White Papers

 

Displaying 1–15 (of 119)

Popularity is determined by a calculation of page views and community comments.

Title Date
Private PaaS: Unlock Faster, Agile App Development without Sacrificing Security Summary
In this e-guide, we help you weigh the benefits of private PaaS and offer advice on how to evaluate and test various PaaS offerings. Learn how to assess PaaS tools for compatibility with your existing infrastructure, integration into your app lifecycle management, alignment with compliance and governance, and more.

sponsored by: Red Hat
02-03-2017
Intelligent Security Management Ends Costly Network Breaches Summary
In this white paper, learn more about the challenges network breaches present and what technology can provide you with the functionality to prevent them.

sponsored by: FireMon
12-30-2016
Understand enterprise file sync-and-share deployment models Summary
Learn why enterprise file sync and share (EFSS) services can be risky and how you can make the best decision when it comes to choosing a deployment model. Additionally, discover the pros and cons of several different deployments models including, public, private and hybrid-cloud EFSS services.

sponsored by: Citrix
12-08-2016
Why DevOps + Security = A Bright Idea Summary
By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures and defeat the long-standing bias that security is an obstacle, not aid, to good software development.

sponsored by: SearchSecurity.com
11-18-2016
The Evolution of Enterprise File Sync and Share Summary
Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.

sponsored by: ibm box
11-16-2016
Reach New Heights With Strategic Cloud Integration Summary
When planning to move your enterprise systems to the cloud, you'll need tools and strategies to help overcome cloud integration challenges. Here's a look.

sponsored by: SearchManufacturingERP
10-24-2016
Mining Gold from Gigabytes August 2016 Business Information Summary
For companies tapping into mountains of amassed data, enterprise business analytics breathes new life into the old axiom "There's gold in them thar hills."

sponsored by: SearchDataManagement
08-04-2016
Scale-Out NAS vs. Object Storage Summary
This issue of storage magazine explores the strengths and weaknesses of scale-out NAS and object storage, offering expert advice on how to choose the right option for your enterprise's needs. Also discover tips to improve your storage efficiency, a breakdown of enterprise file sync and share deployment models, and more.

sponsored by: SearchStorage.com
08-03-2016
A Guide to Choosing the Right ECM Tools for Your Business Summary
ECM tools should be a cornerstone in your enterprise information toolkit, but there are many variables in play, and choosing the right platform requires consideration of your industry, objectives, existing software and in-house resources. In this e-guide, we explain the criteria you should use to evaluate and select ECM tools.

sponsored by: IBM
07-21-2016
Strategizing for a Cloud App Integration Project Summary
Explore the benefits of a cloud integration strategy that starts with workflow analysis and the ways cloud connectors can take the manual (i.e. strenuous and time-consuming) effort out of integrating SaaS and enterprise applications. Also learn how the maturity of an iPaaS vendor can impact purchasing decisions.

sponsored by: Oracle Corporation
05-26-2016
How to Overcome Middleware Security Risks Summary
This expert e-guide provides a step-by-step process to secure middleware through application lifecycle management, network security, and security for specific middleware tools and interfaces. Also discover a case study about how the FAA exploited web-oriented open source middleware to improve integration and cut costs.

sponsored by: Red Hat
02-22-2016
The Need-to-Know of Today's Cloud Security Summary
In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.

sponsored by: SearchCloudComputing.com
02-16-2016
SOA Design Principles for Dummies Summary
Access this eBook to discover the design principles of SOA, and three fundamental aspects of SOA. Also learn why SOA is simply good design, and how to make your enterprise engaging.

sponsored by: IBM
11-05-2015
CW Europe – October 2015 Summary
Cloud computing has huge benefits to businesses and individual. The ability to deliver services to any location that has an internet connection and a suitable device empowers people.

sponsored by: ComputerWeekly.com
10-01-2015
Computer Weekly – 1 September 2015: Wearable Technology Proves its Worth on the Front Line Summary
In this week's Computer Weekly, we look at business applications for wearable technology. With hands-free police and military pilot projects already under way, wearable technology is set to make its mark in the enterprise in the near future.

sponsored by: ComputerWeekly.com
08-28-2015

1 2 3 4 5 6 7 8