White Papers

Channel: In Search of Wisdom - Frank Buytendijk RSS Feed for In Search of Wisdom - Frank Buytendijk

 

Displaying 1–15 (of 11750)

Popularity is determined by a calculation of page views and community comments.

Title Date
Get the Most Value Out of Network Security Summary
This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

sponsored by: HP and Intel
12-01-2014
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
Considerations for Third-Party and Server Appliance Tools Summary
In this expert e-guide, examine what types of tools are available to help IT shops monitor storage performance in VMware server environments. Get advice about, discover the benefits of, and explore the drawbacks of third-party storage performance monitoring tools.

sponsored by: Rackspace
08-30-2014
Closer Examination of the Future of VMware Cloud Computing Market Summary
As the cloud computing market is perpetually evolving, it can be difficult to stay on top of the most recent developments. Fortunately, this expert e-guide is here to break down some of the latest cloud news. Inside, learn what VMware is doing to shake up the cloud computing space.

sponsored by: Rackspace
08-30-2014
Chasing and Attaining the Goal of Zero Downtime Summary
In this expert resource, explore the findings of a recent research report on how successful organizations are identifying causes of downtime and attempting to achieve "zero downtime."

sponsored by: SUSE
08-30-2014
A Closer Look at Big Storage Architecture Summary
As companies store and analyze an ever-growing volume of data, it can be difficult to stay up to date on all the various categories of storage while deciding which storage architecture is best for your big data needs. In this expert e-guide, explore strengths and use cases for various storage options.

sponsored by: Caringo
08-30-2014
BI Architect Has Options to Tap to Support Expanding Environments Summary
Designing a systems architecture and technology infrastructure that can meet the increasing demands of business intelligence platforms is an exercise in finding the right combination of tools among a multitude of different choices. So how do you do it? Consult the following expert e-guide to find out now.

sponsored by: Actuate
08-29-2014
The Role of the User Experience in Video Conferencing Summary
Many organizations today are starting to realize the benefits of video as a collaborative tool in the workplace, and have begun to implement new strategies.  Workers are working remotely all around the world, and videoconferencing can bring everyone together in one place.

sponsored by: Polycom, Inc.
08-29-2014
Expert Advice For Managing a Successful BI Strategy Summary
The following expert e-guide highlights the critical responsibility business users have in leveraging reports and BI dashboards to strengthen strategies. Additionally, learn how to keep these reports simple, so that both IT and business departments can get involved in finding ways to improve business performance.

sponsored by: Actuate
08-29-2014
Countering Cyber Threats with Behavioral Analytics Summary
This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.

sponsored by: RSA, The Security Division of EMC
08-29-2014
Keys to Purchasing Storage and Subsequent Efficiency Summary
In this expert e-guide learn how to make a smart decision when purchasing storage by knowing what to look for in your solution. Learn how storage administrators can blend business tactics with financial metrics to strategically overcome tight storage budgets while remaining efficient.

sponsored by: EMC Corporation
08-29-2014
DataGravity Architecture Summary
This white paper explores a data-aware storage platform that provides integrated data protection, discovery, search, and file analytics within a state-of-the-art primary storage system that doesn't impede production performance.

sponsored by: DataGravity
08-29-2014
How to Unlock your IT Data with Business Discovery Summary
Consult the following white paper to examine the 5 essential components for successful business discovery and ultimately, a far superior business intelligence strategy as a whole.

sponsored by: QlikTech, Inc.
08-29-2014
How Videoconferencing is Changing Unified Communications Summary
Organizations are moving beyond justifying videoconferencing based on travel avoidance. Instead, they're interested in enhancing collaboration and improving business outcomes.

sponsored by: Cisco Systems, Inc.
08-29-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>