White Papers

Channel: In Search of Wisdom - Frank Buytendijk RSS Feed for In Search of Wisdom - Frank Buytendijk

 

Displaying 1–15 (of 11420)

Popularity is determined by a calculation of page views and community comments.

Title Date
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Amazon Web Services
11-30-2014
Enter the BYO promiseland Summary
BYO and mobility is a business direction and not a decision. In this classroom, mobility experts Bryan Barringer and Jeffery Hammond offers specific steps for CIOs to follow to manage an enterprise-wide mobility strategy.

sponsored by: SearchCIO.com
08-04-2014
Data Protection Today Summary
This classroom takes a look at virtual server recovery advancements, why today's disk backup solutions may struggle with modern recovery demands, and how to craft a robust data protection strategy that goes beyond just backup to focus on speedy recovery for critical apps.

sponsored by: SearchDataBackup.com
08-01-2014
August 2014 Storage magazine: Getting Serious About Mobile Backup Summary
The August 2014 issue of Storage magazine looks at how hypervisor vendors are adding new storage features, examines storage performance bottlenecks and shows how HDFS can help with big data.

sponsored by: SearchStorage.com
08-01-2014
Information Security Magazine – July/August 2014 Summary
Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.

sponsored by: SearchSecurity.com
08-01-2014
Network Evolution – July/August 2014 Summary
Learn how context-aware security makes network security policy smarter -- but only with a solid foundation. We also cover hybrid SDN and programming for network engineers.

sponsored by: SearchNetworking.com
08-01-2014
Why the World's Leading Businesses Trust BlackBerry Summary
Enterprise Mobility Management (EMM) is no easy task. However, with the right tools and a trusted partner any problem can be solved.

sponsored by: BlackBerry
08-01-2014
Thin Client Computing for K-12 Online Assessments Summary
This whitepaper will help you learn how to prepare for the implementation of mandatory online testing while maintaining low acquisition, maintenance and energy consumption costs.

sponsored by: NComputing
08-01-2014
The Next Generation Employee Experience Summary
Check out the following white paper to explore the current changing state of workforce demographics and how it's pushing for change in the business intranet environment. Gain a firsthand look at employee experience suite software that allows business to leverage social, rich ECM, and real-time collaboration to deliver better employee experiences.

sponsored by: IBM
08-01-2014
Unified IT Monitoring: A Necessity in the Era of the Customer Summary
This exclusive whitepaper details how unified IT monitoring can be used to deliver the customer experience your users demand.

sponsored by: CA Technologies.
08-01-2014
Enterprise Data Backup- The Power of Recovery Summary
Read this whitepaper to find out about a backup offering designed to provide true peace of mind to organizations and an easily managed solution to IT teams.

sponsored by: Rand Secure Data
08-01-2014
Next Generation Firewall Solutions Aid Research-oriented Institutions Summary
Access this case study to learn about a university that used a next generation firewall solution for complete network security.

sponsored by: McAfee, Inc.
08-01-2014
The Power and Payback of Unified IT Monitoring Summary
This informative whitepaper examines the role of unified IT monitoring in simplifying modern IT challenges by bringing infrastructure, application and service level visibility together.

sponsored by: CA Technologies.
08-01-2014
Protect Against Advanced Evasion Techniques Summary
This white paper explores a next generation firewall (NGFW) solution that takes on the challenges of network security.

sponsored by: McAfee, Inc.
08-01-2014
Stopping Zero Day Exploits For Dummies Summary
This informative eBook examines the different threats that could compromise your security system and lead to advanced persistent threats and targeted attacks, and outlines the best strategies to keep your data safe.

sponsored by: IBM
08-01-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>