White Papers

Channel: BI For the Mid-Market - Lyndsay Wise RSS Feed for BI For the Mid-Market - Lyndsay Wise

 

Displaying 1–15 (of 18418)

Popularity is determined by a calculation of page views and community comments.

Title Date
Deployment Guide: Configuring a highly available Microsoft® Exchange Server 2013 environment on a Dell™ PowerEdge™ VRTX Summary
This white paper outlines the best practices for configuring Microsoft Exchange 2013 environment on Dell PowerEdge VRTX architecture.

sponsored by: Dell and Microsoft
12-31-1969
Computer Weekly – 2 August 2016: Giving fashion a digital makeover Summary
In this week's Computer Weekly, we find out how one of the UK's biggest mail order retailers is moving to digital. We examine the growing importance of network function virtualisation. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now.

sponsored by: ComputerWeekly.com
08-02-2016
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques Summary
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

sponsored by: ComputerWeekly.com
07-29-2016
The Path to Operational Intelligence Summary
In the right hands and with the proper tools, big data is invaluable for solving problems in business systems. But turning raw big data into operational intelligence is easier said than done. Uncover how you begin your organization's transition from reactive problem solving to real-time data driven insights.

sponsored by: Splunk
07-29-2016
The 2016 Global Cloud Data Security Study Summary
When done right, securing the cloud can have a domino effect on improved access management, encryption, efficiency, and competitive advantage. Learn more about what 3,476 IT pros worldwide are saying about cloud governance and security practices.

sponsored by: Gemalto
07-29-2016
See WiFi the Way Your Users See It Summary
This short product description details the two key components of a network monitoring system focused on Wi-Fi performance. First, as a simulated user, interrogating network performance. Second, as a reporting mechanism, providing current and historical data with room-by-room analysis.

sponsored by: eTECH Channel
07-29-2016
Test Report: Citrix CloudBridge WAN Optimization Summary
Discover the capacity of one WAN optimization tool in this third-party test report. Inside you'll learn specifically about how you can master your WAN environment.

sponsored by: Citrix
07-29-2016
Nip and Tuck: ECM Gets a Facelift Summary
With mobile, cloud and remote workforce trends changing the scope of content management, 2014 will be a year of growth for ECM systems.

sponsored by: IBM
07-29-2016
Hiding in Plain Sight: Komodo Eye Spots Wireless Network Issues Summary
Learn about how an enterprise offering outsourced IT services deployed a network monitoring tool to its clients. Specifically, businesses that are using wireless as their chief network connection, or are struggling with their wireless networks.

sponsored by: eTECH Channel
07-28-2016
Credit Acceptance Corporation Virtualizes To Enable DevOps and Move Faster Summary
With their patented Credit Approval Processing System (CAPS), CACC has enabled dealerships to deliver quick credit approvals to over 7M consumers but their commitment to excellence stretched their IT infrastructure to capacity. Check out this case study to see how seamlessly CACC switched to a 100% virtualized IT infrastructure.

sponsored by: Embotics
07-28-2016
A Computer Weekly buyer's guide to 3D printing Summary
In this 14-page buyer's guide, Computer Weekly looks at how 3D Printing will disrupt industry from enterprises to SMEs, what advances we will see next and how CIOs can exploit the tide of innovation to become business enablers.

sponsored by: ComputerWeekly.com
07-28-2016
A Computer Weekly buyer's guide to NoSQL Summary
There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.

sponsored by: ComputerWeekly.com
07-28-2016
The Future of Retail Summary
71% of in-store shoppers who use smartphones say the device is more important than the in-store experience. Uncover the future of retail shopping with 5 key predictions based on current trends and the changing perception of shopping experiences for retail leaders to consider.

sponsored by: [24]7 Customer, Inc.
07-28-2016
Application Management: Racing Ahead of the Competition Summary
Access this white paper to learn how updating your approach to application management can provide visibility across the entire stack and much more.

sponsored by: Splunk
07-28-2016
BYOD: Keeping the Benefits While Staying Secure Summary
In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.

sponsored by: IBM
07-28-2016

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>