Your Search returned 1 results from our Editorial content

Sort By


Ethiopia: From Solomon to Big Data

Today Addis Ababa is the seat of the African union, base for the Economic Commission for Africa and often referred to as "the political capital” of Africa. But looking...


Your Search returned 78 results from our White Paper Library

Sort By

Master Data Management

Making Strategy Real

In today's competitive global business environment virtually all firms work diligently to analyze alternatives and to create a business strategy that enables...


Master Data Management

Managing Enterprise Information: Architecting for Survival...

Information is not always the first word that comes to mind when executives think about survival strategies. Yet according to the acclaimed business strategist...


Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.

Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.



Five Steps to Successful IT Consolidation

Download this paper by Riverbed and discover a clear 5-step approach to making sure every consolidation project is successful.



Gartner: The Structure and Scope of an Effective Information...

This Gartner research paper can help you build an effective information security program in your organization. Learn how to drive security through all...

Symantec Corporation

Endpoint Security

Endpoint Data Protection Buyer's Guide

This guide can help your organization evaluate risks to data at the endpoints. It includes a checklist for selecting the right endpoint encryption solution...

CA Technologies

Risk Management

Defending Against Insider Threats to Reduce your IT Risk...

This paper explains why your organization should take steps to prevent insider thefts and malicious attacks. Read now and learn a proactive approach to...

Previous 1 3 4 5 6 7 8



Thinking Different

Taking baby steps with Big Data

Jon Collins’ in-depth look at tech and society


China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond


CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk


Crowdfunding: Viable alternative to VC funding or glorified marketing?