Your Search returned 7457 results from our White Paper Library

Sort By
Fujitsu

Cloud Computing

POR QUÉ DEBE INTEGRAR DATA FABRIC A SU ESTRATEGIA DE TI...

Los datos son el alma de las organizaciones modernas. Algunos analistas se refieren a ellos como una nueva moneda.


Digital Transformation

Retos, habilitadores y casos de uso en Industria 4.0

En este whitepaper analizaremos los retos en transformación digital en la industria, los habilitadores tecnológicos y algunos ejemplos o casos de uso en...


Adobe

Cloud Computing Security

Adobe Creative Cloud for enterprise security overview

This paper describes our proactive approach as well as the procedures and the security architecture implemented by Adobe to help increase the security...


Adobe

Cloud Computing

Adobe Creative Cloud abonnement Entreprise Présentation...

Cet article technique présente notre approche proactive ainsi que les procédures et l’architecture utilisées pour optimiser la sécurité de vos données...


Adobe

Cloud Computing

Adobe Creative Cloud für Unternehmen und Sicherheit - German...

In diesem Whitepaper erfahren Sie, mit welchen Verfahren und mit welcher Sicherheitsarchitektur Adobe für eine sichere Creative Cloud-Umgebung sorgt und...


Data Privacy and Security

Combating Account Takeover in the Digital Space

Ready or not, data breaches and account takeovers are on an exponential rise. Equifax, Yahoo, Uber, and Saks Fifth Ave, just to name a few. This type of...


Infor

Digital Transformation

The most critical nine steps in your digital journey

This paper discusses 9 tactics to consider when launching a digital deployment project


Infor

Digital Transformation

You don’t have to be big to go digital

This white paper addresses the five most common worries SMBs have about digital technologies.


Infor

Cloud Computing

Four ways small and medium-sized businesses can get more...

The report discusses 4 key steps your business should prioritize to gain the greatest value from cloud technology.


Deep Instinct

Malware

Classifying Malware Using Deep Learning

With the increase of cybersecurity disasters and due to the lack of staff expertise, organizations are concerned for the state of their infrastructure’s...


Previous 1 2 4 5 745 746

Recommended for You

dan2

Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future

kathryn-cave

A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?