NN White Papers

(View All Report Types)
Fraud Prevention and Detection for Credit and Debit Card Transactions
sponsored by IBM
WHITE PAPER: Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
Posted: 07 Jul 2011 | Published: 01 Aug 2009

IBM

Building Your Backup and Disaster Recovery Plan 101
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Small and medium businesses cannot afford to lose access for their data. Research shows that even brief server failures lead most smaller businesses to shut their doors for good. In light of this, any business should develop a workable backup and disaster recovery plan.
Posted: 04 Jul 2011 | Published: 30 Jun 2011

StorageCraft Technology Corporation

The Future of Work Is Now
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This whitepaper will help you learn about the workplace today, the people in it, and the trends they are driving that you need to know about.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Citrix Online Go To Meeting

The Economic Evolution of Enterprise Storage
sponsored by Hitachi Vantara
WHITE PAPER: The latest technologies innovations provide a big, evolutionary stride in economically superior storage designed to swiftly address mounting data challenges and changing business demands. With 3D scaling and dynamic tiering, IT leaders can dynamically scale up, scale out and scale deep for increased performance and scalability.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Hitachi Vantara

Cloud Backup and Recovery
sponsored by Vision Solutions
WHITE PAPER: The right way to evaluate the quality of your system and data protection is to evaluate the Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These metrics define how long you think it will take you to get back online and how current the data has to be. Read this white paper to learn more.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

Vision Solutions

Customer Insights Hyperautomation and Low Code Testimonials
sponsored by ServiceNow
EBOOK: In this e-book, discover how – and why – organizations like NASCAR and Hancock Whitney Bank are leveraging hyperautomation and low-code development.
Posted: 23 Jan 2024 | Published: 23 Jan 2024

TOPICS:  .NET
ServiceNow

Presentation Transcript: Best Practices to Gain Visibility and Control of Your Demand Network
sponsored by E2open
PRESENTATION TRANSCRIPT: In this presentation transcript of the "Best Practices to Gain visibility and Control of Your Demand Network" webcast E2open and AMR Research will discuss new demand network management trends and technologies that will enable multi-enterprise companies to maximize the potential of their demand networks by providing more visibility and control.
Posted: 03 Jun 2009 | Published: 03 Jun 2009

E2open

Top 10 cyber crime stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

Top VPNs secretly owned by Chinese firms
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

Innovative Design for Storage Enclosures Reduces Field Drive Returns by 62%
sponsored by Western Digital
WHITE PAPER: Learn how innovation in the storage enclosure hardware can actually pay great dividends in terms of cost, performance and reliability and learn how Western Digital's deep knowledge of the interaction of devices and systems can help ensure an efficient design.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

TOPICS:  IT Management
Western Digital

Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Infosec culture: A former helicopter pilot's perspective
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 08 Feb 2021 | Published: 26 Mar 2018

TechTarget ComputerWeekly.com

Advanced Virtualization E-Book: Chapter 7 - Network Virtualization: Unifying the Data Center
sponsored by TechTarget Security
EBOOK: We are potentially at the beginning of a new generation of IT administrators who manage a range of technologies outside of the traditional realm of virtualization. Read this E-Book to learn more.
Posted: 04 Aug 2010 | Published: 04 Aug 2010

TechTarget Security

E-Book: Data loss prevention strategies, practices and tools
sponsored by TechTarget Security
EBOOK: Data loss prevention strategies, practices and tools are more important than ever. Read this e-book for expert advice on DLP, encryption, risk management and more.
Posted: 18 Nov 2009 | Published: 18 Nov 2009

TechTarget Security

Email Security: Never more important
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

Top 10 cyber security stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
Posted: 08 Feb 2021 | Published: 23 Dec 2019

TechTarget ComputerWeekly.com

Welcome to the New API Industry
sponsored by TechTarget Networking
EZINE: In this issue of Network Evolution, we explore how the API industry is helping enterprises seek better ways to improve app performance, reach their audiences, and fulfill business needs. You'll also learn about hyperscale techniques, how to move from leased circuits to a dark fiber network, and more.
Posted: 01 Aug 2017 | Published: 01 Aug 2017

TechTarget Networking

Leverage the Network Infrastructure for Competitive Success
sponsored by Cisco Systems, Inc.
WHITE PAPER: This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Advanced Virtualization E-Book - Chapter 6: Recognizing the Benefits of Desktop Virtualization
sponsored by TechTarget IT Operations
EBOOK: In Chapter 6 of the Advanced Virtualization e-book, Mike Laverick outlines some of the benefits that desktop virtualization has over server-based computing models. He also details a few drawbacks of VDI and makes predictions on how the market will respond to further improve desktop virtualization.
Posted: 23 Sep 2010 | Published: 05 May 2010

TechTarget IT Operations

Advanced Virtualization E-book - Chapter 4: Virtual Storage Strategies and Management
sponsored by DellEMC and Intel®
EBOOK: Chapter 4 of the Advanced Virtualization e-book will examine the nuances of virtual storage, including provisioning, performance and remote storage methods that help ensure you allocate the right amount of storage - at the right performance level - for each application.
Posted: 29 Apr 2010 | Published: 29 Apr 2010

DellEMC and Intel®

Advanced Virtualization E-book - Chapter 5: Avoid Security Holes in the Virtual Data Center
sponsored by TechTarget IT Operations
EBOOK: In Chapter 5 of the Advanced Virtualization e-book, security experts Danielle Ruest and Nelson Ruest explain how to identify, map out and prevent some of the most common resource pool threats. The authors also debunk five common security misconceptions of server virtualization.
Posted: 29 Apr 2010 | Published: 29 Apr 2010

TechTarget IT Operations

Advanced Virtualization E-Book - Chapter 3: Essentials of High-Availability Planning
sponsored by Dell, Inc. and Intel®
EBOOK: Design, management and testing can make or break high availability in your virtual environment. Chapter 3 of this Advanced Virtualization E-Book discusses the essentials of high availability planning.
Posted: 05 Mar 2010 | Published: 05 Mar 2010

Dell, Inc. and Intel®

Modern Mainframe Management Challenges E-Book: Running New Workloads like Linux
sponsored by TechTarget Data Center
EBOOK: Access this e-book to learn the best ways to use mainframes for running new workloads such as those associated with the Linux operating system and assess the TCO evidence that the mainframe can now be a low-cost platform for workloads.
Posted: 02 Feb 2011 | Published: 02 Feb 2011

TechTarget Data Center

Running New Workloads Like Linux
sponsored by TechTarget Data Center
EBOOK: This expert e-book explores the changes to mainframes in the past ten years. Discover how your organization can lower TCO and achieve other benefits by moving workloads to the mainframe.
Posted: 05 Jun 2012 | Published: 31 Dec 2011

TechTarget Data Center

A New Call for Alignment Between Business Needs and Enterprise Networks
sponsored by TechTarget Networking
EZINE: In this issue of Network Evolution e-zine, we learn how more comprehensive IT-business strategic alignment would aid network managers. We focus on 3 key areas: hardware management, UC, and network security.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

TechTarget Networking

Computer Weekly – 4 June 2019: GDPR one year on – is it working?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jun 2019

TechTarget ComputerWeekly.com

Advanced Virtualization E-Book: Essentials of High-Availability Planning
sponsored by Dell, Inc. and AMD
EBOOK: This e-book provides planning and testing tips for establishing high availability in a virtual environment, plus highlights effective management tools and procedures currently available.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Dell, Inc. and AMD

Advanced Virtualization E-Book: Hypervisor Management and Optimization
sponsored by DellEMC and Intel®
EBOOK: All hypervisors essentially do the same job, but not in the same way. The three top hypervisors all have differences that require specific management tactics. Read this e-book to learn best practices and recommendations you can follow to optimize and maintain VMware ESX, Microsoft Hyper-V, and Citrix XenServer.
Posted: 25 Aug 2010 | Published: 25 Aug 2010

DellEMC and Intel®

Advanced Virtualization E-Book: Chapter 1 - Disaster Recovery Strategies for the Virtual Data Center
sponsored by DellEMC and Intel®
EBOOK: A solid disaster recovery plan can overcome bandwidth and latency issues without any data loss. Techniques to restore data and prevent loss vary in the virtual data center. In Chapter 1 of this eBook, you'll learn about disaster recovery strategies for the virtual data center.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

DellEMC and Intel®

Machine Sensor Data and the Revolution in Manufacturing
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Sensors and machines are the fastest source of growth in data. Find out how to use this data to drive productivity.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  IT Management
Hewlett-Packard Enterprise