White Papers


Displaying 1–15 (of 94)

Popularity is determined by a calculation of page views and community comments.

Title Date
Private PaaS: Unlock Faster, Agile App Development without Sacrificing Security Summary
In this e-guide, we help you weigh the benefits of private PaaS and offer advice on how to evaluate and test various PaaS offerings. Learn how to assess PaaS tools for compatibility with your existing infrastructure, integration into your app lifecycle management, alignment with compliance and governance, and more.

sponsored by: Red Hat
Understanding Azure: A Guide for Developers Summary
Platform as a Service (PaaS) allows developers to build large, complex apps and deploy them within minutes to customers who have astronomically high expectations. This guide contains a breakdown of 4 PaaS use cases, a comprehensive overview of Microsoft Azure, and more.

sponsored by: Microsoft
Understand enterprise file sync-and-share deployment models Summary
Learn why enterprise file sync and share (EFSS) services can be risky and how you can make the best decision when it comes to choosing a deployment model. Additionally, discover the pros and cons of several different deployments models including, public, private and hybrid-cloud EFSS services.

sponsored by: Citrix
Why DevOps + Security = A Bright Idea Summary
By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures.

sponsored by: SearchSecurity.com
The Evolution of Enterprise File Sync and Share Summary
Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.

sponsored by: ibm box
Reach New Heights With Strategic Cloud Integration Summary
When planning to move your enterprise systems to the cloud, you'll need tools and strategies to help overcome cloud integration challenges. Here's a look.

sponsored by: SearchManufacturingERP
Mining Gold from Gigabytes August 2016 Business Information Summary
For companies tapping into mountains of amassed data, enterprise business analytics breathes new life into the old axiom "There's gold in them thar hills."

sponsored by: SearchDataManagement
Scale-Out NAS vs. Object Storage Summary
This issue of storage magazine explores the strengths and weaknesses of scale-out NAS and object storage, offering expert advice on how to choose the right option for your enterprise's needs. Also discover tips to improve your storage efficiency, a breakdown of enterprise file sync and share deployment models, and more.

sponsored by: SearchStorage.com
How to Ensure Optimal User Experience and Application Availability while Reducing WAN Costs Summary
Discover how SD-WAN can be used to accelerate enterprise applications and provide consistent performance of mission critical systems. You'll also see how sophisticated SD-WAN can offer insights into application performance degradation and ensure the security of your data.

sponsored by: Citrix
A Guide to Choosing the Right ECM Tools for Your Business Summary
ECM tools should be a cornerstone in your enterprise information toolkit, but there are many variables in play, and choosing the right platform requires consideration of your industry, objectives, existing software and in-house resources. In this e-guide, we explain the criteria you should use to evaluate and select ECM tools.

sponsored by: IBM
How to Overcome Middleware Security Risks Summary
This expert e-guide provides a step-by-step process to secure middleware through application lifecycle management, network security, and security for specific middleware tools and interfaces. Also discover a case study about how the FAA exploited web-oriented open source middleware to improve integration and cut costs.

sponsored by: Red Hat
The Need-to-Know of Today's Cloud Security Summary
In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.

sponsored by: SearchCloudComputing.com
SOA Design Principles for Dummies Summary
Access this eBook to discover the design principles of SOA, and three fundamental aspects of SOA. Also learn why SOA is simply good design, and how to make your enterprise engaging.

sponsored by: IBM
CW Europe – October 2015 Summary
Cloud computing has huge benefits to businesses and individual. The ability to deliver services to any location that has an internet connection and a suitable device empowers people.

sponsored by: ComputerWeekly.com
Computer Weekly – 1 September 2015: Wearable Technology Proves its Worth on the Front Line Summary
In this week's Computer Weekly, we look at business applications for wearable technology. With hands-free police and military pilot projects already under way, wearable technology is set to make its mark in the enterprise in the near future.

sponsored by: ComputerWeekly.com

1 2 3 4 5 6 7