White Papers

Channel: BI For the Mid-Market - Lyndsay Wise RSS Feed for BI For the Mid-Market - Lyndsay Wise

 

Displaying 1–15 (of 19222)

Popularity is determined by a calculation of page views and community comments.

Title Date
Deployment Guide: Configuring a highly available Microsoft® Exchange Server 2013 environment on a Dell™ PowerEdge™ VRTX Summary
This white paper outlines the best practices for configuring Microsoft Exchange 2013 environment on Dell PowerEdge VRTX architecture.

sponsored by: Dell and Microsoft
12-31-1969
Security Solution Trends 2016 Summary
In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.

sponsored by: Juniper Networks, Inc.
12-04-2016
Best Practices for Dealing With Phishing and Ransomware Summary
There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.

sponsored by: Trustwave
09-30-2016
Global Connectivity Index 2016 Summary
The Global Connectivity Index (GCI) 2016 from Huawei measures the progress of 50 nations in investing in and deploying Information and Communications Technology (ICT) to achieve economic digitisation

sponsored by: ComputerWeekly.com
09-28-2016
TechTarget Salary Survey 2016 APAC Summary
We recently surveyed 450+ IT professionals throughout APAC to determine the major salary, career and geographical mobility trends. Read the results here and find out how you measure up against your peers.

sponsored by: ComputerWeekly.com
09-28-2016
How Automated Business Analytics Helped The Children's Cancer Institute Improve Survival Rates Summary
This case study explores how an automated BI platform helped The Children's Cancer Institute to deliver and implement insights in a matter of hours rather than weeks. Find out how they were able to empower both researchers and business users to quickly analyze, share, and act on a unified view of their data with deeper and more consistent insights.

sponsored by: Yellowfin
09-28-2016
Securing & enabling the Mac-empowered enterprise Summary
This white paper explains how you can create a comprehensive security program for your business. Learn to implement self-service restoration, total data visibility for your IT department, integrated management of PC's and Macs, and more.

sponsored by: Code42
09-27-2016
Going big: why companies need to focus on operational analytics Summary
This report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations

sponsored by: ComputerWeekly.com
09-27-2016
Cloud Statistics Usage Summary
This infographic lays out the growth of a cloud based unified communications service. Inside you'll see how enterprise customers have employed Lifesize's cloud computing tool, including a dissection of which industries have benefited most, and how they have used cloud communications to their benefit.

sponsored by: LifeSize
09-27-2016
10 Surprising Facts About Our Mobile World Summary
This infographic lays out 10 facts that may surprise you about the changing nature of enterprise mobility. Whether it's the staggering number of mobile subscribers or the incredible growth of mobile data usage, a clear understanding of the trajectory of mobile adoption will leave you sure embracing mobile computing is the right choice.

sponsored by: LifeSize
09-27-2016
Masters of Disaster Recovery: How Highly Resilient Organizations Excel Summary
Why are some companies better at mastering disaster recovery in the face of today's "always-on" expectations? Download this report to discover just that, as evidenced by a survey of 310 BCDR professionals. In addition, learn how to formulate a battle-tested recovery plan based on the expert insights illustrated.

sponsored by: IBM
09-27-2016
Raspberry PI with Java: programming the internet of things Summary
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

sponsored by: ComputerWeekly.com
09-27-2016
IT's Guide for Securing and Managing Business Content Summary
This paper introduces a partnership that enables you to deploy seamless and secure collaboration, syncing, and productivity enhancing capability.

sponsored by: Box
09-27-2016
How to Create a Comparative Multi-Cloud TCO Analysis Spanning Public, Private and Managed Cloud Summary
In this 451 Research report, discover a formula which allows IT decision-makers to make a quick-and-easy cost comparison of their cloud options. Read on to determine how several key factors—such as automation, maturity, architecture, and capacity—impact the economic benefits of private, public and managed cloud.

sponsored by: Hewlett Packard Enterprise
09-27-2016
Disaster Recovery’s Treacherous Terrain Summary
Can your business continuity team navigate today's challenging environment? Access this infographic to take a look at today's DR landscape, and discover how other pros are using analytics to predict service disruptions, all under the pressure of meeting rapidly rising business leaders' expectations of DR capabilities.

sponsored by: IBM
09-27-2016

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>