White Papers

Channel: Information and Analytic Strategy - David Loshin RSS Feed for Information and Analytic Strategy - David Loshin

 

Displaying 1–15 (of 4380)

Popularity is determined by a calculation of page views and community comments.

Title Date
Amazon Web Services: An Overview Summary
This whitepaper provides a comprehensive explanation of Amazon Web Services and shows you how it can help your organization.

sponsored by: Global Knowledge
12-01-2014
Federal Life Sciences and Health Care Market Opportunities for EMC Isilon Scale-Out Network-Attached Storage Summary
This thought piece provides an understanding of the market and position EMC Isilon capabilities based on statistics from the National Science Foundation (NSF). It also shows results from specific uses of the technology by life science and healthcare organizations.

sponsored by: EMC & Arrow
08-29-2014
Data Visualization: Charting the Best Course for Your Organization Summary
The following white paper examines how data visualization can help organizations tap into the full value of their information. Also gain insight on key considerations to help guide you to the right choice when selecting a data visualization solution.

sponsored by: SAS
04-23-2014
Executive Brief: Process Suite Overview Summary
The following white paper explores the importance of implementing a process suite within the IT environment that consists of a complete, process automation ability and a case management solution. Learn how with this kind of technology businesses can expect to enable higher agility, productivity, and competitiveness.

sponsored by: OpenText
04-23-2014
Enterprise Data Management in an 'In-Memory' World Summary
The following white paper explores the tactics, best practices, and architecture needed to make sure that your in-memory solution is running as smooth and efficiently as possible.

sponsored by: SAS
04-23-2014
Cloud Web Security Using Cisco ASA Summary
This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.

sponsored by: Cisco Systems, Inc.
04-23-2014
A Risk Management Approach to HITECH Summary
This exclusive resource describes the challenges of security and privacy in the healthcare environment, discussing how you can best assess risk, prevent data loss, and secure critical systems with minimal impact on the end user or the quality of patient care.

sponsored by: Symantec Corporation
04-23-2014
The cloud influence on governance, risk and compliance Summary
Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.

sponsored by: SearchCompliance.com
04-23-2014
Managing IT projects for business change. Dealing with trouble. Summary
Jeff Morgan and Chris Dale offer advice on managing unanticipated events that can disrupt IT projects in this extract from their book, Managing IT Projects for Business Change.

sponsored by: ComputerWeekly.com
04-22-2014
Unlock the value of your .NET architecture Summary
For businesses running on .NET architectures, the options for integration on-premise and cloud applications are limited. Instead of relying on custom integration code, you may want to consider a service-oriented architecture (SOA) -- but what should you take into consideration when evaluating SOA technology?

sponsored by: MuleSoft
04-22-2014
AIIM SharePoint Industry Watch Summary
The following white paper explores the importance for organizations to adopt a social business initiative. Learn why this move is imperative, who is for and against the adoption of social, which areas of the businesses can glean deeper insights from social, and much more.

sponsored by: IBM
04-22-2014
Computer Weekly – 22 April 2014: Adapting to life after Heartbleed Summary
In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?

sponsored by: ComputerWeekly.com
04-22-2014
Challenges in the Effective Use of Master Data Management Techniques Summary
The following white paper explores the challenges that face many companies that are trying to get an effective hold on master data management. Learn which consolidation techniques to use, how to meet consumption needs, and more.

sponsored by: SAS
04-22-2014
Protect your Devices with File Sync and Share Platform Summary
This white paper highlights a continuous, secure, enterprise-ready file sync and share platform that facilitates real-time collaboration across all devices.

sponsored by: Code42
04-22-2014
The CIO's Chance of a Lifetime Summary
The following IDC white paper explores the role that the CIO and IT group play in enabling, supporting, and leading analytics programs and projects within their organizations. Uncover the 4 big myths that can be hurting your analytics effectiveness, how to fix IT and line of business disconnect, and more.

sponsored by: SAS
04-22-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>