Your Search returned 7463 results from our White Paper Library

Sort By
Informatica

Database Solutions

Best Practices for Dynamic Data Masking

This white paper explains how dynamic data masking (DDM) can cost-effectively add an extra layer of data security to protect sensitive data. Read about...


Informatica

Treasury, Cash and Risk Management

Revenue Generation & Cost Savings Opportunities for Banks...

Learn how banks can improve payments processing through new technologies that streamline processing, aggregate data across multiple systems and transform...


Citrix Online

Help Desk Management

Recruit and Build the Right Team for Your Service Desk

This new Service Desk Institute white paper explores strategies for recognizing the best candidates for your service desk dream team and how to keep staff...


Cirba

Servers

Server Capacity Defrag – Maximizing Infrastructure Efficiency...

This paper explains the benefits of capacity defragmentation in a virtualized environment. Learn how to maximize infrastructure efficiency through strategic...


Riverbed

Virtualization

Five Steps to Successful IT Consolidation

Download this paper by Riverbed and discover a clear 5-step approach to making sure every consolidation project is successful.


Riverbed

Cloud Computing Platforms

Unleashing Cloud Performance: Making the Promise of Cloud...

In this whitepaper, we explore how WAN optimization from Riverbed can break the cloud performance barrier and deliver on the promise of accelerated cloud...


Riverbed

Server Consolidation

The 3 Barriers to IT Infrastructure Consolidation

This whitepaper addresses how government agencies can overcome the three principal barriers to consolidation: constrained WAN bandwidth, TCP throughput...


Imperva

Security

Gartner: The Structure and Scope of an Effective Information...

This Gartner research paper can help you build an effective information security program in your organization. Learn how to drive security through all...


Imperva

Security

Gartner: Understanding Vulnerability Management Life Cycle...

This Gartner research paper provides guidance on the elements of an effective vulnerability program. Learn how to make your IT environment more resilient...


Micro Focus

Software

The Current State of Terminal Emulation for 2011

This paper presents results from a survey on terminal emulation and its use in enterprises. The paper reveals the key drivers for change in the terminal...


1 2 694 696 698 746 747

Recommended for You

dan2

Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future

kathryn-cave

A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?