Your Search returned 1 results from our Editorial content

Sort By

STATISTICAL DATA ANALYSIS

Ethiopia: From Solomon to Big Data

Today Addis Ababa is the seat of the African union, base for the Economic Commission for Africa and often referred to as "the political capital” of Africa. But looking...

   

Your Search returned 81 results from our White Paper Library

Sort By
SAP

Master Data Management

Making Strategy Real

In today's competitive global business environment virtually all firms work diligently to analyze alternatives and to create a business strategy that enables...


SAP

Master Data Management

Managing Enterprise Information: Architecting for Survival...

Information is not always the first word that comes to mind when executives think about survival strategies. Yet according to the acclaimed business strategist...


Imperva

Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.


Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.


Riverbed

Virtualization

Five Steps to Successful IT Consolidation

Download this paper by Riverbed and discover a clear 5-step approach to making sure every consolidation project is successful.


Imperva

Security

Gartner: The Structure and Scope of an Effective Information...

This Gartner research paper can help you build an effective information security program in your organization. Learn how to drive security through all...


Symantec Corporation

Endpoint Security

Endpoint Data Protection Buyer's Guide

This guide can help your organization evaluate risks to data at the endpoints. It includes a checklist for selecting the right endpoint encryption solution...


CA Technologies

Risk Management

Defending Against Insider Threats to Reduce your IT Risk...

This paper explains why your organization should take steps to prevent insider thefts and malicious attacks. Read now and learn a proactive approach to...


Previous 1 3 4 5 8 9

Blogs

adrian-schofield

South African ICT

The thorny issue of internet freedom across Africa

Adrian Schofield sheds light on tech in South Africa

martin-veitch-thumbnail

My day in the Jeff Bezos and Amazon forest

Martin Veitch's inside track on today’s tech trends

phil-muncaster

China Rising

Why WannaCry might make Microsoft cry in China

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should we donate our health data the same way we donate organs?