Search Results: 281 Articles Found for White

Header Storage Switzerland Conversational Geek
1) Introduction to Kubernetes (Cluster Containers Orchestration) (White Paper)
Source: Arnaud Nauwynck
Category:Administration
Author: Arnaud Nauwynck
Posting Date: 2019-09-29
Publish Date: 2019-09-29
PDF   White Paper 
 

2) Why Container Management Platforms Are a Top Enterprise Investment Priority (White Paper)
Source: IDC
Category:Administration
Author: Stephen Elliot, VP Management Software and DevOps @ IDC
Posting Date: 2019-09-24
Publish Date: 2019-07-19
PDF   White Paper 
 

3) Microservices and Docker at Scale (White Paper)
Source: Electric Cloud
Category:Administration
Author: Avan Mathur
Posting Date: 2019-07-13
Publish Date: 2019-07-13
PDF   White Paper 
 

4) The Expert’s Guide to Running Containers in Production (White Paper)
Source: Portworx
Category:Administration
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

5) Five Essential Strategies for Successful HPC Clusters, White Paper (White Paper)
Source: Bright Computing
Category:Administration
Author: Douglas Eadline
Posting Date: 2019-05-16
Publish Date: 2019-05-07
PDF   White Paper 
 

6) Application Container Security Guide (White Paper)
Source: NIST
Category:Administration
Posting Date: 2019-02-12
Publish Date: 2019-01-29
PDF   White Paper 
 

7) Best Practices for Container Security (White Paper)
Source: Alert Logic
Category:Administration
Posting Date: 2019-01-15
Publish Date: 2019-01-22
PDF   White Paper 
 

8) Enterprise Container Platform Software Suites, Q4 2018 (White Paper)
Source: Forrester
Category:Administration
Posting Date: 2019-01-15
Publish Date: 2019-01-08
PDF   White Paper 
 

9) Is There A White Box Server in Your Data Center's Future? (White Paper)
Source: Network World
Category:Administration
Posting Date: 2018-10-23
Publish Date: 2018-10-11
PDF   White Paper 
 

10) Cloud Security Spotlight Report (White Paper)
Source: SC Magazine
Category:Cloud
Author: Holger Schulze, Founder LinkedIn Information Security Group
Posting Date: 2019-08-31
Publish Date: 2019-08-31
PDF   White Paper 
 

11) Cloud Security Spotlight Report (White Paper)
Source: SC Magazine
Category:Cloud
Author: Holger Schulze, Founder LinkedIn Information Security Group
Posting Date: 2019-08-31
Publish Date: 2019-08-31
PDF   White Paper 
 

12) Risk Management for Cloud Computing (White Paper)
Source: TechTarget
Category:Cloud
Author: Eric Holmquist, Ed Moyle, Karen Goulart
Posting Date: 2019-08-28
Publish Date: 2019-08-28
PDF   White Paper 
 

13) The Cloud Is Not for Cost Savings, But Cost Management is King (White Paper)
Source: Rhythmic
Category:Cloud
Posting Date: 2019-08-05
Publish Date: 2019-07-01
PDF   White Paper 
 

14) The Complete Guide to Cloud Storage 2019 (White Paper)
Source: TechWorld
Category:Cloud
Posting Date: 2019-08-05
Publish Date: 2019-08-05
PDF   White Paper 
 

15) Making Multi-Cloud Work (White Paper)
Source: ComputerWeekly
Category:Cloud
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

16) Serverless Computing: From Planet Mars to the Cloud (White Paper)
Source: IEEE
Category:Cloud
Author: Jose Luis V  azquez-Poletti, Ignacio Martln Llorente
Posting Date: 2019-07-10
Publish Date: 2019-07-10
PDF   White Paper 
 

17) A Serverless Real-Time Data Analytics Platform for Edge Computing (White Paper)
Source: IEEE
Category:Cloud
Posting Date: 2019-07-10
Publish Date: 2019-07-10
PDF   White Paper 
 

18) Shadow IT: The Great IT Opportunity (White Paper)
Source: LANDESK
Category:Cloud
Posting Date: 2019-06-28
Publish Date: 2019-06-28
PDF   White Paper 
 

19) The Complete Guide to Serverless Computing (White Paper)
Source: TechWorld
Category:Cloud
Posting Date: 2019-06-24
Publish Date: 2019-06-24
PDF   White Paper 
 

20) The Security Implications of Moving to the Cloud (White Paper)
Source: IBM Security
Category:Cloud
Author: David A. Cass
Posting Date: 2019-06-18
Publish Date: 2018-06-28
PDF   White Paper 
 

21) 3 Key Risks You Need to Plan for When Migrating to The Cloud, White Paper (White Paper)
Source: Rhythmic
Category:Cloud
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

22) Top Threats to Cloud Computing, White Paper (White Paper)
Source: Cloud Security Alliance
Category:Cloud
Posting Date: 2019-06-12
Publish Date: 2019-05-24
PDF   White Paper 
 

23) NIST Cybersecurity Framework (White Paper)
Source: AWS
Category:Cloud
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

24) Preparing for the Cloud: Understanding the Infrastructure Impacts, White Paper (White Paper)
Source: TechRepublic
Category:Cloud
Posting Date: 2019-06-01
Publish Date: 2019-06-14
PDF   White Paper 
 

25) To Maximize the Cloud, Focus on the Network, White Paper (White Paper)
Source: Equinix
Category:Cloud
Posting Date: 2019-05-16
Publish Date: 2019-05-10
PDF   White Paper 
 

26) Exposed: Cyberattacks on Cloud Honeypots (White Paper)
Source: Sophos
Category:Cloud
Posting Date: 2019-04-10
Publish Date: 2019-04-09
PDF   White Paper 
 

27) 3 Common Multi-Cloud Challenges - and How to Solve Them (White Paper)
Source: BT
Category:Cloud
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

28) Top 10 Public Cloud Security Recommendations (White Paper)
Source: Palo Alto Networks
Category:Cloud
Posting Date: 2019-01-15
Publish Date: 2019-01-18
PDF   White Paper 
 

29) Serverless Computing: One Step Forward, Two Steps Back (White Paper)
Source: UC Berkeley
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-20
PDF   White Paper 
 

30) Strategically Achieving Multicloud Success (White Paper)
Source: F5/IBM
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

31) Top 10 Public Cloud Security Recommendations (White Paper)
Source: Palo Alto Networks
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

32) Key Considerations When Migrating Workloads to the Public Cloud (White Paper)
Source: Insight
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-11
PDF   White Paper 
 

33) Closing the Cloud Security Business Gap (White Paper)
Source: SalesForce
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-11-23
PDF   White Paper 
 

34) An Introduction To the New IT Approach Called Hybrid IT (White Paper)
Source: WEI
Category:Cloud
Posting Date: 2018-11-02
Publish Date: 2018-11-14
PDF   White Paper 
 

35) Containers At-Risk: A Review of 21,000 Cloud Environments (White Paper)
Source: Lacework, Inc.
Category:Cloud
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

36) Interview of Everything: Cisco CEO Chambers on White Boxes, SDN, Leadership and the Cloud (White Paper)
Source: Network World
Category:Cloud
Posting Date: 2015-05-16
Publish Date: 2015-05-05
PDF   White Paper 
 

37) Know what to expect from the California Consumer Privacy Act 2018 (White Paper)
Source: Micro Focus
Category:Compliance
Posting Date: 2019-10-15
Publish Date: 2019-10-15
PDF   White Paper 
 

38) Architecting for HIPAA Security and Compliance on Amazon Web Services (White Paper)
Source: Amazon Web Services, Inc.
Category:Compliance
Posting Date: 2019-08-13
Publish Date: 2019-07-12
PDF   White Paper 
 

39) Examining the Data Trinity: Governance, Security and Privacy (White Paper)
Source: SandHill
Category:Compliance
Posting Date: 2019-06-20
Publish Date: 2019-06-20
PDF   White Paper 
 

40) The CIO's Guide to HIPAA Compliant Text Messaging, White Paper (White Paper)
Source: ecfirst
Category:Compliance
Posting Date: 2019-06-01
Publish Date: 2019-06-11
PDF   White Paper 
 

41) Guide to the General Data Protection Regulation, PDF 295 Pages (White Paper)
Source: Information Commissioners Office
Category:Compliance
Posting Date: 2019-04-10
Publish Date: 2019-04-08
PDF   White Paper 
 

42) Maximizing the Value of Your Data Privacy Investments (White Paper)
Source: Cisco Systems
Category:Compliance
Posting Date: 2019-02-12
Publish Date: 2019-01-27
PDF   White Paper 
 

43) The Complete Guide to GDPR (White Paper)
Source: TechWorld
Category:Compliance
Posting Date: 2019-01-15
Publish Date: 2019-01-17
PDF   White Paper 
 

44) GDPR for Security Practitioners, White Paper (White Paper)
Source: One CISO’s Opinion
Category:Compliance
Posting Date: 2018-10-23
Publish Date: 2018-09-30
PDF   White Paper 
 

45) The Rise of White-Box Storage (White Paper)
Source: NetworkComputing
Category:Compliance
Posting Date: 2014-09-19
Publish Date: 2014-08-27
PDF   White Paper 
 

46) The SD-WAN Implementation Handbook (White Paper)
Source: Sprint
Category:Connectivity
Posting Date: 2019-10-15
Publish Date: 2019-10-15
PDF   White Paper 
 

47) HopSphere Radius Security (White Paper)
Source: HOPZERO
Category:Connectivity
Author: Bill Alderson, CTO & Ben Haley SVP Product @ HOPZERO
Posting Date: 2019-08-30
Publish Date: 2019-02-25
PDF   White Paper 
 

48) SD-WAN as a Service: The Rise of Managed SD-WAN (White Paper)
Source: Nemertes
Category:Connectivity
Author: John Burke - CIO & Principal Research Analyst at Nemertes Resear
Posting Date: 2019-08-21
Publish Date: 2019-08-21
PDF   White Paper 
 

49) Is a SD-WAN Network as Secure as My MPLS Network? (White Paper)
Source: British Telecommunications
Category:Connectivity
Author: Keith Langridge
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

50) The Essential Guide to Workplace Modernization Through Next-Generation Unified Communications, White (White Paper)
Source: Cisco Sytems
Category:Connectivity
Posting Date: 2019-05-16
Publish Date: 2019-05-13
PDF   White Paper 
 

51) Network Operating System Advantages Extend to White Box Switching (White Paper)
Source: Search Networking
Category:Connectivity
Posting Date: 2019-03-11
Publish Date: 2019-03-04
PDF   White Paper 
 

52) OM5 and OM4+ Fiber (White Paper)
Source: Commscope
Category:Connectivity
Posting Date: 2018-11-02
Publish Date: 2018-11-16
PDF   White Paper 
 

53) 10 Things Your Next Firewall Must Do (White Paper)
Source: Palo Alto Networks
Category:Connectivity
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

54) Current State Of SD-WAN Implementation and Deployment (White Paper)
Source: Talari Networks
Category:Connectivity
Posting Date: 2018-10-23
Publish Date: 2018-10-08
PDF   White Paper 
 

55) The Future of Networking: It's In a White Box (White Paper)
Source: Network World
Category:Connectivity
Posting Date: 2017-03-11
Publish Date: 2017-03-20
PDF   White Paper 
 

56) The Complete Guide to :Machine Learning In the Enterprise (White Paper)
Source: TechRepublic
Category:Data
Author: IDG
Posting Date: 2019-09-24
Publish Date: 2017-11-24
PDF   White Paper 
 

57) AI Transforming the Enterprise - 8 Key AI Adoption Trends (White Paper)
Source: KPMG
Category:Data
Posting Date: 2019-09-13
Publish Date: 2019-09-13
PDF   White Paper 
 

58) Advancing Autonomous Operations Technologies for NASA Missions (White Paper)
Source: NASA
Category:Data
Author: Craig A. Cruzen & Jerry T. Thompson of NASA Flight Center
Posting Date: 2019-09-01
Publish Date: 2019-09-01
PDF   White Paper 
 

59) Technology For Civic Data Integration (White Paper)
Source: MetroLab Network
Category:Data
Posting Date: 2019-08-25
Publish Date: 2019-08-25
PDF   White Paper 
 

60) AI at the Edge: A GigaOm Research Byte (White Paper)
Source: GIGAOM
Category:Data
Author: Byron Reese
Posting Date: 2019-08-22
Publish Date: 2019-08-22
PDF   White Paper 
 

61) Data Protection Best Practices (White Paper)
Source: Industrial Internet Consortium
Category:Data
Author: Bassam Zarkout (IGnPower), Apurva Mohan (Schlumberger), Niheer P
Posting Date: 2019-07-24
Publish Date: 2019-07-22
PDF   White Paper 
 

62) A Scorecard Approach to Improving Data Quality (White Paper)
Source: PricewaterhouseCoopers LLP
Category:Data
Author: Phil Nousak, Rob Phelps
Posting Date: 2019-07-17
Publish Date: 2001-07-17
PDF   White Paper 
 

63) Using the k-Nearest Neighbors Algorithm (White Paper)
Source: Promethean Data Solutions
Category:Data
Author: Jim Adams
Posting Date: 2019-07-07
Publish Date: 2019-05-01
PDF   White Paper 
 

64) Managing Cross-Platform Database Environments (White Paper)
Source: Quest Software
Category:Data
Author: Jason Hall, Pini Dibask
Posting Date: 2019-07-03
Publish Date: 2019-07-03
PDF   White Paper 
 

65) Practical Insights on AI (White Paper)
Source: Infosys
Category:Data
Author: Rohit Mohindru, Prabhat Kohli
Posting Date: 2019-07-02
Publish Date: 2019-07-02
PDF   White Paper 
 

66) Data Governance, Data Quality and Artificial Intelligence in the Supply Chain, White Paper (White Paper)
Source: North Carolina State University
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-05-29
PDF   White Paper 
 

67) The Ultimate Guide to Embedded Analytics, White Paper (White Paper)
Source: Qlik
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

68) DataOps: An Authoritative Guide, White Paper (White Paper)
Source: StreamSets
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

69) Self-Service Data Prep: 10 Questions to Ask Yourself, White Paper (White Paper)
Source: Paxata
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

70) The Practical Executive's Guide to Data Loss Prevention, White Paper, (White Paper)
Source: ForcePoint
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

71) GE Aviation: From Data Silos To Self-Service, White Paper (White Paper)
Source: Dataiku
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-13
PDF   White Paper 
 

72) Harnessing Insights in Unstructured Data Through NLP And ML, White Paper (White Paper)
Source: EY
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-14
PDF   White Paper 
 

73) The Complete Guide to Machine Learning in the Enterprise, White Paper (White Paper)
Source: TechWorld
Category:Data
Posting Date: 2019-05-16
Publish Date: 2019-04-25
PDF   White Paper 
 

74) Building Blocks Of A Modern Analytics Platform, White Paper (White Paper)
Source: Tableau Software
Category:Data
Posting Date: 2019-04-10
Publish Date: 2019-04-12
PDF   White Paper 
 

75) Top Ten Big Data Trends, White Paper (White Paper)
Source: Tableau Software
Category:Data
Posting Date: 2019-04-10
Publish Date: 2019-04-12
PDF   White Paper 
 

76) Moving Data to the Cloud - Best Practices, White Paper (White Paper)
Source: Virtual Instruments
Category:Data
Posting Date: 2019-01-15
Publish Date: 2019-01-13
PDF   White Paper 
 

77) The Complete Guide To: Data Science (White Paper)
Source: TechWorld
Category:Data
Posting Date: 2018-12-24
Publish Date: 2018-12-03
PDF   White Paper 
 

78) Do You Really Need Online Data Backups? (White Paper)
Source: Enterprise Technology Services
Category:Data
Posting Date: 2018-10-23
Publish Date: 2018-10-24
PDF   White Paper 
 

79) Archiving vs. Backup - What's the Difference? (White Paper)
Source: solarwinds
Category:Data
Posting Date: 2018-10-23
Publish Date: 2018-10-08
PDF   White Paper 
 

80) The DevOps Roadmap for Security (White Paper)
Source: Signal Sciences
Category:DevOps
Author: James Wickett, Author
Posting Date: 2019-10-01
Publish Date: 2018-10-01
PDF   White Paper 
 

81) The Complete Guide to DevOps (White Paper)
Source: TechRepublic
Category:DevOps
Author: IDG
Posting Date: 2019-09-30
Publish Date: 2017-12-30
PDF   White Paper 
 

82) DevOps Forum Papers (Links to 19 DevOps White Papers) (White Paper)
Source: IT Revolution
Category:DevOps
Author: Gen Kin & Others
Posting Date: 2019-08-14
Publish Date: 2019-08-14
PDF   White Paper 
 

83) Agile Development for Application Security Managers (White Paper)
Source: Quotium
Category:DevOps
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

84) Automate Cloud & DevOps Initiatives Across All Phases (White Paper)
Source: BMC
Category:DevOps
Posting Date: 2019-06-26
Publish Date: 2019-06-26
PDF   White Paper 
 

85) How To Use DevOps, Agile To Drive Digital Transformation (White Paper)
Source: Pivotal
Category:DevOps
Author: Michael Cot
Posting Date: 2019-06-18
Publish Date: 2019-06-20
PDF   White Paper 
 

86) Avoid Silos by Shifting Left in a DevOps World (White Paper)
Source: Micro Focus
Category:DevOps
Posting Date: 2019-04-10
Publish Date: 2019-04-05
PDF   White Paper 
 

87) Agile Operations and the Three Ways (White Paper)
Source: CA Technologies
Category:DevOps
Posting Date: 2019-04-10
Publish Date: 2019-04-05
PDF   White Paper 
 

88) Why DevOps Matters, White Paper (White Paper)
Source: Splunk
Category:DevOps
Posting Date: 2019-04-10
Publish Date: 2019-04-18
PDF   White Paper 
 

89) The Complete Guide to: DevOps (White Paper)
Source: TechWorld
Category:DevOps
Posting Date: 2019-03-11
Publish Date: 2019-03-12
PDF   White Paper 
 

90) DevOps Done Right (White Paper) (White Paper)
Source: New Relic
Category:DevOps
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

91) Top 10 Reasons Why Employees Quit Their Job (White Paper)
Source: New Hampshire School Administrat
Category:Management
Author: Susan M. Heathfield, Human Resources Expert
Posting Date: 2019-09-05
Publish Date: 2015-08-22
PDF   White Paper 
 

92) The CIO's IT Transformation Survival Guide (White Paper)
Source: Rackspace
Category:Management
Author: Foreword by Ryan Neading, CIO @ Rackspace
Posting Date: 2019-09-05
Publish Date: 2019-09-05
PDF   White Paper 
 

93) IT Asset Management: Approach, Architecture, and Security Characteristics (White Paper)
Source: NIST
Category:Management
Author: National Cybersecurity Center of Excellence
Posting Date: 2019-08-15
Publish Date: 2015-10-15
PDF   White Paper 
 

94) CIO Leadership - Gartner Insights on How Leaders Innovate for Digital Success (White Paper)
Source: Gartner
Category:Management
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

95) Tech Certification Pay (White Paper)
Source: Foote Partners LLC
Category:Management
Author: David Foote
Posting Date: 2019-06-20
Publish Date: 2019-06-01
PDF   White Paper 
 

96) Thinking Architecturally Lead Technical Change Within Your Engineering Team, White Paper (White Paper)
Source: Pivotal
Category:Management
Author: Nathaniel Schutta
Posting Date: 2019-06-20
Publish Date: 2019-06-20
PDF   White Paper 
 

97) Deep Learning for Business Leaders, White Paper (White Paper)
Source: H2O.ai
Category:Management
Posting Date: 2019-06-12
Publish Date: 2019-05-18
PDF   White Paper 
 

98) The Real Cost of Recruitment Fraud, White Paper (White Paper)
Source: Crowe
Category:Management
Posting Date: 2019-06-01
Publish Date: 2019-06-16
PDF   White Paper 
 

99) The 21 Indispensable Qualities of a Leader, White Paper (White Paper)
Source: Purdue University
Category:Management
Posting Date: 2019-05-16
Publish Date: 2019-04-23
PDF   White Paper 
 

100) 4 Characteristics of a Modern Incident Response Plan, White Paper (White Paper)
Source: PagerDuty
Category:Management
Posting Date: 2019-04-10
Publish Date: 2019-04-12
PDF   White Paper 
 

101) The Complete Guide to the Biggest Tech Trends in 2019 (White Paper)
Source: TechWorld
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-02-25
PDF   White Paper 
 

102) The Executive's Practical Guide to Thriving In the Face of Evolving Cyber Risks (White Paper)
Source: Kip Boyle
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-02-26
PDF   White Paper 
 

103) How Continuous Monitoring is Revolutionizing Risk Management (White Paper)
Source: BitSight Technologies
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-03-18
PDF   White Paper 
 

104) IT Predictions and Anti-Predictions for 2019: Networking, Security, Cloud Communications (White Paper)
Source: Masergy
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-03-19
PDF   White Paper 
 

105) 2018 Cost of a Data Breach Study (White Paper)
Source: IBM, Ponemon Institute LLC
Category:Management
Posting Date: 2019-01-15
Publish Date: 2018-12-22
PDF   White Paper 
 

106) How To Execute on Strategy: Getting Great Ideas from the Whiteboard to the Boardroom (White Paper)
Source: ZDnet
Category:Management
Posting Date: 2017-12-24
Publish Date: 2017-12-20
PDF   White Paper 
 

107) Ethical Hackers: How Hiring White Hats Can Help Defend Your Organization Against the Bad Guys (White Paper)
Source: TechRepublic
Category:Management
Posting Date: 2016-07-21
Publish Date: 2016-06-20
PDF   White Paper 
 

108) Ready Your Infrastructure for the Always-On World (White Paper)
Source: Stratus Technologies
Category:Operations
Posting Date: 2019-10-16
Publish Date: 2019-10-16
PDF   White Paper 
 

109) Top 5 Log Sources You Should Be Ingesting but Probably Aren’t (White Paper)
Source: ReliaQuest
Category:Operations
Author: Joe Partlow, CTO @ ReliaQuest
Posting Date: 2019-10-15
Publish Date: 2019-10-15
PDF   White Paper 
 

110) Best Practices for Managing 3rd Party Vendor Remote Access (White Paper)
Source: SecureLink
Category:Operations
Posting Date: 2019-09-23
Publish Date: 2014-09-23
PDF   White Paper 
 

111) 20 Point Checklist for Vetting a Managed Hosting Provider (White Paper)
Source: LIQUID WEB
Category:Operations
Posting Date: 2019-08-29
Publish Date: 2019-08-29
PDF   White Paper 
 

112) Here’s Why You Should Have a Disaster Recovery Plan (White Paper)
Source: ENTERPRISE TECHNOLOGY SERVICES
Category:Operations
Author: Jim Siragusa
Posting Date: 2019-08-15
Publish Date: 2019-08-15
PDF   White Paper 
 

113) Power Monitoring and Metering: (White Paper)
Source: RARITAN
Category:Operations
Posting Date: 2019-08-14
Publish Date: 2019-08-14
PDF   White Paper 
 

114) Guidance on What to Do with an Older UPS (White Paper)
Source: Schneider Electric
Category:Operations
Author: John Gray, Patrick Donovan
Posting Date: 2019-08-12
Publish Date: 2015-08-12
PDF   White Paper 
 

115) A Framework for How to Modernize Data Center Facility Infrastructure (White Paper)
Source: Schneider Electric
Category:Operations
Author: Patrick Donovan, Wendy Torell
Posting Date: 2019-07-14
Publish Date: 2019-07-14
PDF   White Paper 
 

116) The Complete Guide to OpenStack (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2019-07-08
Publish Date: 2019-05-30
PDF   White Paper 
 

117) The Complete Guide to Online Backup (White Paper)
Source: SherWeb
Category:Operations
Posting Date: 2019-06-30
Publish Date: 2019-06-30
PDF   White Paper 
 

118) 6 Steps to Successful Capacity Management (White Paper)
Source: BMC
Category:Operations
Posting Date: 2019-06-26
Publish Date: 2019-06-26
PDF   White Paper 
 

119) The Drivers and Benefits of Edge Computing (White Paper)
Source: Schneider Electric
Category:Operations
Author: Steven Carlini
Posting Date: 2019-06-24
Publish Date: 2019-06-24
PDF   White Paper 
 

120) Solving Edge Computing Infrastructure Challenges (White Paper)
Source: Schneider Electric
Category:Operations
Author: Patrick Donovan, Wendy Torell
Posting Date: 2019-06-24
Publish Date: 2019-06-24
PDF   White Paper 
 

121) IT Asset Management (White Paper)
Source: ServiceNow
Category:Operations
Posting Date: 2019-06-21
Publish Date: 2019-06-21
PDF   White Paper 
 

122) Best Practices for Implementing Software Asset Management, White Paper (White Paper)
Source: Cherwell
Category:Operations
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

123) Data Governance, Data Quality and Artificial Intelligence In the Supply Chain, White Paper (White Paper)
Source: North Carolina State University
Category:Operations
Author: Rob Handfield, Balaji Soundararajan, Joseph Yacura, IBM
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

124) The Complete Guide To IT Monitoring (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

125) The Power of Predictive IT, White Paper (White Paper)
Source: Harvard Business Review
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

126) Get Better, Faster, Cheaper IT Service Through AI Capabilities, White Paper (White Paper)
Source: servicenow
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

127) How a Healthy CMDB Helps You to Deliver Great Business Service Quality, White Paper (White Paper)
Source: servicenow
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

128) Achieving Maximum Uptime Isn't Glamorous: Testing, Planning, Security Help Ensure Ops Success, White (White Paper)
Source: Rhythmic
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

129) Top 6 Cloud Backup Benefits, White Paper (White Paper)
Source: Veeam
Category:Operations
Posting Date: 2019-06-01
Publish Date: 2019-05-29
PDF   White Paper 
 

130) 20 Point Checklist for Vetting Hosting Options, White Paper, (White Paper)
Source: Liquid Web
Category:Operations
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

131) 4 Business Continuity Planning Essentials, White Paper (White Paper)
Source: Datto
Category:Operations
Posting Date: 2019-05-16
Publish Date: 2019-05-12
PDF   White Paper 
 

132) Threats to Manufacturing Environments in the Era of Industry 4.0, White Paper (White Paper)
Source: Trend Micro
Category:Operations
Posting Date: 2019-04-10
Publish Date: 2019-04-17
PDF   White Paper 
 

133) The Do's and Don'ts of Establishing SLAs (White Paper)
Source: ConnectWise
Category:Operations
Posting Date: 2019-03-11
Publish Date: 2019-03-13
PDF   White Paper 
 

134) Backup vs. Business Continuity (White Paper)
Source: Datto
Category:Operations
Posting Date: 2019-03-11
Publish Date: 2019-03-13
PDF   White Paper 
 

135) Relationship Between Virtualization & HCI, White Paper (White Paper)
Source: Hitachi
Category:Operations
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

136) Moving your Infrastructure to the Cloud (White Paper)
Source: Diversity Limited
Category:Operations
Posting Date: 2019-01-15
Publish Date: 2019-01-13
PDF   White Paper 
 

137) The Complete Guide to Hyperconverged Infrastructure (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2019-01-15
Publish Date: 2019-01-09
PDF   White Paper 
 

138) The Complete Guide To: Hyperconverged Infrastructure (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2018-12-24
Publish Date: 2018-12-17
PDF   White Paper 
 

139) Data Center Power Distribution and Capacity Planning (White Paper)
Source: Raritan
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-11-22
PDF   White Paper 
 

140) Bridging the Divide between Software Developers and Operators using Logs (White Paper)
Source: Queen’s University, Canada
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-11-17
PDF   White Paper 
 

141) A 6-Step Approach For ITSM And ITOM To Work Better Together (White Paper)
Source: servicenow
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-11-08
PDF   White Paper 
 

142) Infrastructure Monitoring Software: Can You Afford It? (White Paper)
Source: NetApp
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-10-31
PDF   White Paper 
 

143) Hyperconverged Infrastructure as a Catalyst for Change (White Paper)
Source: Freeform Dynamics/VMware
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-10-31
PDF   White Paper 
 

144) Software-Defined Data Center - Get The Most Out of Today's Infrastructure (White Paper)
Source: IBM
Category:Operations
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

145) Edge Data Centers (White Paper)
Source: TIA
Category:Operations
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

146) With New Dynamic Capabilities, Will Whitelisting Finally Catch on? (White Paper)
Source: IT World
Category:Potpourri
Posting Date: 2017-06-12
Publish Date: 2017-06-19
PDF   White Paper 
 

147) Is There a White-Box Switch In Your Future? (White Paper)
Source: Network World
Category:Potpourri
Posting Date: 2015-10-23
Publish Date: 2015-10-12
PDF   White Paper 
 

148) World's First White Lasers Demonstrated (White Paper)
Source: Science Daily
Category:Potpourri
Posting Date: 2015-08-01
Publish Date: 2015-07-29
PDF   White Paper 
 

149) Inside White-Box Switches (White Paper)
Source: NetworkComputing
Category:Potpourri
Posting Date: 2014-08-01
Publish Date: 2014-08-13
PDF   White Paper 
 

150) CIS Controls Version 7 (White Paper)
Source: Center for Internet Security
Category:Security
Posting Date: 2019-10-20
Publish Date: 2019-10-20
PDF   White Paper 
 

151) Securing the Digital Business (White Paper)
Source: RSA
Category:Security
Author: Gartner, Inc.
Posting Date: 2019-10-09
Publish Date: 2019-10-09
PDF   White Paper 
 

152) There is No Peacetime from Advanced DDoS Attacks (White Paper)
Source: NetScout Systems
Category:Security
Posting Date: 2019-10-09
Publish Date: 2018-09-18
PDF   White Paper 
 

153) The Fundamental Guide to Building a Better Security Operation Center (White Paper)
Source: Cisco Systems
Category:Security
Posting Date: 2019-10-07
Publish Date: 2015-09-10
PDF   White Paper 
 

154) The US Department of Homeland Security's Office 365 Security Best Practices (White Paper)
Source: ManageEngine
Category:Security
Posting Date: 2019-10-03
Publish Date: 2019-10-03
PDF   White Paper 
 

155) Guide to Cybersecurity (White Paper)
Source: Law Society of Scotland
Category:Security
Posting Date: 2019-10-03
Publish Date: 2019-10-03
PDF   White Paper 
 

156) SIEM +Threat Intelligence: Quickly Identify the Threats that Matter to You (White Paper)
Source: ThreatConnect
Category:Security
Posting Date: 2019-10-01
Publish Date: 2019-10-01
PDF   White Paper 
 

157) Market Guide for User and Entity Behavior Analytics (White Paper)
Source: Gartner
Category:Security
Author: Gorka Sadowski, Avivah Litan, Toby Bussa, Tricia Phillips
Posting Date: 2019-09-27
Publish Date: 2018-04-23
PDF   White Paper 
 

158) Streamlining Threat Detection Through User Behavior Analytics (White Paper)
Source: ADAudit Plus
Category:Security
Posting Date: 2019-09-24
Publish Date: 2019-09-24
PDF   White Paper 
 

159) Our Own Worst Enemy: Tackling the Social Engineering Problem (White Paper)
Source: RSA Conference
Category:Security
Author: Ira Winkler, Lance Hayden, Britta Glade, Dr Hugh Thompson
Posting Date: 2019-09-16
Publish Date: 2018-12-18
PDF   White Paper 
 

160) Your First IT Security Job: Three Things that Might Surprise You (White Paper)
Source: Hewlett Packard Enterprise
Category:Security
Author: Josh Fruhlinger, Contributing Writer
Posting Date: 2019-09-16
Publish Date: 2019-07-19
PDF   White Paper 
 

161) Enterprise Endpoint Protection Buyers Guide (White Paper)
Source: Malwarebytes
Category:Security
Posting Date: 2019-09-13
Publish Date: 2019-09-13
PDF   White Paper 
 

162) Everything You Always Wanted to Know About Security at the Edge But Were Afraid to Ask (White Paper)
Source: Akamai
Category:Security
Posting Date: 2019-09-13
Publish Date: 2019-05-13
PDF   White Paper 
 

163) How To Develop the Best Plan of Attack™ (White Paper)
Source: Endgame
Category:Security
Author: Mark Dufresne, VP of Research @ Endgame
Posting Date: 2019-09-04
Publish Date: 2019-09-04
PDF   White Paper 
 

164) Peer-to-Peer Financial Protection based on Blockchain Technology (White Paper)
Source: Sagittae
Category:Security
Author: Robert Volkert, CEO & Founder @ Sagittae
Posting Date: 2019-09-02
Publish Date: 2019-09-27
PDF   White Paper 
 

165) Cognitions of a Cybercriminal (White Paper)
Source: Carbon Black
Category:Security
Author: Tom Kellermann Cybersecurity Officer@ Carbon Black
Posting Date: 2019-08-30
Publish Date: 2019-07-31
PDF   White Paper 
 

166) 8 Types of Digital Risk and How to Manage Them (White Paper)
Source: RSA
Category:Security
Posting Date: 2019-08-28
Publish Date: 2019-08-28
PDF   White Paper 
 

167) Improving the Effectiveness of the Security Operations Center (White Paper)
Source: Ponemon Institute
Category:Security
Author: Devo Technology
Posting Date: 2019-08-26
Publish Date: 2019-06-12
PDF   White Paper 
 

168) 3 Ways to Fight Fraud (White Paper)
Source: Vantiv
Category:Security
Posting Date: 2019-08-24
Publish Date: 2016-08-24
PDF   White Paper 
 

169) Countering Escalating Cyberthreats with a New Security Architecture (White Paper)
Source: Gigamon
Category:Security
Posting Date: 2019-08-21
Publish Date: 2019-08-21
PDF   White Paper 
 

170) Framework for Improving Critical Infrastructure Cybersecurity (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-08-20
Publish Date: 2018-04-16
PDF   White Paper 
 

171) The Sharing Economy – The Seven Challenges of Online Identity Verification (White Paper)
Source: EVIDENT
Category:Security
Posting Date: 2019-08-19
Publish Date: 2019-08-19
PDF   White Paper 
 

172) The Threat Intelligence Handbook (White Paper)
Source: WebRoot
Category:Security
Author: Gartner
Posting Date: 2019-08-15
Publish Date: 2019-08-15
PDF   White Paper 
 

173) Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security (White Paper)
Source: CrowdStrike
Category:Security
Posting Date: 2019-08-13
Publish Date: 2017-08-16
PDF   White Paper 
 

174) Identity Powered Security (White Paper)
Source: APORETO
Category:Security
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

175) What Every Security Leader Needs to Know Handbook (White Paper)
Source: HackerOne
Category:Security
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

176) Manage Risk By Protecting Apps, Data and Usage (White Paper)
Source: Citrixx
Category:Security
Posting Date: 2019-08-04
Publish Date: 2015-08-04
PDF   White Paper 
 

177) SIEM + THREAT INTELLIGENCE: Quickly Identify the Threats that Matter to You (White Paper)
Source: ThreatConnect
Category:Security
Posting Date: 2019-07-31
Publish Date: 2019-07-31
PDF   White Paper 
 

178) Buyers Guide: Identity, Access and API Management Solutions (White Paper)
Source: CA Technologies
Category:Security
Author: Steve Firestone
Posting Date: 2019-07-12
Publish Date: 2019-07-12
PDF   White Paper 
 

179) APAC Guide Yo Plugging Endpoint Security Gaps (White Paper)
Source: ComputerWeekly
Category:Security
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

180) Data-at-rest Encryption (White Paper)
Source: DATACORE SOFTWARE
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

181) Why, When & How to Implement Employee Monitoring (White Paper)
Source: Interfocus
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

182) Zero Trust Security: A New Paradigm for a Changing World (White Paper)
Source: CENTRIFY
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

183) Law Firm CyberSecurity (White Paper)
Source: Discovery Computers and Forensic
Category:Security
Author: Rod Mac Kenzie
Posting Date: 2019-07-08
Publish Date: 2019-07-08
PDF   White Paper 
 

184) Ransomware To Pay Or Not To Pay (White Paper)
Source: JLT Specialty Limited
Category:Security
Author: Sarah Stephens
Posting Date: 2019-07-06
Publish Date: 2019-02-28
PDF   White Paper 
 

185) Cyber Security Report (White Paper)
Source: CSC
Category:Security
Author: Ken Linscott, Quinn Taggart, Letitia Thian
Posting Date: 2019-07-05
Publish Date: 2019-06-26
PDF   White Paper 
 

186) Ransomware: to Pay Or Not to Pay (White Paper)
Source: JLT Specialty Limited
Category:Security
Author: Sarah Stephens
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

187) 7 Experts on Threat and Vulnerability Management, White Paper (White Paper)
Source: RiskSense, Inc
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-16
PDF   White Paper 
 

188) Medical Device Encryption & Security, White Paper (White Paper)
Source: NetLib Security
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-08
PDF   White Paper 
 

189) The Growing Consequences of Security Breaches, White Paper (White Paper)
Source: Rhythmic
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

190) Beginners Guide to Encryption and Key Management, White Paper (White Paper)
Source: NetLib Security
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

191) NIST Recommendation for Key Management: Part 2: Best Practices, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

192) NIST Recommendation for Key Management Part 1: General, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-26
PDF   White Paper 
 

193) NIST Recommendation for Key Management Part 3: Application-Specific, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

194) Choosing the Right Security Orchestration, Automation, and Response Platform, White Paper (White Paper)
Source: Splunk
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-31
PDF   White Paper 
 

195) Evaluating Identity Verification Solutions, White Paper (White Paper)
Source: onfido
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-01
PDF   White Paper 
 

196) Learning to Rank Strings Output for Speedier Malware Analysis, Blog (White Paper)
Source: Fireeye
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-02
PDF   White Paper 
 

197) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 1, What Is Securit (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-08
PDF   White Paper 
 

198) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 2 - Usability and (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

199) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 3 - Protocols, Whi (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

200) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 4 - Access Control (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

201) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 6 - Distributed Sy (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

202) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 5 - Cryptography, (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

203) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 7 - Economics, Whi (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

204) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 8 - Multilevel Sec (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

205) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 9 - Multilateral S (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

206) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 10 - Banking and B (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

207) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 11 - Physical Secu (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

208) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 12 - Monitoring an (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

209) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 13 - Nuclear Comma (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

210) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 14 - Security Prin (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

211) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 15 - Biometrics, W (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

212) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 16 - Physical Tamp (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

213) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 17 - Emission Secu (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

214) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 18 - API Attacks, (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

215) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 19 - Electronic an (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

216) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 20 - Telecom Syste (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

217) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 21, Network Attack (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

218) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 22 - Copyright and (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

219) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 23 - The Bleeding (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

220) Security Engineering: A Guide to Building Dependable Distributed Systems, 3 Chapter 24 - Terror, Jus (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

221) The Smarter SMB's Guide to Ransomware, White Paper (White Paper)
Source: Barracuda
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

222) A Beginner's Guide To Ransomware, White Paper (White Paper)
Source: Unitrends
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

223) The Comprehensive Guide to Ransomware Protection, White Paper (White Paper)
Source: Invenio IT
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

224) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 25 - Managing the (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

225) Defending Against Crypto-Ransomware, White Paper (White Paper)
Source: netwrix
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-11
PDF   White Paper 
 

226) Fighting ATO Attacks, White Paper (White Paper)
Source: riskified
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

227) Understanding DNS: Essential Knowledge for All IT Professionals, White Paper (White Paper)
Source: AppliedTrust
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-13
PDF   White Paper 
 

228) Encryption: A Guide for Business Leaders. White Paper (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-04-29
PDF   White Paper 
 

229) Security as a Service Has Arrived, White Paper (White Paper)
Source: Armour
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-01
PDF   White Paper 
 

230) Authentication for Your Ever-Changing Needs, White Paper (White Paper)
Source: Micro Focus
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-01
PDF   White Paper 
 

231) 2019 Webroot Threat Report, White Paper (White Paper)
Source: WebRoot
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-03
PDF   White Paper 
 

232) Explore Why Identity Proofing is Key to Avoiding Identity Theft, White Paper (White Paper)
Source: Evident
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-06
PDF   White Paper 
 

233) Why Security Awareness Training is an Essential Part of Your Security Strategy (White Paper)
Source: WebRoot
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-03-25
PDF   White Paper 
 

234) A Guide To Assessing Security Maturity, White Paper (White Paper)
Source: InformationWeek
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-04-09
PDF   White Paper 
 

235) Becoming the Security Team Your Business Needs, White Paper (White Paper)
Source: BAE Systems
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-04-30
PDF   White Paper 
 

236) Blockchain White Paper (White Paper)
Source: National Archives
Category:Security
Posting Date: 2019-03-11
Publish Date: 2019-03-05
PDF   White Paper 
 

237) Distributed Denial Of Service Threats: Risks, Mitigation, and Best Practices (White Paper)
Source: Cisco Systems
Category:Security
Posting Date: 2019-03-11
Publish Date: 2019-03-21
PDF   White Paper 
 

238) Security Orchestration and Incident Response (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2019-02-12
Publish Date: 2019-02-15
PDF   White Paper 
 

239) Investigation or Exasperation? The State of Security Operations (White Paper)
Source: IDC
Category:Security
Posting Date: 2019-02-12
Publish Date: 2019-02-04
PDF   White Paper 
 

240) 15 Skills You Need to Be a Whitehat Hacker And Make Up to $145K Per Year (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-12-15
PDF   White Paper 
 

241) The State Of Email Security (White Paper)
Source: Mimecast Limited
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

242) Blockchain Applications for Identity Verification (White Paper)
Source: Evident
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-11-28
PDF   White Paper 
 

243) Fundamental Concepts of Cyber Resilience: Introduction and Overview (White Paper)
Source: US Army R&D Center
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-11-26
PDF   White Paper 
 

244) Would You Know if You've Been Breached? (White Paper)
Source: thycotic
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-18
PDF   White Paper 
 

245) AI and Cybersecurity for Dummies (White Paper)
Source: IBM
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-16
PDF   White Paper 
 

246) Zero Trust Security For Dummies (White Paper)
Source: Centrify
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-09
PDF   White Paper 
 

247) Gaining Ground On The Cyber Attacker (White Paper)
Source: Accenture
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-04
PDF   White Paper 
 

248) Internet Security Threat Report (White Paper)
Source: Symantec
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

249) The Changing Face of Cyber Attacks (White Paper)
Source: Neustar, Inc.
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

250) The Five News Headlines You Don't Want to Be About YOUR Organization (White Paper)
Source: Juniper Networks
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

251) Collaborating for Change in Cybersecurity (White Paper)
Source: ATLAS Council
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-12
PDF   White Paper 
 

252) Vendor Security Assessment: 40 Questions To Address (White Paper)
Source: BitSight Technologies
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-10
PDF   White Paper 
 

253) IoT Security Needs a White Knight (White Paper)
Source: Network World
Category:Security
Posting Date: 2018-01-15
Publish Date: 2018-01-15
PDF   White Paper 
 

254) Quantum Computing Has the Cybersecurity World White-Knuckled (White Paper)
Source: ComputerWorld
Category:Security
Posting Date: 2016-09-19
Publish Date: 2016-09-07
PDF   White Paper 
 

255) At What Point Do White Hat Hackers Cross the Ethical Line? (White Paper)
Source: Network World
Category:Security
Posting Date: 2015-08-01
Publish Date: 2015-08-14
PDF   White Paper 
 

256) CISOs Look to Hire White Hat Hackers to Head Off Security Breaches (White Paper)
Source: IT World
Category:Security
Posting Date: 2014-06-12
Publish Date: 2014-06-04
PDF   White Paper 
 

257) An Introduction to NVMe (White Paper)
Source: SEAGATE
Category:Storage
Author: Hermann Strass
Posting Date: 2019-08-18
Publish Date: 2016-08-18
PDF   White Paper 
 

258) Agility, Efficiency, Flexibility: Mid-Market Businesses Take Advantage of Flash Storage (White Paper)
Source: IBM
Category:Storage
Posting Date: 2019-07-22
Publish Date: 2019-07-22
PDF   White Paper 
 

259) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 27 - Conclusions, (White Paper)
Source: University of Cambridge
Category:Storage
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

260) NVM PM Remote Access for High Availability, White Paper (White Paper)
Source: SNIA
Category:Storage
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

261) An Introduction to NVMe, White Paper (White Paper)
Source: Seagate
Category:Storage
Posting Date: 2019-04-10
Publish Date: 2019-04-11
PDF   White Paper 
 

262) The State of Software-Defined Storage, Hyperconverged and Cloud Storage (White Paper)
Source: DataCore Software
Category:Storage
Posting Date: 2019-02-12
Publish Date: 2019-01-28
PDF   White Paper 
 

263) NVMe Over Fabrics Agenda (White Paper)
Source: nvm EXPRESS
Category:Storage
Posting Date: 2019-01-15
Publish Date: 2019-01-16
PDF   White Paper 
 

264) NVMe Over Fabrics (White Paper)
Source: Mellanox
Category:Storage
Posting Date: 2019-01-15
Publish Date: 2019-01-16
PDF   White Paper 
 

265) Performance Benefits of NVMe over Fibre Channel (White Paper)
Source: Demartek
Category:Storage
Posting Date: 2018-11-02
Publish Date: 2018-11-16
PDF   White Paper 
 

266) NVMe in the Data Centre, White Paper (White Paper)
Source: architectingIT
Category:Storage
Posting Date: 2018-11-02
Publish Date: 2018-11-06
PDF   White Paper 
 

267) The State of Software-Defined Storage, Hyperconverged and Cloud Storage (White Paper)
Source: DataCore Software
Category:Storage
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

268) Why IoT Projects Fail: Six Critical Capabilities You Need to Consider (White Paper)
Source: KORE
Category:Technology
Posting Date: 2019-08-26
Publish Date: 2019-08-26
PDF   White Paper 
 

269) 3D Printing: Overview, Impacts, and the Federal Role (White Paper)
Source: Congressional Research Service
Category:Technology
Author: John F. Sargent Jr., R.X. Schwartz
Posting Date: 2019-08-12
Publish Date: 2019-08-02
PDF   White Paper 
 

270) The Complete Guide to Enterprise Email (White Paper)
Source: TechWorld
Category:Technology
Posting Date: 2019-07-03
Publish Date: 2019-04-18
PDF   White Paper 
 

271) The Free Beginner's Guide To 3D Printing, White Paper (White Paper)
Source: 3D Printing Industry
Category:Technology
Posting Date: 2019-06-12
Publish Date: 2019-05-24
PDF   White Paper 
 

272) Toward a Machine Intelligence Layer for Diverse Industrial IoT Use Cases:, White Paper (White Paper)
Source: Eericsson Research
Category:Technology
Posting Date: 2019-06-01
Publish Date: 2019-05-29
PDF   White Paper 
 

273) The Complete Guide to Quantum Computing, White Paper (White Paper)
Source: TechRepublic
Category:Technology
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

274) The Peelable, Foldable Phone Has Become the Great White Whale of Tech (White Paper)
Source: The Register
Category:Technology
Posting Date: 2019-05-16
Publish Date: 2019-04-30
PDF   White Paper 
 

275) How To Achieve Network Optimisation For IoT (White Paper)
Source: AERIS
Category:Technology
Posting Date: 2019-04-10
Publish Date: 2019-04-08
PDF   White Paper 
 

276) The 8 Biggest IoT Security Mistakes and How to Avoid Them, White Paper (White Paper)
Source: Praetorian
Category:Technology
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

277) The Complete Guide to: Drones (White Paper)
Source: TechWorld
Category:Technology
Posting Date: 2019-02-12
Publish Date: 2019-02-18
PDF   White Paper 
 

278) Do Crypto-Currencies Fuel Ransomware? (White Paper)
Source: IEEE
Category:Technology
Posting Date: 2019-01-15
Publish Date: 2019-01-25
PDF   White Paper 
 

279) The Complete Guide to Internet of Things, White Paper (White Paper)
Source: TechWorld
Category:Technology
Posting Date: 2019-01-15
Publish Date: 2019-01-14
PDF   White Paper 
 

280) 2018 Augmented and Virtual Reality Survey Report (White Paper)
Source: Perkins Coie
Category:Technology
Posting Date: 2019-01-15
Publish Date: 2019-01-01
PDF   White Paper 
 

281) IoT Now Top Internet Attack Target (White Paper)
Source: F5
Category:Technology
Posting Date: 2018-11-02
Publish Date: 2018-10-30
PDF   White Paper 
 


68 Articles Added in the Last 7 Days
14,442 Articles with 16,034 subscribers
3,762 C-Level and 8,321 LinkedIn Connections


"We can often do more for other men by trying to correct our own faults than by trying to correct theirs."
- François Fénelon (1651 – 1715) French Roman Catholic Archbishop -
The only IT and Data Center Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT and DC Professionals at all levels. We harvest and compile 40+ of the absolute best technical articles with no pop-up ads or sales angles. We address everyday IT and Data Center issues involving:
  • Reducing Business and IT Risk
  • Improving Infrastructure Quality of Service
  • Increasing Availability and Reliability
  • Reducing Application Response Time
  • Increasing Business Productivity and Agility
  • Improving Server, Storage and Networks
  • Improving Security and Compliance
  • Protecting, Preserving and Restoring Data
  • Improving Regulatory Compliance
  • Reducing Audit Errors
  • Reducing IT and DC Costs
  • Developing Proactive Business Solutions
Header Storage Switzerland
Copyright © 2019 Promethean Data Solutions, Inc.   -   Warren Avery   -   602-463-6558   -   wavery@ITWeeklyNewsletter.com