Your Search returned 8997 results from our White Paper Library

Opentext logo 20171933 150x150

Business Management

Digital Governance: Finding the Balance Between Opportunity and Risk

Disruptive technologies will contribute to the creation, distribution, and fragmentation of enterprise information. The additional volumes of new data types will...

Defaultlogoopt1

Business Management

New Shoots of Efficiency

Industrial espionage is a real concern for companies worldwide, and manufacturers are particularly keen to protect their designs from falling into the wrong hands....

Projectplace logo2216 150x150

Business Management

Collaborative Planning

Why do projects become a success? More and more people believe this is because of motivation and commitment, not planning and control. Collaborative planning, a...

Zycko red logo only1644 150x150

Business Management

Why DDoS Makes for Risky Business - And What Can You Do About It

In the last 10 years, the number of DDoS attacks has increased significantly. However, despite their prevalence, many organisations still don’t have a dedicated...

Bmc logo rgb2240 150x150

Business Management

Workload Automation: Accelerate Digital Services Delivery

Managing Hadoop batch processing may consume a significant portion of application developers’ time and effort, which drives up application development times and...

Dyn logo 150x150

Business Management

Making the Move to a Cloud-Based DNS Service

Move away from uncertain performance and move to the cloud.Your visitors’ first interactions with your website start with a series of DNS queries. If your DNS performs...

Bluecoat symantec logo3739 150x150

Business Management

Keeping Your Private Data Secure

Across businesses of all sizes, vigilance is key when it comes to protecting your private data. Security breaches are on the rise and if your organization suffers...

Logrhythm logo0126 150x150

Business Management

Surfacing Critical Cyber Threats Through Security Intelligence

In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™...

Vormetric logo1422 150x150

Business Management

Cracking the Confusion: Encryption and Tokenization for Data Centers, Servers, and Applications

Should you encrypt everything? There has never been more options for encrypting data across applications, databases, servers, storage, and the entire datacenter...

Vormetric logo1422 150x150

Business Management

Cracking the Confusion: Encryption and Tokenization for Data Centers, Servers, and Applications

Should you encrypt everything? There has never been more options for encrypting data across applications, databases, servers, storage, and the entire datacenter...

1 2 876 878 880 899 900

Recommended for You

Trump hits partial pause on Huawei ban, but 5G concerns persist

Phil Muncaster reports on China and beyond

FinancialForce profits from PSA investment

Martin Veitch's inside track on today’s tech trends

Future-proofing the Middle East

Keri Allan looks at the latest trends and technologies

Poll

Do you think your smartphone is making you a workaholic?