White Papers

 

Displaying 1–15 (of 76)

Popularity is determined by a calculation of page views and community comments.

Title Date
Speed the Time-to-Value With the VIA IoT Analytics Platform Summary
Find out how to optimize the value you can derive from IoT and streaming data by updating your analytics tools and strategies. Plus, learn about Vitria's IoT Analytic Platform and how it helps you adapt to handle big data volumes.

sponsored by: Vitria Technology, Inc.
09-14-2017
Major Retailer Optimizes Supply Chain Management with Advanced Analytics Summary
Find out how a major retailer used advanced analytics with targeted dashboards and data visualizations to integrate data from across disparate apps and gain deeper insight into and optimize each stage of the supply chain.

sponsored by: Vitria Technology, Inc.
07-05-2017
Private PaaS: Unlock Faster, Agile App Development without Sacrificing Security Summary
In this e-guide, we help you weigh the benefits of private PaaS and offer advice on how to evaluate and test various PaaS offerings. Learn how to assess PaaS tools for compatibility with your existing infrastructure, integration into your app lifecycle management, alignment with compliance and governance, and more.

sponsored by: Red Hat
02-03-2017
Supply Chain Management & IoT: Just Another Evolution? Summary
How are big data and IoT impacting supply chain management and ERP? Find out how to harness the power of these two trends to optimize supply chains with data lakes, real-time streaming analytics, predictive insights, and more.

sponsored by: Vitria Technology, Inc.
12-31-2016
Understand enterprise file sync-and-share deployment models Summary
Learn why enterprise file sync and share (EFSS) services can be risky and how you can make the best decision when it comes to choosing a deployment model. Additionally, discover the pros and cons of several different deployments models including, public, private and hybrid-cloud EFSS services.

sponsored by: Citrix
12-08-2016
Why DevOps + Security = A Bright Idea Summary
By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures and defeat the long-standing bias that security is an obstacle, not aid, to good software development.

sponsored by: SearchSecurity.com
11-18-2016
The Evolution of Enterprise File Sync and Share Summary
Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.

sponsored by: ibm box
11-16-2016
Reach New Heights With Strategic Cloud Integration Summary
When planning to move your enterprise systems to the cloud, you'll need tools and strategies to help overcome cloud integration challenges. Here's a look.

sponsored by: SearchERP
10-24-2016
Mining Gold from Gigabytes August 2016 Business Information Summary
For companies tapping into mountains of amassed data, enterprise business analytics breathes new life into the old axiom "There's gold in them thar hills."

sponsored by: SearchDataManagement
08-04-2016
Scale-Out NAS vs. Object Storage Summary
This issue of storage magazine explores the strengths and weaknesses of scale-out NAS and object storage, offering expert advice on how to choose the right option for your enterprise's needs. Also discover tips to improve your storage efficiency, a breakdown of enterprise file sync and share deployment models, and more.

sponsored by: SearchStorage.com
08-03-2016
A Guide to Choosing the Right ECM Tools for Your Business Summary
ECM tools should be a cornerstone in your enterprise information toolkit, but there are many variables in play, and choosing the right platform requires consideration of your industry, objectives, existing software and in-house resources. In this e-guide, we explain the criteria you should use to evaluate and select ECM tools.

sponsored by: IBM
07-21-2016
How to Overcome Middleware Security Risks Summary
This expert e-guide provides a step-by-step process to secure middleware through application lifecycle management, network security, and security for specific middleware tools and interfaces. Also discover a case study about how the FAA exploited web-oriented open source middleware to improve integration and cut costs.

sponsored by: Red Hat
02-22-2016
The Need-to-Know of Today's Cloud Security Summary
In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.

sponsored by: SearchCloudComputing.com
02-16-2016
SOA Design Principles for Dummies Summary
Access this eBook to discover the design principles of SOA, and three fundamental aspects of SOA. Also learn why SOA is simply good design, and how to make your enterprise engaging.

sponsored by: IBM
11-05-2015
CW Europe – October 2015 Summary
Cloud computing has huge benefits to businesses and individual. The ability to deliver services to any location that has an internet connection and a suitable device empowers people.

sponsored by: ComputerWeekly.com
10-01-2015

1 2 3 4 5 6