Your Search returned 106 results from our White Paper Library

Sort By
IDG Connect

Storage Hardware

Lead Generation Case Study

This case study outlines how IDG Connect helped a global IT giant improve the sales of their PCs and Laptops.

Dell EMC & Intel®

Workforce Planning and Management

Faculte a sus empleados mediante el estimulo a la habilitacion...

Los millennials estan cambiando la cara del mundo del trabajo a traves de su conocimiento de las nuevas tecnologias, y la TI tiene problemas para seguirles...

Dell EMC & Intel®

Workforce Planning and Management

Redefinición de la habilitación de la fuerza de trabajo...

Intel y el logotipo de Intel son marcas comerciales de la Corporación Intel o sus filiales en los Estados Unidos o en otros países   Intel Inside®,...


Cloud Computing

Public-Private Hybrid Cloud for Large Enterprises

This white paper explores how Nokia can provide your organisation with a secure hybrid-cloud approach that reduces your total cost of ownership.


Cloud Computing

Security Cloud for Large Enterprises

This white paper discusses Nokia can provide your organisation with end-to-end security and an enterprise private cloud that can reduce your total cost...

Thales eSecurity, Inc.


2017 Global Encryption Trends Study

This Ponemon paper looks at how the use of encryption has evolved over the past 12 years and the impact of this technology on the security posture of organizations....

CA Technologies

Business Process Automation

Cross-Enterprise Workload Automation Helps Reduce Cost and...

This brief intrudes CA’s Workload Automation solutions, highlighting features, benefits, and potential ROI.

Thales eSecurity, Inc.


Addressing Key Provisions of the General Data Protection...

This paper highlights Data encryption and key management strategies to ensure GDPR compliance.


Business Process Automation

Reinventing Retail: 2017 Retail Vision Study

This report outlines the results from a study into the focus, concerns and investment plans of retailers.

F5 Networks


Ten Steps for Combating DDoS in Real Time

This paper outlines 10 recommended practices and tools for repelling distributed denial-of-service attacks and mitigating them when they happen.

Previous 1 3 4 5 10 11

Recommended for You


How a Washington crackdown on Huawei could backfire for everyone

Phil Muncaster reports on China and beyond


5G is over-hyped and expectations need reining in

Dan Swinhoe casts a critical eye on the future


What can we learn from tech initiatives in the Middle East?

Keri Allan looks at the latest trends and technologies

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should the government regulate Artificial Intelligence?