White Papers


Displaying 1–15 (of 13166)

Popularity is determined by a calculation of page views and community comments.

Title Date
Customers Share Their Success With Red Hat Virtualization Summary
In this short resource, learn what five Red Hat Virtualization customers had to say about their experiences with this virtualization platform.

sponsored by: Red Hat
What Drives the Growth of Cloud Object Storage? Summary
As data volume and complexity increase, IT departments are looking to invest in newer, more agile technologies. In this webcast, listen as 6 storage pros discuss the issues driving cloud based object storage adoption, including unstructured data management, data migration issues, and more.

sponsored by: IBM
Technical Support for Your Growing IT Inventory Summary
Reactive IT support for critical maintenance is no longer enough. Tune into this video to improve IT service and simplify inventory management with strategic implementation of a technical support appliance that provides user-specified hardware inventory discovery.

sponsored by: IBM
Computer Weekly –25 April 2017: Blockchain expands reach beyond finance Summary
In this week's Computer Weekly, we find out how blockchain, the technology behind bitcoin, is extending its reach beyond financial services into new industries. We hear from developers about the pros and cons of componentizing application software. And we examine what a recent court case shows about Oracle's licensing policies. Read the issue now.

sponsored by: ComputerWeekly.com
5 Critical Aspects of BI Reporting for Modern Organizations Summary
Why does analytic reporting fall short of expectations? There are many complications that can cause it: From the report types to the BI tool itself. Today, modern analytics technology to make it easy for all users to produce and distribute analytics reporting. Learn the 5 critical aspects of a successful BI technology.

sponsored by: Pyramid Analytics
Economic Evaluation of Flash Array Storage Subscriptions Summary
This Forrester report investigates the cost-savings garnered from investing in all-flash arrays, illustrated by your industry peers vs. traditional storage. Read on to realize significant capital and operational cost savings with flash arrays, using a framework that identifies the risk factors that affect the investment decision.

sponsored by: Pure Storage
SailPoint-Get-Ready-for-GDPR Summary
Learn how to utilize both identity and data access governance to gain full visibility to help you comply with the upcoming GDPR deadline.

sponsored by: SailPoint Technologies
Data Governance: Necessary For Competitive Advantage Summary
Data governance is an aspirin: It helps ease the pain that a specific problem, like an upcoming regulatory deadline, causes. It's also a vitamin: Necessary to keep your organization working like a well-oiled machine. Learn about how to further enhance the data governance at your organization to make it truly healthy.

sponsored by: Collibra
The No-Compromise Safety Net for Mission-Critical Data in the Cloud Summary
Access this e-book to learn about the technical aspects of what a NAS cloud for AWS can do for your organization's data center, how it provides the security your data requires, and more.

sponsored by: SoftNAS
The IT Transformation Questions Every CIO Should Ask Summary
What does the business need most from IT in 2017? Download this resource to discover 6 questions every CIO should strive to answer to jump-start IT transformation, such as considerations around the unique needs of your industry vertical, cloud adoption, and more.

sponsored by: Rackspace
Cyber Threats: A perfect storm about to hit Europe? Summary
As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.

sponsored by: ComputerWeekly.com
SailPoint-Identity-is-Everything Summary
A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more.

sponsored by: SailPoint Technologies
CW ANZ April 2017 Summary
In this month's CW ANZ, we find out more about Australian marketing company Salmat's plans to embrace a cloud-only operation after a successful project to replace highly customised on-premise systems with cloud-based software.

sponsored by: ComputerWeekly.com
Three Verticals, One Data Backup Solution: A Revolutionary Unified Approach to Data Protection Summary
Your organization has evolved to keep up with a rapidly changing business landscape. It's time to renew your data protection strategy. This e-book explores the single, unified data protection platform was implemented in 3 different vertical industries and its impact on each organization.

sponsored by: Druva Software
CW ASEAN April 2017 Summary
In this month's CW ASEAN, we take a look at how Singapore can play an important role in driving digital advancement across the ASEAN region with its pioneering attitude toward business and technology.

sponsored by: ComputerWeekly.com

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>