White Papers

 

Displaying 165–180 (of 1811)

Popularity is determined by a calculation of page views and community comments.

Title Date
Cloud Data Protection for VMware Environments Summary
Protecting your data center is complex and expensive. Streamline and lower your TCO with a cloud solution.

sponsored by: Druva Software
02-02-2017
Shifting Data Protection Strategies to the Cloud Summary
With the rise of ROBO locations comes data protection challenges. Learn how to effectively protect your remote data.

sponsored by: Druva Software
02-02-2017
Cloud Data Protection for Remote and Branch Offices Summary
Overcome your ROBO backup challenges, improve business agility and reduce costs with cloud-based data protection.

sponsored by: Druva Software
02-02-2017
Extending the Skype Experience to Every Meeting Room Summary
The next generation of Skype for Business meeting room systems promises to provide users the communications tools they need to effectively collaborate and meet in any meeting room. But can you really believe these promises? This Frost & Sullivan white paper demystifies the capabilities of a new Skype for Business meeting room system.

sponsored by: Logitech Inc.
01-31-2017
How to Tackle Endpoint Defense Issues Summary
Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

sponsored by: Carbon Black
01-27-2017
Are you one eDiscovery away from a budgetary meltdown? Summary
Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

sponsored by: ComputerWeekly.com
01-25-2017
When Cyberthieves Attack, Technologies Have Your Back Summary
Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.

sponsored by: SearchHealthIT.com
01-24-2017
2017 IT Priorities APAC - Survey Results Summary
Every year, Computer Weekly asks CIOs and senior IT decision-makers about the technologies and initiatives they will be investing in over the next 12 months. Here you can read the results from over 1000 responses in APAC and see how your 2017 plans compare.

sponsored by: ComputerWeekly.com
01-19-2017
Qualify The Tangible Business Value of BI Summary
This report presents strategies for building your BI business case. Learn how to answer 3 key questions about the state of your business and its potential to benefit from BI before you get started.

sponsored by: Yellowfin
01-16-2017
For CFOs, the Time to Deploy Procure-to-Pay Software is Now Summary
This expert 3-part handbook examines the many facets of procurement management software as it becomes more sophisticated via advanced financing and analytics features. Gain expert tips on implementing procure-to-pay software to lower costs, improve cash management, and mitigate risk.

sponsored by: SearchHRSoftware
01-12-2017
How Stronger Governance Enables Distributed BI Summary
Find out how to overcome challenges like lingering data silos, data security, and establishing a single source of truth. Learn how a strong governance program and a distributed BI model can optimize BI and analytics.

sponsored by: Qlik
12-31-2016
The Impact of SharePoint: Executive Summary Summary
This research report explores the latest trends in SharePoint integration into ECM and document management strategies. Access now to find out what organizations say make or break their SharePoint deployments, how SharePoint 2016 is viewed vs. earlier versions, how it's viewed as a tool for file sharing vs. collaboration, and more.

sponsored by: K2
12-31-2016
A Field Guide to the World of Databases and Analytics Summary
From document and graph to relational and non-relational, this guide lays out your database and analytics options. Find out how data moves across databases and development languages so that you can work in your favorite environment without sacrificing productivity.

sponsored by: IBM
12-31-2016
Information Lifecycle Management Best Practices Guide Summary
Find out how to improve your understanding of the market, your customers, and your product development with information lifecycle management best practices for Oracle database environments.

sponsored by: Cintra
12-31-2016
Information Lifecycle Management: Harness The Power Of Your Data Summary
Discover how to create a comprehensive information lifecycle management (ILM) strategy. Find out how to take a 4 tiered approach to categorizing and managing your data and learn about the key pillars of ILM.

sponsored by: Cintra
12-31-2016

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>