Your Search returned 6183 results from our White Paper Library

Sort By

Cloud Computing

Optimizing the hybrid cloud

This paper looks at three key hybrid cloud use cases.



The New IP: Building the Foundation of Datacenter Network...

This IDC paper explores what is driving moves toward datacenter automation, and how to build the foundations for automating your own datacenter.


Network Security

Stop Advanced Threats with IBM Security

Find out how to combat threats in real-time.


Application Performance Management (APM)

Lifecycle Management is the Key to Successful Unified Communications...

10 common quality and performance problems application performance monitoring can help solve. Plus, see how you can detect, diagnose and fix offending...

Interactive Intelligence

Contact Center Management

Omnichannel Is No Longer Optional - Connecting the Contact...

Read on to see why Omnichannel is no longer optional, and learn why that’s actually great news for your customers – and your business.


File Transfer

Managed File Transfer Solutions are The Way Forward

Discover a more secure way of transferring data.



Ambitious Brands Need Effective Content Translation

This video provides a summary of research of how organizations are approaching content translation.



How Music Discovery App Shazam Gained Fluency in 25 Languages...

This video looks at how music discovery app Shazam used translation technology to gain fluency in over 20 languages.


Desktop Virtualization

Taking Windows mobile on any device

This paper discusses how Citrix can help take Windows mobile on any device.

Carbon Black

Data Privacy and Security

Data Breach Detection: What You Need to Know

Today’s cyber-attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today’s...

Previous 1 3 4 5 618 619



Thinking Different

In 2016, get ready for the mobile API explosion

Jon Collins’ in-depth look at tech and society


China Rising

How far can China push its bid to control the internet?

Phil Muncaster reports on China and beyond


Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems


Does Altruistic Malware introduce more risk despite good intentions?