Your Search returned 1 results from our Editorial content

Sort By

STATISTICAL DATA ANALYSIS

Ethiopia: From Solomon to Big Data

Today Addis Ababa is the seat of the African union, base for the Economic Commission for Africa and often referred to as "the political capital” of Africa. But looking...

   

Your Search returned 67 results from our White Paper Library

Sort By
SAP

Master Data Management

Making Strategy Real

In today's competitive global business environment virtually all firms work diligently to analyze alternatives and to create a business strategy that enables...


SAP

Master Data Management

Managing Enterprise Information: Architecting for Survival...

Information is not always the first word that comes to mind when executives think about survival strategies. Yet according to the acclaimed business strategist...


Imperva

Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.


Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.


Riverbed

Virtualization

Five Steps to Successful IT Consolidation

Download this paper by Riverbed and discover a clear 5-step approach to making sure every consolidation project is successful.


Imperva

Security

Gartner: The Structure and Scope of an Effective Information...

This Gartner research paper can help you build an effective information security program in your organization. Learn how to drive security through all...


Symantec Corporation

Endpoint Security

Endpoint Data Protection Buyer's Guide

This guide can help your organization evaluate risks to data at the endpoints. It includes a checklist for selecting the right endpoint encryption solution...


CA Technologies

Risk Management

Defending Against Insider Threats to Reduce your IT Risk...

This paper explains why your organization should take steps to prevent insider thefts and malicious attacks. Read now and learn a proactive approach to...


Previous 1 3 4 5 6 7

Blogs

jon-collins

Thinking Different

Can technology save a post-Brexit Britain?

Jon Collins’ in-depth look at tech and society

mark-chillingworth

CIO Watch

DevOps is a CIO’s theory of evolution

Mark Chillingworth on IT leadership

Most Recent Comments

no-image

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?