White Papers

Channel: BI End-User Adoption - Marty Carney RSS Feed for BI End-User Adoption - Marty Carney

 

Displaying 1–15 (of 6443)

Popularity is determined by a calculation of page views and community comments.

Title Date
Computer Weekly – 24 January 2017: World leaders discuss risks of social unrest from advances in technology Summary
In this week's Computer Weekly, we examine the fears raised at the World Economic Forum over the potential for social unrest as technology transforms working practices. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in adopting big data analytics. Read the issue now.

sponsored by: ComputerWeekly.com
01-23-2017
Test Every Stage of your Mobile App Lifecycle Summary
This quick guide reveals predictable and repeatable strategies for testing, monitoring, and improving your mobile apps throughout their lifecycles. Learn how to better manage your devices, apps, and users.

sponsored by: Hewlett Packard Enterprise
01-23-2017
Reinventing Data Protection for Digital Transformation Summary
Uncover the strategies your organization can use to overcome the data complexities of the modern reality of data. Learn the growing importance of data as an asset, as well as the need for new data protection and management strategies fit for purpose.

sponsored by: Hewlett-Packard Enterprise
01-23-2017
Cloud Generation Storage – The Safe and Cost-Effective Data Management System Summary
Discover a cloud generation storage can help your organization meet data governance challenges at low cost from the safety of your chose of an on-premises, hybrid, or private cloud environment. Learn modern data governance challenges, the 3 organization layers of this platform, 7 use-cases for Cloud Generation Storage, and more.

sponsored by: Avnet & HDS
01-23-2017
Mobile UX that Breaks Down Barriers - Developing Apps that Connect the World Summary
A lot of complicated processes go into making your app appear effortless to the end user. Uncover tips from QA managers, COOs and engineers on mobile UX design, user stat tracking, network condition tests, and much more.

sponsored by: Hewlett Packard Enterprise
01-23-2017
Beyond Prevention: Cisco’s Next Generation Endpoint Security Summary
Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.

sponsored by: Cisco
01-23-2017
Defending Applications with Integrated SaaS Technology Summary
The following white paper describes how to use a cloud-based tool that provides visibility into the security of your applications. Discover ways to protect your production applications.

sponsored by: Hewlett Packard Enterprise
01-20-2017
This Express Cloud Service Can Help You Make Database Administration Easy Summary
Discover how you can help manage your small or medium sized database in the cloud with a new technology ideal for supporting development, testing, and evaluation environments. In this white paper learn how you can provide drag-and-drop migration from legacy storage to the cloud, enable rapid development of web apps, and more.

sponsored by: Oracle Corporation UK Ltd
01-20-2017
HPE Mobile Center - Objective and Rules Summary
This unique resource lays out the process and potential bottlenecks of building, monitoring, and optimizing mobile apps. Learn how to use testing and monitoring tools and achieve ROI along the way.

sponsored by: Hewlett Packard Enterprise
01-20-2017
HPE Integration Guide for ArcSight Logger on ConvergedSystem 700 2.0 with Helion CloudSystem Summary
This technical white paper explores tools for cloud environment security. Discover key features that unify data across IT, search through millions of events using a text-based search tool, and more.

sponsored by: Hewlett Packard Enterprise
01-20-2017
Financial markets regulatory outlook 2017 Summary
Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

sponsored by: ComputerWeekly.com
01-20-2017
The Enterprise Guide to Evaluating Agile Software Testing Tools Summary
Many companies try to enable faster development by adopting Agile methodologies, but this transition comes with a variety of challenges. Discover how to satisfy Agile development's need for better software testing tools with 9 key areas for evaluation, including company viability, research and development, integration and 6 more.

sponsored by: QASymphony
01-20-2017
Crafting an insider threat program: Why and how Summary
Tackling IT threats is even harder when the breach -- malicious or inadvertent -- originates in the company. Learn how to handle insider threats.

sponsored by: SearchSecurity.com
01-20-2017
3 Myths Out There About Cloud Storage Summary
In this white paper, discover 3 common myths about the cost and security of cloud storage, as well as some ways in which the cloud can actually strengthen your storage capabilities.

sponsored by: Avnet & HDS
01-19-2017
The need for data automation in Hyperion Financial Management Summary
Hyperion Financial Management (HFM) is a core tool for many organisations in dealing with their financial planning, consolidations and reporting. Although it has its strengths, its weaknesses can open organisations up to major problems, say Quocirca analysts Clive Longbottom and Rob Bamford.

sponsored by: ComputerWeekly.com
01-19-2017

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>