White Papers

 

Displaying 1–15 (of 11967)

Popularity is determined by a calculation of page views and community comments.

Title Date
Security Solution Trends 2016 Summary
In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.

sponsored by: Juniper Networks, Inc.
12-04-2016
Why NAS File Migrations Don't Have to Be a Nightmare Anymore Summary
Leading storage market analyst Marc Staimer will discuss the difficulties of running a successful data migration project as well as highlight a software-based storage management platform for enterprise NAS file lifecycle management. Access now to register for this webinar on September 20 at 1 PM EST.

sponsored by: Data Dynamics
09-20-2016
Computer Weekly – 30 August 2016:Get protected Summary
It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlight the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

sponsored by: ComputerWeekly.com
08-30-2016
Leveraging Predictive Analytics to Foresee Future Purchasing Behaviors Summary
This case study explores how a French supplier of household electronic appliances strategically approached their big data and predictive analytics needs. Find out how they created secure predictive models to answer critical business questions about consumer behavior so that they could identify the likelihood of future purchases.

sponsored by: Intel Corporation
08-26-2016
Analytics in Healthcare: How 5 Healthcare Providers Are Turning Data Into Value Summary
This study examines how 5 HCOs, participating in a collaborative forum for promoting best practices, are leveraging analytics and BI to drive organizational improvement and integrate data from multiple sources. Access now to learn about their data strategies and get tips about self-service BI, how to empower users, and more.

sponsored by: Information Builders
08-26-2016
Quantifying the Riskand Economic Impactof Bad Bots Summary
Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.

sponsored by: Distil Networks
08-26-2016
Your Guide to Addressing Modern Manufacturing Concerns Summary
This white paper reveals how certain tools can help manufacturers digitize their business. Explore shifts in customer-centric operations, mobile and social adoption, cloud deployment, and more.

sponsored by: Infor
08-26-2016
The New Security Paradigm for Enabling Digital Workers: 4 Pillars of Success Summary
Security in the digital age should be increasingly fine-grained, broad-based, targeted, convenient, and intrinsic to products and applications. Uncover immediate steps you can begin taking to better prepare for ongoing security challenges due to the cloud, mobility, and more.

sponsored by: Unisys
08-26-2016
Data Genomics Index: A Report on the True Makeup of Storage Environments Summary
Veritas analyzed tens of billions of files and their attributes from many customers' unstructured data environments in 2015 to gain a better understanding of what their environments really consist of. Discover what they found in regards to the true makeup of storage environments.

sponsored by: Veritas
08-26-2016
6 Issues That Can Derail Your Big Data Initiative Summary
55% of big data projects are never finished. Your Hadoop ecosystem is more important to these projects than you may realize, so it is important to fully understand the role it plays in handling big data projects. This white paper discusses the 6 primary issues that are knocking big data projects off the tracks.

sponsored by: Information Builders
08-26-2016
The Executive’s Guide to the 2016 Global Threat Intelligence Report Summary
In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read on to read three additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.

sponsored by: Dimension Data
08-26-2016
The Right Backup and Recovery Solution Can be a Business Enabler Summary
Your data protection strategy needs to deliver the quality and service levels required to enable your digital business. Discover a backup solution built on a converged platform that enables efficient and cost-effective data management that will truly help put your data to good use.

sponsored by: Veritas
08-25-2016
Launching an instance of Red Hat® OpenStack® with Horizon Summary
Taste of Red Hat Training course excerpts, labs, videos, and webinars give you a sample of the expert level of educational content you'd find in a full Red Hat course. This excerpt is from our Red Hat OpenStack Administration I (CL110) course. It includes some actual exercises from the full course. Think of it as a no-cost preview of the course.

sponsored by: Red Hat
08-25-2016
Top 5 Reasons to Upgrade Your EAM Summary
Improve your capital asset management by accessing this white paper, and discover the top 5 reasons to upgrade your EAM. Download now to lower TCO and enable adoption of high-value extension apps with configurable asset management that offers extended mobile support, and more.

sponsored by: Infor
08-25-2016
CIO Trends #2: Nordics Summary
Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs. This guide offers a collection of our most popular articles for IT leaders,

sponsored by: ComputerWeekly.com
08-25-2016

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>