White Papers

Channel: BI End-User Adoption - Marty Carney RSS Feed for BI End-User Adoption - Marty Carney

 

Displaying 1–15 (of 6753)

Popularity is determined by a calculation of page views and community comments.

Title Date
Security Solution Trends 2016 Summary
In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.

sponsored by: Juniper Networks, Inc.
12-04-2016
Computer Weekly – 27 September 2016: Digital knowledge at the British Library Summary
In this week's Computer Weekly, we find out about the technology plans at the British Library as it aims to store the UK's printed and digital history. Graph database technology is being used to help improve food safety throughout the supply chain. And tech leaders tell us how to architect IT for the cloud. Read the issue now.

sponsored by: ComputerWeekly.com
09-27-2016
Pure Storage for State and Local Government Summary
Today's consumers expect their governments to use their tax dollars wisely and provide a private-like experience. So how can the government deliver the best, most efficient services to its constituents? Flash storage offers remarkable performance that can modernize legacy application, increase efficiency and decrease cost. Read on to learn more.

sponsored by: Pure Storage
09-23-2016
Your Blueprint to Securing Your Public and Hybrid Cloud Summary
Discover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in.

sponsored by: Fortinet, Inc.
09-23-2016
Defining Security for Today’s Cloud Environments Summary
Uncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn why organizations need to augment traditional firewalls and security appliances with expanded protection for east-west traffic, both within internal networks and across clouds.

sponsored by: Fortinet, Inc.
09-23-2016
Better Together: Security and Collaboration with Backup and Box Summary
This white paper examines a modern data mobility and security strategy that incorporates both a file sync and share app along with a comprehensive endpoint data backup platform. Access now to find out why just sync and share isn't enough to stand alone and mitigate the potentially permanent loss of critical data.

sponsored by: Code42
09-23-2016
Computer Weekly 50th anniversary special Summary
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.

sponsored by: ComputerWeekly.com
09-22-2016
Speeding Up Big Data Analytics Infographic Summary
In this infographic, see how you can put big data to work for you by combining quick analysis software with compact hardware.

sponsored by: NEC Corporation of America
09-22-2016
Analysts Reveal how to Secure SaaS Summary
This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.

sponsored by: Palo Alto Networks
09-22-2016
To Choose Autotask for IT Management and Service Delivery Summary
Learn the top 10 reasons to embrace an automation tool which facilitates service delivery and IT management. With these capabilities so improved, you can then deliver improved services to your own customers.

sponsored by: Autotask Corporation
09-22-2016
Securing Office 365 Is Easier Than You Think Summary
SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.

sponsored by: Palo Alto Networks
09-22-2016
How to Conquer Security on the Public, Private, and Hybrid Clouds Summary
Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more.

sponsored by: Fortinet, Inc.
09-22-2016
5 Ways Storage Is Holding You Back Summary
Solid state storage used to cost a pretty penny but with its cost decreasing, it's a game changer for agency data centers dealing with data challenges and raising public expectations for instantaneous service. Not convinced? In this white paper, learn five reasons why it's worth considering upgrading to all-flash storage.

sponsored by: Pure Storage
09-22-2016
Questions to Ask Your Cloud Service Provider: Know how your Data will be Protected in the Cloud Summary
As you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more.

sponsored by: Intel Security
09-22-2016
6 Cloud and Datacentre Trends Shaping IT Strategy in ASEAN Summary
As cloud enters the mainstream, IT leaders can't afford to be left behind and this guide will help you understand the latest trends and strategies, and the benefits they can bring to your organisation.

sponsored by: ComputerWeekly.com
09-21-2016

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>