Search Results: 243 Articles Found for White

Header Storage Switzerland Header
1) Microservices and Docker at Scale (White Paper)
Source: Electric Cloud
Category:Administration
Author: Avan Mathur
Posting Date: 2019-07-13
Publish Date: 2019-07-13
PDF   White Paper 
 

2) The Expert’s Guide to Running Containers in Production (White Paper)
Source: Portworx
Category:Administration
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

3) Five Essential Strategies for Successful HPC Clusters. White Paper (White Paper)
Source: Bright Computing
Category:Administration
Posting Date: 2019-05-16
Publish Date: 2019-04-30
PDF   White Paper 
 

4) Five Essential Strategies for Successful HPC Clusters, White Paper (White Paper)
Source: Bright Computing
Category:Administration
Posting Date: 2019-05-16
Publish Date: 2019-05-07
PDF   White Paper 
 

5) Application Container Security Guide (White Paper)
Source: NIST
Category:Administration
Posting Date: 2019-02-12
Publish Date: 2019-01-29
PDF   White Paper 
 

6) Best Practices for Container Security (White Paper)
Source: Alert Logic
Category:Administration
Posting Date: 2019-01-15
Publish Date: 2019-01-22
PDF   White Paper 
 

7) Enterprise Container Platform Software Suites, Q4 2018 (White Paper)
Source: Forrester
Category:Administration
Posting Date: 2019-01-15
Publish Date: 2019-01-08
PDF   White Paper 
 

8) Is There A White Box Server in Your Data Center's Future? (White Paper)
Source: Network World
Category:Administration
Posting Date: 2018-10-23
Publish Date: 2018-10-11
PDF   White Paper 
 

9) The Cloud Is Not for Cost Savings, But Cost Management is King (White Paper)
Source: Rhythmic
Category:Cloud
Posting Date: 2019-08-05
Publish Date: 2019-07-01
PDF   White Paper 
 

10) The Complete Guide to Cloud Storage 2019 (White Paper)
Source: TechWorld
Category:Cloud
Posting Date: 2019-08-05
Publish Date: 2019-08-05
PDF   White Paper 
 

11) Making Multi-Cloud Work (White Paper)
Source: ComputerWeekly
Category:Cloud
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

12) Serverless Computing: From Planet Mars to the Cloud (White Paper)
Source: IEEE
Category:Cloud
Author: Jose Luis V  azquez-Poletti, Ignacio Martln Llorente
Posting Date: 2019-07-10
Publish Date: 2019-07-10
PDF   White Paper 
 

13) A Serverless Real-Time Data Analytics Platform for Edge Computing (White Paper)
Source: IEEE
Category:Cloud
Posting Date: 2019-07-10
Publish Date: 2019-07-10
PDF   White Paper 
 

14) Shadow IT: The Great IT Opportunity (White Paper)
Source: LANDESK
Category:Cloud
Posting Date: 2019-06-28
Publish Date: 2019-06-28
PDF   White Paper 
 

15) The Complete Guide to Serverless Computing (White Paper)
Source: TechWorld
Category:Cloud
Posting Date: 2019-06-24
Publish Date: 2019-06-24
PDF   White Paper 
 

16) The Security Implications of Moving to the Cloud (White Paper)
Source: IBM Security
Category:Cloud
Author: David A. Cass
Posting Date: 2019-06-18
Publish Date: 2018-06-28
PDF   White Paper 
 

17) 3 Key Risks You Need to Plan for When Migrating to The Cloud, White Paper (White Paper)
Source: Rhythmic
Category:Cloud
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

18) Top Threats to Cloud Computing, White Paper (White Paper)
Source: Cloud Security Alliance
Category:Cloud
Posting Date: 2019-06-12
Publish Date: 2019-05-24
PDF   White Paper 
 

19) NIST Cybersecurity Framework (White Paper)
Source: AWS
Category:Cloud
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

20) Preparing for the Cloud: Understanding the Infrastructure Impacts, White Paper (White Paper)
Source: TechRepublic
Category:Cloud
Posting Date: 2019-06-01
Publish Date: 2019-06-14
PDF   White Paper 
 

21) To Maximize the Cloud, Focus on the Network, White Paper (White Paper)
Source: Equinix
Category:Cloud
Posting Date: 2019-05-16
Publish Date: 2019-05-10
PDF   White Paper 
 

22) Exposed: Cyberattacks on Cloud Honeypots (White Paper)
Source: Sophos
Category:Cloud
Posting Date: 2019-04-10
Publish Date: 2019-04-09
PDF   White Paper 
 

23) 3 Common Multi-Cloud Challenges - and How to Solve Them (White Paper)
Source: BT
Category:Cloud
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

24) Top 10 Public Cloud Security Recommendations (White Paper)
Source: Palo Alto Networks
Category:Cloud
Posting Date: 2019-01-15
Publish Date: 2019-01-18
PDF   White Paper 
 

25) Serverless Computing: One Step Forward, Two Steps Back (White Paper)
Source: UC Berkeley
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-20
PDF   White Paper 
 

26) Strategically Achieving Multicloud Success (White Paper)
Source: F5/IBM
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

27) Top 10 Public Cloud Security Recommendations (White Paper)
Source: Palo Alto Networks
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

28) Key Considerations When Migrating Workloads to the Public Cloud (White Paper)
Source: Insight
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-11
PDF   White Paper 
 

29) Closing the Cloud Security Business Gap (White Paper)
Source: SalesForce
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-11-23
PDF   White Paper 
 

30) An Introduction To the New IT Approach Called Hybrid IT (White Paper)
Source: WEI
Category:Cloud
Posting Date: 2018-11-02
Publish Date: 2018-11-14
PDF   White Paper 
 

31) Containers At-Risk: A Review of 21,000 Cloud Environments (White Paper)
Source: Lacework, Inc.
Category:Cloud
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

32) Interview of Everything: Cisco CEO Chambers on White Boxes, SDN, Leadership and the Cloud (White Paper)
Source: Network World
Category:Cloud
Posting Date: 2015-05-16
Publish Date: 2015-05-05
PDF   White Paper 
 

33) Architecting for HIPAA Security and Compliance on Amazon Web Services (White Paper)
Source: Amazon Web Services, Inc.
Category:Compliance
Posting Date: 2019-08-13
Publish Date: 2019-07-12
PDF   White Paper 
 

34) Examining the Data Trinity: Governance, Security and Privacy (White Paper)
Source: SandHill
Category:Compliance
Posting Date: 2019-06-20
Publish Date: 2019-06-20
PDF   White Paper 
 

35) The CIO's Guide to HIPAA Compliant Text Messaging, White Paper (White Paper)
Source: ecfirst
Category:Compliance
Posting Date: 2019-06-01
Publish Date: 2019-06-11
PDF   White Paper 
 

36) Guide to the General Data Protection Regulation, PDF 295 Pages (White Paper)
Source: Information Commissioners Office
Category:Compliance
Posting Date: 2019-04-10
Publish Date: 2019-04-08
PDF   White Paper 
 

37) Maximizing the Value of Your Data Privacy Investments (White Paper)
Source: Cisco Systems
Category:Compliance
Posting Date: 2019-02-12
Publish Date: 2019-01-27
PDF   White Paper 
 

38) The Complete Guide to GDPR (White Paper)
Source: TechWorld
Category:Compliance
Posting Date: 2019-01-15
Publish Date: 2019-01-17
PDF   White Paper 
 

39) GDPR for Security Practitioners, White Paper (White Paper)
Source: One CISO’s Opinion
Category:Compliance
Posting Date: 2018-10-23
Publish Date: 2018-09-30
PDF   White Paper 
 

40) The Rise of White-Box Storage (White Paper)
Source: NetworkComputing
Category:Compliance
Posting Date: 2014-09-19
Publish Date: 2014-08-27
PDF   White Paper 
 

41) SD-WAN as a Service: The Rise of Managed SD-WAN (White Paper)
Source: Nemertes
Category:Connectivity
Author: John Burke - CIO & Principal Research Analyst at Nemertes Resear
Posting Date: 2019-08-21
Publish Date: 2019-08-21
PDF   White Paper 
 

42) Is a SD-WAN Network as Secure as My MPLS Network? (White Paper)
Source: British Telecommunications
Category:Connectivity
Author: Keith Langridge
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

43) Secure Enterprise SD-WAN for Dummies, White Paper (White Paper)
Source: ForcePoint
Category:Connectivity
Posting Date: 2019-05-16
Publish Date: 2019-05-10
PDF   White Paper 
 

44) The Essential Guide to Workplace Modernization Through Next-Generation Unified Communications, White (White Paper)
Source: Cisco Sytems
Category:Connectivity
Posting Date: 2019-05-16
Publish Date: 2019-05-13
PDF   White Paper 
 

45) Network Operating System Advantages Extend to White Box Switching (White Paper)
Source: Search Networking
Category:Connectivity
Posting Date: 2019-03-11
Publish Date: 2019-03-04
PDF   White Paper 
 

46) OM5 and OM4+ Fiber (White Paper)
Source: Commscope
Category:Connectivity
Posting Date: 2018-11-02
Publish Date: 2018-11-16
PDF   White Paper 
 

47) 10 Things Your Next Firewall Must Do (White Paper)
Source: Palo Alto Networks
Category:Connectivity
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

48) Current State Of SD-WAN Implementation and Deployment (White Paper)
Source: Talari Networks
Category:Connectivity
Posting Date: 2018-10-23
Publish Date: 2018-10-08
PDF   White Paper 
 

49) The Future of Networking: It's In a White Box (White Paper)
Source: Network World
Category:Connectivity
Posting Date: 2017-03-11
Publish Date: 2017-03-20
PDF   White Paper 
 

50) Data Protection Best Practices (White Paper)
Source: Industrial Internet Consortium
Category:Data
Author: Bassam Zarkout (IGnPower), Apurva Mohan (Schlumberger), Niheer P
Posting Date: 2019-07-24
Publish Date: 2019-07-22
PDF   White Paper 
 

51) A Scorecard Approach to Improving Data Quality (White Paper)
Source: PricewaterhouseCoopers LLP
Category:Data
Author: Phil Nousak, Rob Phelps
Posting Date: 2019-07-17
Publish Date: 2001-07-17
PDF   White Paper 
 

52) Using the k-Nearest Neighbors Algorithm (White Paper)
Source: Promethean Data Solutions
Category:Data
Author: Jim Adams
Posting Date: 2019-07-07
Publish Date: 2019-05-01
PDF   White Paper 
 

53) Managing Cross-Platform Database Environments (White Paper)
Source: Quest Software
Category:Data
Author: Jason Hall, Pini Dibask
Posting Date: 2019-07-03
Publish Date: 2019-07-03
PDF   White Paper 
 

54) Practical Insights on AI (White Paper)
Source: Infosys
Category:Data
Author: Rohit Mohindru, Prabhat Kohli
Posting Date: 2019-07-02
Publish Date: 2019-07-02
PDF   White Paper 
 

55) Data Governance, Data Quality and Artificial Intelligence in the Supply Chain, White Paper (White Paper)
Source: North Carolina State University
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-05-29
PDF   White Paper 
 

56) The Ultimate Guide to Embedded Analytics, White Paper (White Paper)
Source: Qlik
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

57) DataOps: An Authoritative Guide, White Paper (White Paper)
Source: StreamSets
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

58) Self-Service Data Prep: 10 Questions to Ask Yourself, White Paper (White Paper)
Source: Paxata
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

59) The Practical Executive's Guide to Data Loss Prevention, White Paper, (White Paper)
Source: ForcePoint
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

60) GE Aviation: From Data Silos To Self-Service, White Paper (White Paper)
Source: Dataiku
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-13
PDF   White Paper 
 

61) Harnessing Insights in Unstructured Data Through NLP And ML, White Paper (White Paper)
Source: EY
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-14
PDF   White Paper 
 

62) The Complete Guide to Machine Learning in the Enterprise, White Paper (White Paper)
Source: TechWorld
Category:Data
Posting Date: 2019-05-16
Publish Date: 2019-04-25
PDF   White Paper 
 

63) Building Blocks Of A Modern Analytics Platform, White Paper (White Paper)
Source: Tableau Software
Category:Data
Posting Date: 2019-04-10
Publish Date: 2019-04-12
PDF   White Paper 
 

64) Top Ten Big Data Trends, White Paper (White Paper)
Source: Tableau Software
Category:Data
Posting Date: 2019-04-10
Publish Date: 2019-04-12
PDF   White Paper 
 

65) Moving Data to the Cloud - Best Practices, White Paper (White Paper)
Source: Virtual Instruments
Category:Data
Posting Date: 2019-01-15
Publish Date: 2019-01-13
PDF   White Paper 
 

66) The Complete Guide To: Data Science (White Paper)
Source: TechWorld
Category:Data
Posting Date: 2018-12-24
Publish Date: 2018-12-03
PDF   White Paper 
 

67) Do You Really Need Online Data Backups? (White Paper)
Source: Enterprise Technology Services
Category:Data
Posting Date: 2018-10-23
Publish Date: 2018-10-24
PDF   White Paper 
 

68) Archiving vs. Backup - What's the Difference? (White Paper)
Source: solarwinds
Category:Data
Posting Date: 2018-10-23
Publish Date: 2018-10-08
PDF   White Paper 
 

69) DevOps Forum Papers (Links to 19 DevOps White Papers) (White Paper)
Source: IT Revolution
Category:DevOps
Author: Gen Kin & Others
Posting Date: 2019-08-14
Publish Date: 2019-08-14
PDF   White Paper 
 

70) Agile Development for Application Security Managers (White Paper)
Source: Quotium
Category:DevOps
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

71) Automate Cloud & DevOps Initiatives Across All Phases (White Paper)
Source: BMC
Category:DevOps
Posting Date: 2019-06-26
Publish Date: 2019-06-26
PDF   White Paper 
 

72) How To Use DevOps, Agile To Drive Digital Transformation (White Paper)
Source: Pivotal
Category:DevOps
Author: Michael Cot
Posting Date: 2019-06-18
Publish Date: 2019-06-20
PDF   White Paper 
 

73) Avoid Silos by Shifting Left in a DevOps World (White Paper)
Source: Micro Focus
Category:DevOps
Posting Date: 2019-04-10
Publish Date: 2019-04-05
PDF   White Paper 
 

74) Agile Operations and the Three Ways (White Paper)
Source: CA Technologies
Category:DevOps
Posting Date: 2019-04-10
Publish Date: 2019-04-05
PDF   White Paper 
 

75) Why DevOps Matters, White Paper (White Paper)
Source: Splunk
Category:DevOps
Posting Date: 2019-04-10
Publish Date: 2019-04-18
PDF   White Paper 
 

76) The Complete Guide to: DevOps (White Paper)
Source: TechWorld
Category:DevOps
Posting Date: 2019-03-11
Publish Date: 2019-03-12
PDF   White Paper 
 

77) DevOps Done Right (White Paper) (White Paper)
Source: New Relic
Category:DevOps
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

78) IT Asset Management: Approach, Architecture, and Security Characteristics (White Paper)
Source: NIST
Category:Management
Author: National Cybersecurity Center of Excellence
Posting Date: 2019-08-15
Publish Date: 2015-10-15
PDF   White Paper 
 

79) CIO Leadership - Gartner Insights on How Leaders Innovate for Digital Success (White Paper)
Source: Gartner
Category:Management
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

80) Tech Certification Pay (White Paper)
Source: Foote Partners LLC
Category:Management
Author: David Foote
Posting Date: 2019-06-20
Publish Date: 2019-06-01
PDF   White Paper 
 

81) Thinking Architecturally Lead Technical Change Within Your Engineering Team, White Paper (White Paper)
Source: Pivotal
Category:Management
Author: Nathaniel Schutta
Posting Date: 2019-06-20
Publish Date: 2019-06-20
PDF   White Paper 
 

82) Deep Learning for Business Leaders, White Paper (White Paper)
Source: H2O.ai
Category:Management
Posting Date: 2019-06-12
Publish Date: 2019-05-18
PDF   White Paper 
 

83) The Real Cost of Recruitment Fraud, White Paper (White Paper)
Source: Crowe
Category:Management
Posting Date: 2019-06-01
Publish Date: 2019-06-16
PDF   White Paper 
 

84) The 21 Indispensable Qualities of a Leader, White Paper (White Paper)
Source: Purdue University
Category:Management
Posting Date: 2019-05-16
Publish Date: 2019-04-23
PDF   White Paper 
 

85) 4 Characteristics of a Modern Incident Response Plan, White Paper (White Paper)
Source: PagerDuty
Category:Management
Posting Date: 2019-04-10
Publish Date: 2019-04-12
PDF   White Paper 
 

86) The Complete Guide to the Biggest Tech Trends in 2019 (White Paper)
Source: TechWorld
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-02-25
PDF   White Paper 
 

87) The Executive's Practical Guide to Thriving In the Face of Evolving Cyber Risks (White Paper)
Source: Kip Boyle
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-02-26
PDF   White Paper 
 

88) How Continuous Monitoring is Revolutionizing Risk Management (White Paper)
Source: BitSight Technologies
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-03-18
PDF   White Paper 
 

89) IT Predictions and Anti-Predictions for 2019: Networking, Security, Cloud Communications (White Paper)
Source: Masergy
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-03-19
PDF   White Paper 
 

90) 2018 Cost of a Data Breach Study (White Paper)
Source: IBM, Ponemon Institute LLC
Category:Management
Posting Date: 2019-01-15
Publish Date: 2018-12-22
PDF   White Paper 
 

91) How To Execute on Strategy: Getting Great Ideas from the Whiteboard to the Boardroom (White Paper)
Source: ZDnet
Category:Management
Posting Date: 2017-12-24
Publish Date: 2017-12-20
PDF   White Paper 
 

92) Ethical Hackers: How Hiring White Hats Can Help Defend Your Organization Against the Bad Guys (White Paper)
Source: TechRepublic
Category:Management
Posting Date: 2016-07-21
Publish Date: 2016-06-20
PDF   White Paper 
 

93) Here’s Why You Should Have a Disaster Recovery Plan (White Paper)
Source: ENTERPRISE TECHNOLOGY SERVICES
Category:Operations
Author: Jim Siragusa
Posting Date: 2019-08-15
Publish Date: 2019-08-15
PDF   White Paper 
 

94) Power Monitoring and Metering: (White Paper)
Source: RARITAN
Category:Operations
Posting Date: 2019-08-14
Publish Date: 2019-08-14
PDF   White Paper 
 

95) Guidance on What to Do with an Older UPS (White Paper)
Source: Schneider Electric
Category:Operations
Author: John Gray, Patrick Donovan
Posting Date: 2019-08-12
Publish Date: 2015-08-12
PDF   White Paper 
 

96) A Framework for How to Modernize Data Center Facility Infrastructure (White Paper)
Source: Schneider Electric
Category:Operations
Author: Patrick Donovan, Wendy Torell
Posting Date: 2019-07-14
Publish Date: 2019-07-14
PDF   White Paper 
 

97) The Complete Guide to OpenStack (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2019-07-08
Publish Date: 2019-05-30
PDF   White Paper 
 

98) The Complete Guide to Online Backup (White Paper)
Source: SherWeb
Category:Operations
Posting Date: 2019-06-30
Publish Date: 2019-06-30
PDF   White Paper 
 

99) 6 Steps to Successful Capacity Management (White Paper)
Source: BMC
Category:Operations
Posting Date: 2019-06-26
Publish Date: 2019-06-26
PDF   White Paper 
 

100) The Drivers and Benefits of Edge Computing (White Paper)
Source: Schneider Electric
Category:Operations
Author: Steven Carlini
Posting Date: 2019-06-24
Publish Date: 2019-06-24
PDF   White Paper 
 

101) Solving Edge Computing Infrastructure Challenges (White Paper)
Source: Schneider Electric
Category:Operations
Author: Patrick Donovan, Wendy Torell
Posting Date: 2019-06-24
Publish Date: 2019-06-24
PDF   White Paper 
 

102) IT Asset Management (White Paper)
Source: ServiceNow
Category:Operations
Posting Date: 2019-06-21
Publish Date: 2019-06-21
PDF   White Paper 
 

103) Best Practices for Implementing Software Asset Management, White Paper (White Paper)
Source: Cherwell
Category:Operations
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

104) Data Governance, Data Quality and Artificial Intelligence In the Supply Chain, White Paper (White Paper)
Source: North Carolina State University
Category:Operations
Author: Rob Handfield, Balaji Soundararajan, Joseph Yacura, IBM
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

105) The Complete Guide To IT Monitoring (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

106) The Power of Predictive IT, White Paper (White Paper)
Source: Harvard Business Review
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

107) Get Better, Faster, Cheaper IT Service Through AI Capabilities, White Paper (White Paper)
Source: servicenow
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

108) How a Healthy CMDB Helps You to Deliver Great Business Service Quality, White Paper (White Paper)
Source: servicenow
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

109) Achieving Maximum Uptime Isn't Glamorous: Testing, Planning, Security Help Ensure Ops Success, White (White Paper)
Source: Rhythmic
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

110) Top 6 Cloud Backup Benefits, White Paper (White Paper)
Source: Veeam
Category:Operations
Posting Date: 2019-06-01
Publish Date: 2019-05-29
PDF   White Paper 
 

111) 20 Point Checklist for Vetting Hosting Options, White Paper, (White Paper)
Source: Liquid Web
Category:Operations
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

112) 4 Business Continuity Planning Essentials, White Paper (White Paper)
Source: Datto
Category:Operations
Posting Date: 2019-05-16
Publish Date: 2019-05-12
PDF   White Paper 
 

113) Threats to Manufacturing Environments in the Era of Industry 4.0, White Paper (White Paper)
Source: Trend Micro
Category:Operations
Posting Date: 2019-04-10
Publish Date: 2019-04-17
PDF   White Paper 
 

114) The Do's and Don'ts of Establishing SLAs (White Paper)
Source: ConnectWise
Category:Operations
Posting Date: 2019-03-11
Publish Date: 2019-03-13
PDF   White Paper 
 

115) Backup vs. Business Continuity (White Paper)
Source: Datto
Category:Operations
Posting Date: 2019-03-11
Publish Date: 2019-03-13
PDF   White Paper 
 

116) Relationship Between Virtualization & HCI, White Paper (White Paper)
Source: Hitachi
Category:Operations
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

117) Moving your Infrastructure to the Cloud (White Paper)
Source: Diversity Limited
Category:Operations
Posting Date: 2019-01-15
Publish Date: 2019-01-13
PDF   White Paper 
 

118) The Complete Guide to Hyperconverged Infrastructure (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2019-01-15
Publish Date: 2019-01-09
PDF   White Paper 
 

119) The Complete Guide To: Hyperconverged Infrastructure (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2018-12-24
Publish Date: 2018-12-17
PDF   White Paper 
 

120) Data Center Power Distribution and Capacity Planning (White Paper)
Source: Raritan
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-11-22
PDF   White Paper 
 

121) Bridging the Divide between Software Developers and Operators using Logs (White Paper)
Source: Queen’s University, Canada
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-11-17
PDF   White Paper 
 

122) A 6-Step Approach For ITSM And ITOM To Work Better Together (White Paper)
Source: servicenow
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-11-08
PDF   White Paper 
 

123) Infrastructure Monitoring Software: Can You Afford It? (White Paper)
Source: NetApp
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-10-31
PDF   White Paper 
 

124) Hyperconverged Infrastructure as a Catalyst for Change (White Paper)
Source: Freeform Dynamics/VMware
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-10-31
PDF   White Paper 
 

125) Software-Defined Data Center - Get The Most Out of Today's Infrastructure (White Paper)
Source: IBM
Category:Operations
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

126) Edge Data Centers (White Paper)
Source: TIA
Category:Operations
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

127) With New Dynamic Capabilities, Will Whitelisting Finally Catch on? (White Paper)
Source: IT World
Category:Potpourri
Posting Date: 2017-06-12
Publish Date: 2017-06-19
PDF   White Paper 
 

128) Is There a White-Box Switch In Your Future? (White Paper)
Source: Network World
Category:Potpourri
Posting Date: 2015-10-23
Publish Date: 2015-10-12
PDF   White Paper 
 

129) World's First White Lasers Demonstrated (White Paper)
Source: Science Daily
Category:Potpourri
Posting Date: 2015-08-01
Publish Date: 2015-07-29
PDF   White Paper 
 

130) Inside White-Box Switches (White Paper)
Source: NetworkComputing
Category:Potpourri
Posting Date: 2014-08-01
Publish Date: 2014-08-13
PDF   White Paper 
 

131) Countering Escalating Cyberthreats with a New Security Architecture (White Paper)
Source: Gigamon
Category:Security
Posting Date: 2019-08-21
Publish Date: 2019-08-21
PDF   White Paper 
 

132) Framework for Improving Critical Infrastructure Cybersecurity (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-08-20
Publish Date: 2018-04-16
PDF   White Paper 
 

133) The Sharing Economy – The Seven Challenges of Online Identity Verification (White Paper)
Source: EVIDENT
Category:Security
Posting Date: 2019-08-19
Publish Date: 2019-08-19
PDF   White Paper 
 

134) The Threat Intelligence Handbook (White Paper)
Source: WebRoot
Category:Security
Author: Gartner
Posting Date: 2019-08-15
Publish Date: 2019-08-15
PDF   White Paper 
 

135) Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security (White Paper)
Source: CrowdStrike
Category:Security
Posting Date: 2019-08-13
Publish Date: 2017-08-16
PDF   White Paper 
 

136) Identity Powered Security (White Paper)
Source: APORETO
Category:Security
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

137) What Every Security Leader Needs to Know Handbook (White Paper)
Source: HackerOne
Category:Security
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

138) Manage Risk By Protecting Apps, Data and Usage (White Paper)
Source: Citrixx
Category:Security
Posting Date: 2019-08-04
Publish Date: 2015-08-04
PDF   White Paper 
 

139) SIEM + THREAT INTELLIGENCE: Quickly Identify the Threats that Matter to You (White Paper)
Source: ThreatConnect
Category:Security
Posting Date: 2019-07-31
Publish Date: 2019-07-31
PDF   White Paper 
 

140) Buyers Guide: Identity, Access and API Management Solutions (White Paper)
Source: CA Technologies
Category:Security
Author: Steve Firestone
Posting Date: 2019-07-12
Publish Date: 2019-07-12
PDF   White Paper 
 

141) APAC Guide Yo Plugging Endpoint Security Gaps (White Paper)
Source: ComputerWeekly
Category:Security
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

142) Data-at-rest Encryption (White Paper)
Source: DATACORE SOFTWARE
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

143) Why, When & How to Implement Employee Monitoring (White Paper)
Source: Interfocus
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

144) Zero Trust Security: A New Paradigm for a Changing World (White Paper)
Source: CENTRIFY
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

145) Law Firm CyberSecurity (White Paper)
Source: Discovery Computers and Forensic
Category:Security
Author: Rod Mac Kenzie
Posting Date: 2019-07-08
Publish Date: 2019-07-08
PDF   White Paper 
 

146) Ransomware To Pay Or Not To Pay (White Paper)
Source: JLT Specialty Limited
Category:Security
Author: Sarah Stephens
Posting Date: 2019-07-06
Publish Date: 2019-02-28
PDF   White Paper 
 

147) Cyber Security Report (White Paper)
Source: CSC
Category:Security
Author: Ken Linscott, Quinn Taggart, Letitia Thian
Posting Date: 2019-07-05
Publish Date: 2019-06-26
PDF   White Paper 
 

148) Peer-to-Peer Financial Protection based on Blockchain Technology (White Paper)
Source: Sagittae
Category:Security
Posting Date: 2019-07-04
Publish Date: 2019-07-03
PDF   White Paper 
 

149) Ransomware: to Pay Or Not to Pay (White Paper)
Source: JLT Specialty Limited
Category:Security
Author: Sarah Stephens
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

150) 7 Experts on Threat and Vulnerability Management, White Paper (White Paper)
Source: RiskSense, Inc
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-16
PDF   White Paper 
 

151) Medical Device Encryption & Security, White Paper (White Paper)
Source: NetLib Security
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-08
PDF   White Paper 
 

152) The Growing Consequences of Security Breaches, White Paper (White Paper)
Source: Rhythmic
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

153) Beginners Guide to Encryption and Key Management, White Paper (White Paper)
Source: NetLib Security
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

154) NIST Recommendation for Key Management: Part 2: Best Practices, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

155) NIST Recommendation for Key Management Part 1: General, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-26
PDF   White Paper 
 

156) NIST Recommendation for Key Management Part 3: Application-Specific, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

157) Choosing the Right Security Orchestration, Automation, and Response Platform, White Paper (White Paper)
Source: Splunk
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-31
PDF   White Paper 
 

158) Evaluating Identity Verification Solutions, White Paper (White Paper)
Source: onfido
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-01
PDF   White Paper 
 

159) Learning to Rank Strings Output for Speedier Malware Analysis, Blog (White Paper)
Source: Fireeye
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-02
PDF   White Paper 
 

160) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 1, What Is Securit (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-08
PDF   White Paper 
 

161) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 2 - Usability and (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

162) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 3 - Protocols, Whi (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

163) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 4 - Access Control (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

164) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 6 - Distributed Sy (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

165) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 5 - Cryptography, (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

166) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 7 - Economics, Whi (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

167) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 8 - Multilevel Sec (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

168) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 9 - Multilateral S (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

169) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 10 - Banking and B (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

170) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 11 - Physical Secu (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

171) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 12 - Monitoring an (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

172) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 13 - Nuclear Comma (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

173) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 14 - Security Prin (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

174) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 15 - Biometrics, W (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

175) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 16 - Physical Tamp (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

176) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 17 - Emission Secu (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

177) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 18 - API Attacks, (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

178) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 19 - Electronic an (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

179) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 20 - Telecom Syste (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

180) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 21, Network Attack (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

181) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 22 - Copyright and (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

182) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 23 - The Bleeding (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

183) Security Engineering: A Guide to Building Dependable Distributed Systems, 3 Chapter 24 - Terror, Jus (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

184) The Smarter SMB's Guide to Ransomware, White Paper (White Paper)
Source: Barracuda
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

185) A Beginner's Guide To Ransomware, White Paper (White Paper)
Source: Unitrends
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

186) The Comprehensive Guide to Ransomware Protection, White Paper (White Paper)
Source: Invenio IT
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

187) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 25 - Managing the (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

188) Defending Against Crypto-Ransomware, White Paper (White Paper)
Source: netwrix
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-11
PDF   White Paper 
 

189) Fighting ATO Attacks, White Paper (White Paper)
Source: riskified
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

190) Understanding DNS: Essential Knowledge for All IT Professionals, White Paper (White Paper)
Source: AppliedTrust
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-13
PDF   White Paper 
 

191) Encryption: A Guide for Business Leaders. White Paper (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-04-29
PDF   White Paper 
 

192) Security as a Service Has Arrived, White Paper (White Paper)
Source: Armour
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-01
PDF   White Paper 
 

193) Authentication for Your Ever-Changing Needs, White Paper (White Paper)
Source: Micro Focus
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-01
PDF   White Paper 
 

194) 2019 Webroot Threat Report, White Paper (White Paper)
Source: WebRoot
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-03
PDF   White Paper 
 

195) Explore Why Identity Proofing is Key to Avoiding Identity Theft, White Paper (White Paper)
Source: Evident
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-06
PDF   White Paper 
 

196) Why Security Awareness Training is an Essential Part of Your Security Strategy (White Paper)
Source: WebRoot
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-03-25
PDF   White Paper 
 

197) A Guide To Assessing Security Maturity, White Paper (White Paper)
Source: InformationWeek
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-04-09
PDF   White Paper 
 

198) Becoming the Security Team Your Business Needs, White Paper (White Paper)
Source: BAE Systems
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-04-30
PDF   White Paper 
 

199) Blockchain White Paper (White Paper)
Source: National Archives
Category:Security
Posting Date: 2019-03-11
Publish Date: 2019-03-05
PDF   White Paper 
 

200) Distributed Denial Of Service Threats: Risks, Mitigation, and Best Practices (White Paper)
Source: Cisco Systems
Category:Security
Posting Date: 2019-03-11
Publish Date: 2019-03-21
PDF   White Paper 
 

201) Security Orchestration and Incident Response (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2019-02-12
Publish Date: 2019-02-15
PDF   White Paper 
 

202) Investigation or Exasperation? The State of Security Operations (White Paper)
Source: IDC
Category:Security
Posting Date: 2019-02-12
Publish Date: 2019-02-04
PDF   White Paper 
 

203) 15 Skills You Need to Be a Whitehat Hacker And Make Up to $145K Per Year (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-12-15
PDF   White Paper 
 

204) The State Of Email Security (White Paper)
Source: Mimecast Limited
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

205) Blockchain Applications for Identity Verification (White Paper)
Source: Evident
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-11-28
PDF   White Paper 
 

206) Fundamental Concepts of Cyber Resilience: Introduction and Overview (White Paper)
Source: US Army R&D Center
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-11-26
PDF   White Paper 
 

207) Would You Know if You've Been Breached? (White Paper)
Source: thycotic
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-18
PDF   White Paper 
 

208) AI and Cybersecurity for Dummies (White Paper)
Source: IBM
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-16
PDF   White Paper 
 

209) Zero Trust Security For Dummies (White Paper)
Source: Centrify
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-09
PDF   White Paper 
 

210) Gaining Ground On The Cyber Attacker (White Paper)
Source: Accenture
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-04
PDF   White Paper 
 

211) Internet Security Threat Report (White Paper)
Source: Symantec
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

212) The Changing Face of Cyber Attacks (White Paper)
Source: Neustar, Inc.
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

213) The Five News Headlines You Don't Want to Be About YOUR Organization (White Paper)
Source: Juniper Networks
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

214) Collaborating for Change in Cybersecurity (White Paper)
Source: ATLAS Council
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-12
PDF   White Paper 
 

215) Vendor Security Assessment: 40 Questions To Address (White Paper)
Source: BitSight Technologies
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-10
PDF   White Paper 
 

216) IoT Security Needs a White Knight (White Paper)
Source: Network World
Category:Security
Posting Date: 2018-01-15
Publish Date: 2018-01-15
PDF   White Paper 
 

217) Quantum Computing Has the Cybersecurity World White-Knuckled (White Paper)
Source: ComputerWorld
Category:Security
Posting Date: 2016-09-19
Publish Date: 2016-09-07
PDF   White Paper 
 

218) At What Point Do White Hat Hackers Cross the Ethical Line? (White Paper)
Source: Network World
Category:Security
Posting Date: 2015-08-01
Publish Date: 2015-08-14
PDF   White Paper 
 

219) CISOs Look to Hire White Hat Hackers to Head Off Security Breaches (White Paper)
Source: IT World
Category:Security
Posting Date: 2014-06-12
Publish Date: 2014-06-04
PDF   White Paper 
 

220) An Introduction to NVMe (White Paper)
Source: SEAGATE
Category:Storage
Author: Hermann Strass
Posting Date: 2019-08-18
Publish Date: 2016-08-18
PDF   White Paper 
 

221) Agility, Efficiency, Flexibility: Mid-Market Businesses Take Advantage of Flash Storage (White Paper)
Source: IBM
Category:Storage
Posting Date: 2019-07-22
Publish Date: 2019-07-22
PDF   White Paper 
 

222) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 27 - Conclusions, (White Paper)
Source: University of Cambridge
Category:Storage
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

223) NVM PM Remote Access for High Availability, White Paper (White Paper)
Source: SNIA
Category:Storage
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

224) An Introduction to NVMe, White Paper (White Paper)
Source: Seagate
Category:Storage
Posting Date: 2019-04-10
Publish Date: 2019-04-11
PDF   White Paper 
 

225) The State of Software-Defined Storage, Hyperconverged and Cloud Storage (White Paper)
Source: DataCore Software
Category:Storage
Posting Date: 2019-02-12
Publish Date: 2019-01-28
PDF   White Paper 
 

226) NVMe Over Fabrics Agenda (White Paper)
Source: nvm EXPRESS
Category:Storage
Posting Date: 2019-01-15
Publish Date: 2019-01-16
PDF   White Paper 
 

227) NVMe Over Fabrics (White Paper)
Source: Mellanox
Category:Storage
Posting Date: 2019-01-15
Publish Date: 2019-01-16
PDF   White Paper 
 

228) Performance Benefits of NVMe over Fibre Channel (White Paper)
Source: Demartek
Category:Storage
Posting Date: 2018-11-02
Publish Date: 2018-11-16
PDF   White Paper 
 

229) NVMe in the Data Centre, White Paper (White Paper)
Source: architectingIT
Category:Storage
Posting Date: 2018-11-02
Publish Date: 2018-11-06
PDF   White Paper 
 

230) The State of Software-Defined Storage, Hyperconverged and Cloud Storage (White Paper)
Source: DataCore Software
Category:Storage
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

231) 3D Printing: Overview, Impacts, and the Federal Role (White Paper)
Source: Congressional Research Service
Category:Technology
Author: John F. Sargent Jr., R.X. Schwartz
Posting Date: 2019-08-12
Publish Date: 2019-08-02
PDF   White Paper 
 

232) The Complete Guide to Enterprise Email (White Paper)
Source: TechWorld
Category:Technology
Posting Date: 2019-07-03
Publish Date: 2019-04-18
PDF   White Paper 
 

233) The Free Beginner's Guide To 3D Printing, White Paper (White Paper)
Source: 3D Printing Industry
Category:Technology
Posting Date: 2019-06-12
Publish Date: 2019-05-24
PDF   White Paper 
 

234) Toward a Machine Intelligence Layer for Diverse Industrial IoT Use Cases:, White Paper (White Paper)
Source: Eericsson Research
Category:Technology
Posting Date: 2019-06-01
Publish Date: 2019-05-29
PDF   White Paper 
 

235) The Complete Guide to Quantum Computing, White Paper (White Paper)
Source: TechRepublic
Category:Technology
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

236) The Peelable, Foldable Phone Has Become the Great White Whale of Tech (White Paper)
Source: The Register
Category:Technology
Posting Date: 2019-05-16
Publish Date: 2019-04-30
PDF   White Paper 
 

237) How To Achieve Network Optimisation For IoT (White Paper)
Source: AERIS
Category:Technology
Posting Date: 2019-04-10
Publish Date: 2019-04-08
PDF   White Paper 
 

238) The 8 Biggest IoT Security Mistakes and How to Avoid Them, White Paper (White Paper)
Source: Praetorian
Category:Technology
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

239) The Complete Guide to: Drones (White Paper)
Source: TechWorld
Category:Technology
Posting Date: 2019-02-12
Publish Date: 2019-02-18
PDF   White Paper 
 

240) Do Crypto-Currencies Fuel Ransomware? (White Paper)
Source: IEEE
Category:Technology
Posting Date: 2019-01-15
Publish Date: 2019-01-25
PDF   White Paper 
 

241) The Complete Guide to Internet of Things, White Paper (White Paper)
Source: TechWorld
Category:Technology
Posting Date: 2019-01-15
Publish Date: 2019-01-14
PDF   White Paper 
 

242) 2018 Augmented and Virtual Reality Survey Report (White Paper)
Source: Perkins Coie
Category:Technology
Posting Date: 2019-01-15
Publish Date: 2019-01-01
PDF   White Paper 
 

243) IoT Now Top Internet Attack Target (White Paper)
Source: F5
Category:Technology
Posting Date: 2018-11-02
Publish Date: 2018-10-30
PDF   White Paper 
 


79 Articles Added in the Last 7 Days
13,992 Articles with 15,942 subscribers
3,638 C-Level and 8,087 LinkedIn Connections


"A problem is a chance for you to do your best."
- Duke Ellington (1899-1974) American Composer and Musician -
The only IT and Data Center Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT and DC Professionals at all levels. We harvest and compile 40+ of the absolute best technical articles with no pop-up ads or sales angles. We address everyday IT and Data Center issues involving:
  • Reducing Business and IT Risk
  • Improving Infrastructure Quality of Service
  • Increasing Availability and Reliability
  • Reducing Application Response Time
  • Increasing Business Productivity and Agility
  • Improving Server, Storage and Networks
  • Improving Security and Compliance
  • Protecting, Preserving and Restoring Data
  • Improving Regulatory Compliance
  • Reducing Audit Errors
  • Reducing IT and DC Costs
  • Developing Proactive Business Solutions
Header Storage Switzerland Header
Copyright © 2019 Promethean Data Solutions, Inc.   -   Warren Avery   -   602-463-6558   -   wavery@ITWeeklyNewsletter.com