White Papers

 

Displaying 1–15 (of 3090)

Popularity is determined by a calculation of page views and community comments.

Title Date
Furthering the Potential of Public Cloud Services Summary
In this survey of 373 storage decision makers, learn why 37% say that using cloud to improve storage capacity will impact spending in the next year, how hybrid clouds can mitigate the concerns related to both public and private cloud environments, and more.

sponsored by: Panzura
08-31-2017
Leveraging Big Data Lessons To Optimize Data Lakes for the IoT Summary
Dealing with big data was never a simple task – and it's even more complicated with the volume of data pouring in from the IoT. Learn how to overcome big data obstacles for data management and data lake success.

sponsored by: Zaloni
08-16-2017
Information Governance in the Cloud: How to Build a Game Plan Summary
Learn about information governance and how it helps protect content in the cloud and on mobile devices to meet increasing strict compliance regulations. Plus, find out how Engle Martin & Associates revitalized their content management and information governance strategy.

sponsored by: Box
08-16-2017
Everything Kubernetes: A Practical Guide Summary
Kubernetes, an open-source container management solution, provides a manageable execution environment for deploying, running, managing, and orchestrating containers across clusters or clusters of hosts. Open this white paper to learn more details about Kubernetes and how to get started with deployment in your organization.

sponsored by: Stratoscale
08-16-2017
Machine Learning in Cyber Security Summary
AI systems are helping security operations centers function quicker and assess problems faster. Read this white paper to discover how your security posture can benefit from predictive analytics and threat intelligence.

sponsored by: Recorded Future
08-16-2017
The Life-Changing Magic of Information Governance Summary
Learn how to create effective information governance with 3 keys to manage even cloud-based content soundly and securely throughout its entire lifecycle.

sponsored by: Box
08-15-2017
A Computer Weekly Buyer's Guide to Data Management Summary
Organisations have an ever-increasing amount of data at their disposal. In this 13-page buyer's guide, Computer Weekly looks at what the future holds for data management, how the Met Office is opening up large volumes of data, and why business outcomes should be the focus for data use.

sponsored by: ComputerWeekly.com
08-14-2017
WooCommerce for Online Retail: Installation and Configuration Summary
According to research, 79% of Americans now shop online – making eCommerce grow like wildfire, and due to the popularity of open-source content management systems, it's easy to start an online store. Learn about WooCommerce, an e-commerce platform built on WordPress.

sponsored by: Liquid Web
08-11-2017
Don't Overlook Email When Planning for GDPR Compliance Summary
With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.

sponsored by: Mimecast
08-11-2017
Achieving Security Through Data-Driven Intelligence: Splunk for Defense Overview Summary
In this product guide, learn how Splunk can be used for security purposes, allowing you to achieve security and efficiencies through data-driven intelligence.

sponsored by: Splunk
08-10-2017
Midsize Firms Can Use Analytics to Accelerate Digital Transformation Summary
Data analytics is going to drive your business in the digital economy and maintain your competitive edge. This means your IT infrastructure is going to play a big role moving forward. This IDC report discusses why it's time to start thinking about your IT infrastructure as a strategic investment area and how to approach it.

sponsored by: Hewlett Packard Enterprise
08-10-2017
How Paf Used Big Data Analytics to Increase Operational Efficiency Summary
In this case study, learn how international gaming operator Paf used big data analytics to increase operational efficiency, meet regulatory compliance SLAs, increase response times, reduce costs, and more.

sponsored by: Datameer
08-10-2017
5 Essential Approaches to Securing your WordPress Site Summary
As a result of WordPress's popularity, it has become an incredibly high-profile target. Discover how to make WordPress sites harder to target by hackers with 5 essential approaches.

sponsored by: Liquid Web
08-10-2017
Security Considerations For Unstructured Data In The Cloud Summary
What kind of data security and recovery can cloud services offer? This e-book discusses a 3-part data security model to keep in mind when you're looking to leverage the cloud. Discover the importance of confidentiality, integrity, and availability in securing the cloud.

sponsored by: Panzura
08-10-2017
Enterprise Defense at the Speed of Data Summary
Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.

sponsored by: ThreatConnect
08-10-2017

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>