Your Search returned 6183 results from our White Paper Library

Sort By
IBM

Cloud Computing

Optimizing the hybrid cloud

This paper looks at three key hybrid cloud use cases.


Brocade

Virtualization

The New IP: Building the Foundation of Datacenter Network...

This IDC paper explores what is driving moves toward datacenter automation, and how to build the foundations for automating your own datacenter.


IBM

Network Security

Stop Advanced Threats with IBM Security

Find out how to combat threats in real-time.


Riverbed

Application Performance Management (APM)

Lifecycle Management is the Key to Successful Unified Communications...

10 common quality and performance problems application performance monitoring can help solve. Plus, see how you can detect, diagnose and fix offending...


Interactive Intelligence

Contact Center Management

Omnichannel Is No Longer Optional - Connecting the Contact...

Read on to see why Omnichannel is no longer optional, and learn why that’s actually great news for your customers – and your business.


Ipswitch

File Transfer

Managed File Transfer Solutions are The Way Forward

Discover a more secure way of transferring data.


Smartling

Outsourcing

Ambitious Brands Need Effective Content Translation

This video provides a summary of research of how organizations are approaching content translation.


Smartling

Outsourcing

How Music Discovery App Shazam Gained Fluency in 25 Languages...

This video looks at how music discovery app Shazam used translation technology to gain fluency in over 20 languages.


Citrix

Desktop Virtualization

Taking Windows mobile on any device

This paper discusses how Citrix can help take Windows mobile on any device.


Carbon Black

Data Privacy and Security

Data Breach Detection: What You Need to Know

Today’s cyber-attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today’s...


Previous 1 3 4 5 618 619

Blogs

jon-collins

Thinking Different

In 2016, get ready for the mobile API explosion

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

How far can China push its bid to control the internet?

Phil Muncaster reports on China and beyond

no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems

Poll

Does Altruistic Malware introduce more risk despite good intentions?