ACM White Papers

(View All Report Types)
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012


Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011


Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Posted: 26 Nov 2013 | Published: 31 Jul 2013


Fighting Back Against Network Complexity
sponsored by Infoblox
WHITE PAPER: Network management is becoming increasingly difficult, costly and time-consuming. Legacy manual procedures cannot keep up with today's complex networks. Read this white paper to learn why implementing network automation is critical to managing your network.
Posted: 20 Nov 2013 | Published: 31 Oct 2013


Oracle IT Modernization Series Modernization: The Path to SOA
sponsored by Oracle Corporation
WHITE PAPER: IT organizations are under increasing pressure to reduce costs while at the same time increase their ability to react to ongoing business demands. To achieve this they need to take advantage of the cost savings and flexibility of a service-oriented architecture (SOA). Read this white paper to learn about more about SOA and its benefits.
Posted: 14 May 2009 | Published: 01 Aug 2008

Oracle Corporation

Sase: The Optimal Architecture To Secure And Connect The New Enterprise Perimeters
sponsored by SubRosa
WHITE PAPER: The dissolving network perimeter requires a new enterprise perimeter architecture not based on one single design. Read this e-book for key components and 4 use cases for the Secure Access Service Edge (SASE), a unified platform that offers total visibility and control for the modern enterprise without compromising security.
Posted: 28 Jun 2022 | Published: 28 Jun 2022


Recovery For Saas Apps When Disaster Strikes
sponsored by Keepit USA Inc.
WHITE PAPER: With cyberattacks increasing in frequency and complexity, organizations need to be more confident than ever in their disaster recovery strategy. How can you ensure the availability of SaaS data in the wake of disaster? Read on to understand how Keepit enables business continuity and disaster recovery by safeguarding SaaS data in 7 steps.
Posted: 20 Oct 2022 | Published: 20 Oct 2022

Keepit USA Inc.

Demystifying the OWASP API Security Top 10
sponsored by Cequence
EBOOK: To protect today’s API centric development methodology developers are rapidly embracing the benefits of the OWASP API Security Top 10. This interactive guide lists the common root causes, prevention tips, application security platform solution benefitsand more. Read on to get started.
Posted: 12 Oct 2021 | Published: 12 Oct 2021


sponsored by Comforte AG
WHITE PAPER: Comforte’s SecurDPS Connect can help accelerate data-centric protection of structured, semi-structured, and unstructured data in modern applications and hosted application workflows, rapidly reducing potential exposure and the risks associated with it. Open this solution brief to learn more.
Posted: 01 Feb 2022 | Published: 01 Feb 2022

Comforte AG

Pipeline-Native Scanning for Modern Application Development
sponsored by Contrast Security
WHITE PAPER: Tap into this white paper to learn about an approach to application security that uses demand-driven static analysis to automatically triage vulnerabilities according to next-step actions within a modern development environment.
Posted: 07 Oct 2021 | Published: 07 Oct 2021

Contrast Security

The Trustless Access Platform
sponsored by BastionZero
DATA SHEET: As data becomes increasingly important, access presents one of the most sensitive areas for an organization’s security. This data sheet looks how the BastionZero Trustless Access Platform aims to enable organizations to manage their access and reduce risk, boost productivity, automate compliance and enhance visibility. Read on to learn more.
Posted: 23 Jan 2023 | Published: 24 Jan 2023


The Science of Cross-Sell and Upsell
sponsored by TechTarget
RESEARCH CONTENT: Download this research brief to explore a new 5-step approach for implementing a more structured and consistent approach to cross-selling and upselling.
Posted: 08 Feb 2021 | Published: 09 Jun 2020


Hosted Enterprise Unified Communications
sponsored by CBTS
CASE STUDY: The State of Ohio was not only using an antiquated phone system, they were doing little to remediate their overarching issue – a lack of modern communications and collaboration technology. In this case study, learn the story of how CBTS hosted communications solutions allowed the Ohio government to communicate more efficiently and effectively.
Posted: 11 Jun 2021 | Published: 14 Mar 2019


Presentation Transcript: Enabling Total Spend Analysis in the Enterprise
sponsored by TIBCO Spotfire Division
PRESENTATION TRANSCRIPT: In this transcript of the webcast, TIBCO Spotfire's John Callan will discuss how you can perform Total Spend Analysis to help drive supplier consolidation, contract compliance and identify maverick spend in a user-friendly, visual analysis environment.
Posted: 04 Dec 2009 | Published: 04 Dec 2009

TIBCO Spotfire Division

Scale Agile & DevOps
sponsored by
EBOOK: Avoid losing time and money to development misalignment; take a look at this e-book to see how your organization can strive towards coordinated consistency through unifying Agile and DevOps at scale.
Posted: 17 Jun 2022 | Published: 17 Jun 2022


How To Detect Manufacturing Anomalies Industry Solutions, Applications, And Autoencoder Machine Learning Models
sponsored by TIBCO
WHITE PAPER: Efficient and automatic anomaly detection capabilities go a long way towards building the resilience, quality control, and data savviness that defines leading manufacturers. Access this white paper to learn how TIBCO technologies power a variety of anomaly detection approaches and use cases, creating value from your industrial data.
Posted: 30 Mar 2022 | Published: 30 Mar 2022


The ROI Of A Network Digital Twin
sponsored by Forward Networks
EBOOK: Tap into this e-book to explore the financial return on aligning your team, simplifying troubleshooting, and avoiding outages.
Posted: 22 Mar 2022 | Published: 22 Mar 2022

Forward Networks

New Industries Finding Useful Roles for Dynamic Case Management
sponsored by Eccentex
ESSENTIAL GUIDE: In this expert handbook, ebizQ contributor Alan R. Earls reveals current dynamic case management (DCM) trends and explores how the approach is expanding to new fields. Plus, Stephanie Mann, ebizQ's assistant site editor, shares feedback from industry observers about picking the right DCM platform. Read on to learn more.
Posted: 29 Nov 2012 | Published: 29 Nov 2012


Dynamic Case Management Trends and Tips
sponsored by eBizQ
EBOOK: In this expert e-guide, DCM trends are addressed, including how the approach is gaining traction in new fields, such as the oil-and-gas industry. Inside, learn tips form analysts on managing DCM initiatives and how to choose the right DCM platform.
Posted: 05 Jun 2014 | Published: 05 Jun 2014


Presentation Transcript: Mobilizing Your Apps and Data Confidently in a BYOD World
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: Access this presentation transcript to learn about cutting edge technology and techniques that can not only confidently enable a BYOD strategy, but also help you find productivity and competitive advantages previously unavailable, even in highly regulated and secure industries.
Posted: 05 Jun 2012 | Published: 04 Jun 2012

Symantec Corporation

A 3-Step Guide to Creating Authentic B2B Webinar Content
sponsored by BrightTALK by TechTarget
BRIGHTTALK: To enhance marketing and sales content, B2B companies have turned to webinars to open the floor to live engagement and reach new prospects to deliver revenue growth. However, many struggle to direct well-executed webinars and connect with their audiences. Access this guide to learn the best practices.
Posted: 16 Nov 2022 | Published: 16 Nov 2022

BrightTALK by TechTarget

E-Book: Optimizing BI and Analytics in Healthcare
sponsored by Tableau Software
EBOOK: BI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare.
Posted: 21 May 2010 | Published: 21 May 2010

Tableau Software

Becoming an experience-based business
sponsored by Adobe
WHITE PAPER: Learn how organisations building on a revolutionary foundation for how they go to market are succeeding because of their focus on providing excellent customer experiences.
Posted: 08 Jun 2021 | Published: 08 Jun 2021

TOPICS:  IT Management

Zero Trust with cert-manager, Istio and Kubernetes
sponsored by Venafi
WHITE PAPER: While there are many benefits to cloud-native, their complexity means traditional security measures are no longer sufficient. This white paper addresses the primary cloud-native factors organizations must consider when adopting Istio, including how to align with modern Zero Trust networking principles. Read on to learn more.
Posted: 23 Nov 2022 | Published: 24 Nov 2022


SIP Management: Top benefits and potential challenges
sponsored by Metaswitch Networks
EGUIDE: This expert E-Guide discusses the benefits of SIP trunking and highlights best practices to address the potential challenges.
Posted: 27 Sep 2011 | Published: 27 Sep 2011

Metaswitch Networks

The 8 Best Programming Languages for Enterprise Development
sponsored by Sphere Software
EGUIDE: Whether your development is web-centric or cloud-based, this expert e-guide helps you evaluate programming languages and app frameworks for targeting back-end apps. From increasingly popular languages like Python to tried-and-true, established ones like JavaScript, uncover a comparison of 8 back-end programming languages.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Sphere Software

From Zero To Trustless
sponsored by BastionZero
EBOOK: If data is an organization’s treasure, trust is the key, and anytime an organization assigns trust or access, it is handing out the key to its most important assets. This e-book rethinks trust by examining the role of privilege in traditional remote access tooling, challenges to these approaches
Posted: 23 Jan 2023 | Published: 24 Jan 2023