Your Search returned 8531 results from our White Paper Library

Mongodb

Data management

Top 5 Considerations When Evaluating NoSQL Databases

This white paper discusses the top five considerations businesses should bear in mind when evaluating NoSQL databases.

Defaultlogoopt1

Business Management

Veeam Enterprise Availability for SAP HANA

Enterprise-grade companies uses SAP HANA worldwide, this is the application directly related to customers core business functionality

Ibm logo new0740 150x150

Guided Hands-on Lab-Learn how to deliver Disaster Recovery and Cyber Resilience with Zerto, on the IBM Cloud

This IBM event showcases the benefits of integrating replication, Disaster Recovery (DR) and cloud mobility into one service.

Ibm logo new0740 150x150

Guided Hands-on Lab-Learn how to deliver Disaster Recovery and Cyber Resilience with Zerto, on the IBM Cloud (French)

This IBM event showcases the benefits of integrating replication, Disaster Recovery (DR) and cloud mobility into one service.

Ibm logo new0740 150x150

Business Management

The Path to a Thinking Supply Chain

This IDC Spotlight examines the importance of developing a thinking supply chain to keep up with the demands of digital transformation.

Ibm logo new0740 150x150

Security

2018 Cost of a Data Breach Study: Global Overview

This IBM Security and Ponemon Institute study analyzes responses from over 2200 IT, data protection, and compliance professionals to discover the cost of data breaches...

Nutanix square

Cloud Computing

Top 20 Enterprise Cloud Questions Answered

This eBook compiles the most common questions Nutanix have received, and the answers they have for, businesses seeking information about Enterprise Cloud.

Nutanix square

Infrastructure Management

2018 State of the Enterprise Datacentre

This report examines the state of enterprise datacentres in 2018 and answers questions regarding their future.

Mimecast

Security

Whaling - anatomy of an attack

Whaling — derived from an analogy with a big “phish” — is particularly threatening because it’s both highly deceptive and damaging. A cyber-criminal, disguised as...

Nutanix square

Infrastructure Management

The Definitive Guide to Hyperconverged Infrastructure

This eBook gives an overview of the Nutanix hyperconverged solution and walks through the different features it utilises to provide an efficient datacentre solution...

2 4 5 853 854

Recommended for You

International Women's Day: We've come a long way, but there's still an awfully long way to go

Charlotte Trueman takes a diverse look at today’s tech landscape.

Trump's trade war and the FANG bubble: Good news for Latin America?

Lewis Page gets down to business across global tech

20 Red-Hot, Pre-IPO companies to watch in 2019 B2B tech - Part 1

Martin Veitch's inside track on today’s tech trends

Poll

Do you think your smartphone is making you a workaholic?