White Papers

 

Displaying 1–15 (of 5934)

Popularity is determined by a calculation of page views and community comments.

Title Date
Federal Life Sciences and Health Care Market Opportunities for EMC Isilon Scale-Out Network-Attached Storage Summary
This thought piece provides an understanding of the market and position EMC Isilon capabilities based on statistics from the National Science Foundation (NSF). It also shows results from specific uses of the technology by life science and healthcare organizations.

sponsored by: EMC & Arrow
08-29-2014
Email Security – Virtual Appliance Summary
This webcast features an email security virtual appliance that helps you better detect, predict, and prevent today's more targeted attacks.

sponsored by: Cisco Systems, Inc.
04-22-2014
A Practical Guide to Information Governance for Financial Services Summary
The following white paper explores the importance of information governance with particular focus on the financial services industry. Gain helpful guidance on how to manage information related risks, compliance requirements, and more.

sponsored by: Iron Mountain
04-22-2014
Develop Your Criteria for Selecting VDI Software Summary
Vendors provide many desktop virtualization choices, so know your needs when comparing virtual desktop infrastructure products. See how to evaluate and deploy VDI software.

sponsored by: SearchVirtualDesktop.com
04-22-2014
HIPAA Compliance: Sign on to Robust Access Controls Summary
View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.

sponsored by: Imprivata
04-22-2014
Building a Trusted SAP HANA Data Center Summary
In this comprehensive resource, explore a variety of hardware appliances that are SAP-approved as platforms for HANA. Discover how these appliances from Cisco, EMC, and VCE can benefit your SAP HANA implementation, and evaluate how they stack up against the five essential characteristics of a SAP HANA hardware platform.

sponsored by: Cisco and SAP
04-22-2014
Web Security – Virtual Appliance Summary
Watch this webcast to see how you can best protect your assets accessible by the Web with a strong protection solution that ensures security wherever your data goes.

sponsored by: Cisco Systems, Inc.
04-22-2014
The CIO's Chance of a Lifetime Summary
The following IDC white paper explores the role that the CIO and IT group play in enabling, supporting, and leading analytics programs and projects within their organizations. Uncover the 4 big myths that can be hurting your analytics effectiveness, how to fix IT and line of business disconnect, and more.

sponsored by: SAS
04-22-2014
Computer Weekly – 22 April 2014: Adapting to life after Heartbleed Summary
In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?

sponsored by: ComputerWeekly.com
04-22-2014
Unlock the value of your .NET architecture Summary
For businesses running on .NET architectures, the options for integration on-premise and cloud applications are limited. Instead of relying on custom integration code, you may want to consider a service-oriented architecture (SOA) -- but what should you take into consideration when evaluating SOA technology?

sponsored by: MuleSoft
04-22-2014
Challenges in the Effective Use of Master Data Management Techniques Summary
The following white paper explores the challenges that face many companies that are trying to get an effective hold on master data management. Learn which consolidation techniques to use, how to meet consumption needs, and more.

sponsored by: SAS
04-22-2014
Key Considerations for a Converged Infrastructure Summary
Explore thie e-guide to learn more about how you can optimize your data center with an approach that's designed "with virtualization and cloud in mind."

sponsored by: Bull
04-22-2014
Forging a CEM Strategy That Can Power Commerce Summary
With a seemingly exhaustive number of methods to communicate -- not to mention an expected $280 billion in U.S. e-commerce sales in 2015 -- contact center technology today requires a new approach.

sponsored by: SearchCRM
04-22-2014
Fight Malware, Malfeasance, and Malingering Summary
This guide looks at top tools and strategies for fighting APTs and malware-based attacks.

sponsored by: F5 Networks
04-21-2014
Heathcare By Any Other Name Summary
This crucial white paper takes an in-depth look at the new care models that have emerged, such as accountable care and integrated health, discussing their benefits and effectiveness in cutting costs and improving collaboration.

sponsored by: GE
04-21-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>