Cloud

See the latest white papers on how cloud computing and cloud services have transformed the IT industry, from data center services to virtualization, software-as-a-service, infrastructure-as-a-service, platform-as-a service and more.

  • White Papers // Apr 2015

    Strengthen Security with Intelligent Identity and Access Management

    Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activi-ties are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the...

    Sponsored By IBM

  • White Papers // Apr 2015

    Safeguarding the Cloud with IBM Dynamic Cloud Security

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

    Sponsored By IBM

  • White Papers // Apr 2015

    See Clearly in the Cloud with Threat-Aware Identity and Access Management

    Securely connect people, applications and devices to cloud environments While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is...

    Sponsored By IBM

  • White Papers // Apr 2015

    Securing Applications for a Safer Cloud Environment

    This white paper explains how an effective application security program can help organizations protect their assets in the cloud. It will also discuss how a secure-by-design approach to application security can help reduce risk across the IT infrastructure, in the cloud and beyond.

    Sponsored By IBM

  • White Papers // Apr 2015

    Puppet Labs DevOps Salary Report

    The 2014 State of DevOps Report revealed strong correlations between DevOps practices and strong IT performance, and also showed that high-performing IT teams have a beneficial impact on the business performance of the organizations they belong to. Among our questions about tools & practices, location, industry and company size,...

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    Automated Configuration Management: Why it Matters and How to Get Started

    Configuration management is a critical cornerstone of IT automation, providing tools that allow you to centrally manage the packages, configuration files, process state, firewall rules and other settings that equip servers to do their assigned jobs. Without automated configuration management, you do all these tasks manually, or with handwritten scripts....

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    Top 5 Risks of Delaying Migration to Cloud

    The time is now - to adopt Cloud A recent IDC study showed that cloud solutions offer an average payback period of 7.1 months and 5-year average ROI of 626%, a level that few other investments can equal. Precipitous drops in the cost of cloud computing are making it difficult...

    Sponsored By Infor

  • White Papers // Apr 2015

    Infor CloudSuite - Flexible and Proven Solutions for your Industry

    Infor CloudSuite offers a comprehensive portfolio of solutions designed to help support manufacturing, healthcare, the public sector, and more. Infor CloudSuite lets you put some of the most innovative business technologies available today to work for your business in ways that can help optimize value and minimize risk. Download this...

    Sponsored By Infor

  • White Papers // Apr 2015

    Top 5 Ways Cloud Solutions Power Business Agility

    The real power of cloud is its ability to allow businesses to “spend less time and money managing IT, and more time focused on their real priority - growth”. This has made the industry to embrace the chance and evolve the way they manage IT. This report talks about how...

    Sponsored By Infor

  • White Papers // Apr 2015

    Top 5 Reasons Why Cloud Security Beats Traditional Security

    Not long ago, security was viewed as one of the biggest obstacles to widespread adoption of cloud-based deployments for enterprise software solutions. With recent developments and cloud vendors living exclusively in the cloud world, they have managed to build a much higher level of data center and virtual system security...

    Sponsored By Infor

  • White Papers // Apr 2015

    New age security threats require new age solutions. Fixing security requires a fresh approach.

    Current endpoint software security software is resource heavy and therefore slow. With the growing number of exploits and mobile attacks available to modern cybercriminals, real-time, actionable threat intelligence within a global context is more important than ever for securing organizations. Find out how to face these challenges in this information...

    Sponsored By Webroot

  • White Papers // Apr 2015

    A Smarter Solution to Malware Prevention

    This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.

    Sponsored By Webroot

  • White Papers // Apr 2015

    Can The Enterprise Count On The Cloud For Data Protection? 

    Despite the recent negative headlines, a cloud enhanced data protection service is an ideal use of cloud storage. It provides off-site, geographically dispersed data protection so that in the event of a site or even regional disaster, an organization’s digital assets can still be recovered in a timely manner. The...

    Sponsored By HP

  • White Papers // Apr 2015

    Become a Social Business in the Cloud

    The era of social business is here. Across industries, business leaders are driving initiatives that strategically integrate social collaboration tools with business processes. These leaders recognise that social tools — such as online communities and meetings, file sharing, profiles, instant messaging, and activity management — allow people to apply relevant...

    Sponsored By IBM Australia

  • White Papers // Apr 2015

    IDC report: Improving Collaboration by Adding Social Capabilities to Email

    Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. This Technology Spotlight explores the changing dynamics in the way organisations collaborate and the impact of...

    Sponsored By IBM Australia

  • White Papers // Apr 2015

    What CIOs need to know in order to capitalize on Hybrid Cloud

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility, the flexibility to use a variety of services, the scalability to keep pace with business volume, the efficiency...

    Sponsored By EMC

  • White Papers // Apr 2015

    Modern ERP is Essential to Better Customer Experience – Infographic

    Perceptions of customer experience and service offered differ from customers to sellers. While sellers’ rate experience offered at more than 4 out 5, purchasers’ rate experience offered at 3 out of 5. Why the disconnection? Service represents 90% of the perceived sales value. So, How can we improve customer experience...

    Sponsored By Epicor

  • White Papers // Apr 2015

    eBook Series: The Changing Landscape of Technology Services

    Technology changes in the blink of an eye. New products or services are introduced and older versions are obsolete almost immediately. The convergence of Mobile, Big Data, and the Cloud is setting the stage for a new way of working, collaborating and leveraging business information. Learn more about how you...

    Sponsored By ConnectWise

  • White Papers // Apr 2015

    Why and How to Choose the Right Cloud Vendor

    Check out this informative resource to discover how to best choose a service provider for your cloud backup services. Read on to explore key requirements to look for in a provider, including: a proven track record, scalability, simple data recovery and more..

    Sponsored By HP US

  • White Papers // Apr 2015

    Security Intelligence is the Smart Way to Keep the Cloud Safe

    Many of the same characteristics that make cloud computing attractive can also make it challenging to secure. An integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide visibility and control to help better secure cloud environments.

    Sponsored By IBM

  • White Papers // Apr 2015

    The Benefits of an Integrated Approach to Security in the Cloud

    In this paper, Hurwitz & Associates interviewed customers in a variety of industries to assess how they are approaching security for their cloud deployments leveraging IBM’s Security Intelligence Platform and suggests approaches to implementing cloud security.

    Sponsored By IBM

  • White Papers // Apr 2015

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Apr 2015

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Apr 2015

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Apr 2015

    The Orchestration of Modern IT: Helping IT Accelerate Business

    Orchestration for modern IT represents a comprehensive and holistic approach to defining, building, orchestrating, managing and reporting on intelligent workflows that work with third-party tools and operational processes. This report will examine how modern IT professionals are using the process of IT orchestration to reduce capital costs, increase flexibility and...

    Sponsored By ServiceNow

  • White Papers // Apr 2015

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Apr 2015

    Safeguarding the cloud with IBM Security solutions

    IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

    Sponsored By IBM

  • White Papers // Apr 2015

    Optimized security for the modern data center

    Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands whilst achieving improvements in quality of service and business agility. Read More..

    Provided By Trend Micro

  • White Papers // Apr 2015

    The Fundamental Five: What businesses need to extract maximum value from the Cloud

    This research identifies and explores the core foundational elements of a mature cloud strategy, examining the degree to which companies have put this foundation in place and where they lie on the cloud maturity curve. Read More..

    Provided By IBM

  • White Papers // Apr 2015

    Quickbooks on Cloud: Surviving and Thriving in the World of Cloud

    With the accounting industry moving towards cloud on a fully online working model, users believe that moving their applications to the cloud is the best option they have. Hosting QuickBooks desktop edition means that the service provider installs and manages the software and files on their cloud-based servers. Users don't...

    Provided By Intuit

  • White Papers // Apr 2015

    Cloud Manager’s Balancing Act

    Read the new Forrester Research Paper: The Cloud Manager’s Balancing Act: Balancing Security and Cost without Sacrificing Time-to-Value. In this helpful study, you’ll learn: IT managers’ top concerns around time-to-value and cost The shift in balance between security and risk How to achieve adequate security, appropriate time-to-value, and cost...

    Provided By Trend Micro Australia

  • White Papers // Apr 2015

    Building the New Workplace - Google for Work

    Sometime in the last decade, we crossed into a fresh phase of the digital era. A new generation of companies born in the cloud—like Airbnb (lodging), Snapchat (messaging), Uber (transportation) and Zillow (real estate)—are using entirely new business models to disrupt the status quo. Google Chairman Eric Schmidt calls this...

    Provided By Google, Inc.

  • White Papers // Apr 2015

    IBM Software See clearly in the cloud with threat-aware identity and access management

    Securely connect people, applications and devices to cloud environments While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is...

    Provided By IBM

  • White Papers // Apr 2015

    IBM Software: Safeguarding the cloud with IBM Dyamic Could Security

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics. Read More..

    Provided By IBM

  • White Papers // Apr 2015

    Cloud vs. Hybrid: Why Cloud is Best for your Business

    Learn how cloud beats hybrid by reducing complexity, delivering better centralised security and drives innovation. Free your Enterprise from the cost of maintaining legacy hardware and software find out how cloud reduces your total cost of ownership.

    Provided By Box

  • White Papers // Apr 2015

    The Fundamental Five: Mapping the cloud maturity curve

    Cloud computing has become a business-critical issue, and organisations must take a methodical approach if they are to get the business benefits they have been told—and sold—to expect. This Report will take you through a 5 step approach to get the most out of your cloud.

    Provided By IBM

  • White Papers // Apr 2015

    Prepare for a new age of enterprise security

    This report discusses how today’s security attacks are well-funded and executed by organized teams with business-like precision. As technologies such as cloud, mobile, big data and social media become more pervasive, attacks multiply, assaults on enterprises become more sophisticated, and their impact is more extreme. Read More..

    Provided By IBM

  • White Papers // Apr 2015

    Securing Business Information in the Cloud

    Since the rise of the client-server model, IT has steadily moved from a centralized computing model to a highly decentralized one. This shift has dramatically accelerated in the last several years, fueled by mobility, cloud services and service-oriented platforms. This has created immense value for IT and end users, but...

    Provided By Box

  • White Papers // Apr 2015

    An Alternative to Today’s Distributed Content Security Chaos

    Many enterprise organizations have sensitive files stored cross the enterprise using a variety of technologies and security controls. As bad as this is, environments are actually getting worse as today's complex IT architecture is expanded with cloud and mobile computing. Addressing this problem with status quo solutions won't work, so...

    Provided By Box

  • White Papers // Apr 2015

    The Intelligent Flexible Cloud

    Network applications and services today are nearly unrecognizable from a few decades ago. The diversity, scale, and dynamic evolution of apps, services, data, and devices have led to a corresponding evolution within service provider environments. Public, private, and hybrid clouds are ascendant. Software-based approaches to more agile network management and...

    Provided By ARM

  • Videos // Apr 2015

    You don't know what you don't know! New insights for driving cloud strategy

    You don’t know what you don’t know! New insights for driving cloud strategy through analyzing existing behavior. You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2015

    Security Intelligence is the Smart Way to Keep the Cloud Safe

    Many of the same characteristics that make cloud computing attractive can also make it challenging to secure. An integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide visibility and control to help better secure cloud environments.

    Sponsored By IBM

  • White Papers // Apr 2015

    The Benefits of an Integrated Approach to Security in the Cloud

    In this paper, Hurwitz & Associates interviewed customers in a variety of industries to assess how they are approaching security for their cloud deployments leveraging IBM’s Security Intelligence Platform and suggests approaches to implementing cloud security.

    Sponsored By IBM

  • White Papers // Apr 2015

    Safeguarding the Cloud with IBM Dynamic Cloud Security

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

    Sponsored By IBM

  • White Papers // Apr 2015

    Managing Security Risks and Vulnerabilities

    Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

    Sponsored By IBM

  • White Papers // Apr 2015

    See Clearly in the Cloud with Threat-Aware Identity and Access Management

    Securely connect people, applications and devices to cloud environments While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is...

    Sponsored By IBM

  • White Papers // Apr 2015

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Apr 2015

    Securing Applications for a Safer Cloud Environment

    This white paper explains how an effective application security program can help organizations protect their assets in the cloud. It will also discuss how a secure-by-design approach to application security can help reduce risk across the IT infrastructure, in the cloud and beyond.

    Sponsored By IBM

  • White Papers // Apr 2015

    Strengthen Security with Intelligent Identity and Access Management

    Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activi-ties are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the...

    Sponsored By IBM

  • White Papers // Apr 2015

    Safeguarding the cloud with IBM Security solutions

    IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

    Sponsored By IBM

  • Downloads // Apr 2015

    Cloud Development and Test Environments

    Every software developer needs the infrastructure to design, develop, test, and deliver custom applications. Microsoft Azure gives you everything you need to provision and manage a complete development and test environment in the cloud. Azure helps you dramatically simplify and speed up the path to running a dev-test environment. And...

    Sponsored By Microsoft

  • Downloads // Apr 2015

    Big Data: New Insights Unlocked.

    Reveal new insights and drive better decision making with Azure HDInsight, a Big Data solution powered by Apache Hadoop. Learn more about the unique flexibility provided to you by HDInsight and make sure you and your organisation stay ahead of the technological curve

    Sponsored By Microsoft

  • White Papers // Apr 2015

    Cause & Effect - Enterprise Cloud Services

    A 2015 study indicated that security is one of the top 5 challenges with cloud maturity. Tangoe research shows that of lack of cloud policy, and to a lesser degree, a poorly enforced cloud policy, is one of the largest issues facing IT professionals today. Download this report which examines...

    Sponsored By Tangoe

  • White Papers // Apr 2015

    6 Best Practices of Managed Mobility Services

    The constant change in the mobility landscape often leads to a convoluted, ineffective process of mobility management. Mobility Managed Services (MMS) is emerging as a response to this complexity. MMS can address the varying levels of challenge through an objective-based setting for management in the enterprise. MMS pre-integrates solutions...

    Sponsored By Tangoe

  • White Papers // Apr 2015

    Deploy and Move Enterprise Applications in the Cloud

    What if your organisation could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options?...

    Sponsored By IBM

  • White Papers // Apr 2015

    IT Megatrends’ Impact On Infrastructure

    Your IT infrastructure plays a pivotal role in delivering the responsive services and positive experiences employees and customers demand today, serving as a bridge to a New Style of IT that integrates cloud, mobility, big data, and security. To meet these demands, infrastructure and operations leaders must work with the...

    Sponsored By HP and Intel UK

  • White Papers // Apr 2015

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Apr 2015

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Apr 2015

    Enterprise Hybrid Cloud for Dummies, EMC Special Edition

    Enterprise Hybrid Cloud for Dummies, EMC Special Edition, explores the many business benefits of the hybrid cloud, and provides advice to help businesses evolve their IT offering for greater efficiency, flexibility and security

    Sponsored By EMC

  • White Papers // Apr 2015

    Why OpenStack for Private Cloud?

    Today's dynamic business requirements cannot be effectively served by traditional segmented and siloed IT infrastructures. This technical bulletin discusses how the OpenStack project was created to respond to new requirements for an open, massively scalable, cloud operating system capable of supporting today's dynamic "cloud-aware" applications. Co-sponsored by Red Hat:

    Sponsored By Dell

  • White Papers // Apr 2015

    Work the Way You Live: What the Office Can Learn from the Smartphone

    Today's smartphone users can read the news, set up a dinner party, and buy a plane ticket before they get out of bed. In this Google for Work perspective, we share 5 powerful lessons from personal technology that will help your team be as productive with work as they are...

    Sponsored By Google Apps for Work

  • White Papers // Apr 2015

    The Evolving Role of the CIO: How Personal Technology and the Cloud are Changing the Way We Work

    As the role of IT rapidly changes from enforcer to enabler, CIOs have the opportunity to become strategic partners to the business. In this Google for Work collection, Google's SVP for Technical Infrastructure, Urs Hölzle and CIO, Ben Fried discuss three trending topics that can help you transform your organization:...

    Sponsored By Google Apps for Work

  • White Papers // Apr 2015

    Best Practices for Selecting a Vulnerability Management (VM) Solution (French)

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Apr 2015

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Apr 2015

    Cloud Security Best practices

    In this whitepaper Best Practices for Public Cloud Security, Forrester shares cloud security survey results and best practices for addressing shared security responsibility. Forrester advocates a three-part model to secure data and applications in the cloud and specifically discusses how to achieve each recommendation: Verify and secure all resources Limit...

    Sponsored By Trend Micro Australia

  • White Papers // Apr 2015

    State of Public Cloud Security

    The majority of organisations using the cloud today don’t understand their shared security responsibilities, according to a recent survey by Forrester Consulting. This finding is alarming, especially with the constant revelations of major data breaches. Whether you’re just starting your cloud journey and want to know how others are approaching...

    Sponsored By Trend Micro Australia

  • Webcasts // Apr 2015

    HDS Video: Does Your Enterprise Cloud Measure Up?

    According to IDC, spending on cloud services will surpass $125 billion by 2018, as enterprises seek to reduce IT costs, increase agility, and take advantage of new opportunities like mobility, big data and the Internet of Things. In many cases, however, the push to the cloud is coming from outside...

    Sponsored By Hitachi Data Systems

  • White Papers // Apr 2015

    5 Myths of Cloud Computing

    Like many industries, the IT industry has a habit of latching onto buzzwords and then applying them everywhere. The term “cloud” is certainly no exception—and, like other similar terms, its use is varied and oftentimes inaccurate. This report focuses on the myths of the cloud buzzword. HP is the...

    Provided By Hewlett-Packard (HP)

  • eBooks // Apr 2015

    Hybrid Cloud for Dummies eBook

    IT organizations need the right tools and technologies to make hybrid cloud strategies a flexible and efficient reality for their organizations. Learn how to address inhibitors to cloud adoption, recognize data challenges in the cloud and seamlessly move data in the cloud.

    Provided By NetApp

  • White Papers // Apr 2015

    The Fundamental Five: Mapping the cloud maturity curve

    Cloud computing has become a business-critical issue, and organisations must take a methodical approach if they are to get the business benefits they have been told—and sold—to expect. This Report will take you through a 5 step approach to get the most out of your cloud.

    Provided By IBM

  • White Papers // Apr 2015

    The Forrester Wave Private Cloud Solutions

    Enterprises look to private clouds for more than just virtual infrastructure provisioning. Private cloud vendors have started to bundle additional capabilities into their solutions, including pervasive VM management capabilities, design tools for complex application templates, and service catalogs. HP is the sponsor of this material. By submitting your information...

    Provided By Hewlett-Packard (HP)

  • Downloads // Apr 2015

    The inside story of how Aaron Levie and his childhood friends built Box into a $2 billion business

    One of the most hotly anticipated tech IPOs of 2014 is run by four childhood classmates who grew up and built a cloud computing juggernaut during their 20s. This TechRepublic cover story from Rachel King tells how Aaron Levie and his friends created the company and grew it into one...

    Provided By TechRepublic

  • White Papers // Apr 2015

    Fog Computing and Its Role in the Internet of Things

    Fog Computing extends the Cloud Computing paradigm to the edge of the network, thus enabling a new breed of applications and services. Defining characteristics of the Fog are: low latency and location awareness; wide-spread geographical distribution; mobility; very large number of nodes, predominant role of wireless access, strong presence of...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2015

    Secure Mobile Access

    Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.

    Provided By Dell Software

  • Webcasts // Apr 2015

    Live Webcast: A Fast, Secure Path to the Cloud

    Many companies are wary of sending their sensitive and highly regulated assets to public cloud resources. The cost efficiencies and scalability of cloud models, however, are too compelling to ignore. From on-demand compute capacity to modernized backup and recovery tools, your organization can't afford to write off the cloud. ...

    Provided By NetApp

  • White Papers // Apr 2015

    Stepping Into the Cloud:  A Practical Guide to Creating and Implementing a Successful Cloud Strategy

    There’s no such thing as “the cloud,” says this Frost & Sullivan executive brief. It’s more useful to think of the cloud as shorthand for a range of service and deployment models. This practical guide offers steps for moving your company into the cloud, at whatever pace you prefer, with...

    Provided By IBM

  • White Papers // Apr 2015

    Business Resiliency: The Need for 24/7/365 Operations

    Today’s customers and business partners expect 24/7/365 uptime. Server and infrastructure outages can cost thousands of dollars every minute, when you calculate the costs of remediation, the lost revenue and productivity, the reputation damage, and the penalties associated with SLA and regulatory non-compliance. Many companies would consider their tolerance for...

    Provided By IBM

  • White Papers // Apr 2015

    MDM Technology: How to Create the Perfect Solution

    As organizations continue to institute Bring Your Own Device policies, the ability to manage and protect the devices carrying company data will be a critical aspect of any IT department’s operations. Finding the right technology company to help simplify and secure the management of mobile devices will become a top...

    Provided By Skyhook Wireless

  • Downloads // Apr 2015

    Big Data in HR and Finance: Understanding the Real Value

    Big Data continues to create new ways of gathering and analyzing information. In the latest research by Harvard Business Review Analytics Services, a real-world lens of big data is provided for HR and Finance. View this infographic below to discover why big data matters to you and your organization.

    Provided By Workday

  • White Papers // Apr 2015

    Multi-Layer QOS Based Task Scheduling Algorithm for Cloud Environments

    Quality of service is an inevitable issue needing to be deal with in task scheduling of cloud computing. This paper proposes a multi-layer QOS based task scheduling algorithm for cloud computing. Firstly, in order to reflect the precedence relation of tasks, the proposed algorithm computes the priority of tasks according...

    Provided By International Journal of Advanced Computer Technology (IJACT)