate dark data challenges and map your data into 4 categories to measure usage and derive value.

sponsored by: Infogix
Mobility In Government Services: A Checklist Towards Regulatory Compliance Summary
Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.

sponsored by: BlackBerry
Mobility In Financial Services: A Regulatory Compliance Checklist Summary
Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.

sponsored by: BlackBerry
The Future of Data Warehousing Infrastructure and Architectures Summary
This e-guide examines how a shift from traditional data warehousing (DW) appliances to an infrastructure that combines traditional DWs with big data technologies offers new opportunities for businesses to address needs such as costs, flexibility and agility while eliminating key technology silos.

sponsored by: IBM
Enterprise Integration: Identify Areas to Improve and Remain Competitive Summary
Learn how a configurable, cloud-based web experience that supports single sign-on, common navigation, and a common look across application can streamline ERP for users.

sponsored by: VAI, Vormittag Associates, Inc.
2016 Cost of Data Breach Study: United Kingdom Summary
Learn the true cost of a data breach in 2016. Obtain detailed knowledge of not only the monetary costs of a major data breach but also the details of lost business, 7 global megatrends in the cost of data breach research, and the biggest implications for your organization.

sponsored by: IBM
ANZ IT Priorities 2016 Summary
Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of IT leaders based in Australia and New Zealand, are planning over the next 12 months.

sponsored by: ComputerWeekly.com
Endpoint threat detection gets more response Summary
Discover how security teams worldwide are attempting to stop cyberthreats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.

sponsored by: Hewlett Packard Enterprise
ASEAN IT Priorities 2016 Summary
Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of South-East based IT leaders, are planning over the next 12 months.

sponsored by: ComputerWeekly.com
The Internet of Things Runs on Linux Summary
Learn how Linux systems control costs, boost capacity and improve efficiency.

sponsored by: IBM

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>