IT Agents  >   Industry Organizations  >   Information Industry Organizations  >  

CNI

RSS Feed   
CNI White Papers (View All Report Types)
 
Dell OptiPlex 7070 Ultra Use Case Analysis
sponsored by Dell Technologies Partner Program
WHITE PAPER: This in depth white paper explores both PC form factors and Dell’s commercial desktop suites. Download to learn more about macro trends and Dell OptiPlex 7070 design, industry use cases and more.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Dell Technologies Partner Program

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Real World Stories of IT Admin Heroes
sponsored by Pure Storage
WHITE PAPER: Check out this compendium of case studies to see 7 shining examples of everyday IT admin heroes as they use Pure Storage to help their organizations simplify and transform operations for mission-critical databases, virtualized environments, and analytics with all-flash and NVMe.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Pure Storage

CrateDB vs. Time Series Databases
sponsored by CrateIO
WHITE PAPER: The time-series data generated by factories is a crucial piece for organizations building complete, IoT fueled pictures of their operations. Unfortunately, manufacturing organizations are struggling with the complexity of this data. Read on to learn how 3 time series databases compare to IoT optimized CrateDB and learn some of the key differences.
Posted: 09 Feb 2021 | Published: 09 Feb 2021


Addressing Digital Risks in Business-Critical Infrastructures
sponsored by Schneider Electric
WHITE PAPER: In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.
Posted: 29 May 2020 | Published: 29 May 2020

Schneider Electric

Secure IT Asset Disposition: Achieving Business Value While Mitigating Risks
sponsored by Iron Mountain
WHITE PAPER: The risks of not having an IT asset disposition (ITAD) solution are substantial.Download this white paper for advice on how to dispose of old IT equipment successfully while achieving security, compliance, and environmental goals.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Iron Mountain

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Cybersecurity Readiness Study: An Executive Summary
sponsored by ArcSight, an HP Company
WHITE PAPER: This study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats.
Posted: 17 May 2011 | Published: 17 May 2011

ArcSight, an HP Company

Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

ComputerWeekly.com

Computer Weekly - 16 February 2021: How Covid-19 has hit IT salaries and job prospects
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, our salary survey reveals the impact of the coronavirus pandemic on IT professionals' wages and job security. A potentially deadly cyber attack on a US water plant highlight the risks to critical infrastructure. And we find out how NHS Scotland is using tech to support its vaccine roll-out. Read the issue now.
Posted: 15 Feb 2021 | Published: 16 Feb 2021

ComputerWeekly.com

A Computer Weekly buyer's guide to network upgrades for cloud-native infrastructure
sponsored by ComputerWeekly.com
EGUIDE: With enterprises increasingly turning to digitisation and cloud computing, there is renewed interest in networking and a greater need for agility. In this 15-page buyer's guide, Computer Weekly looks at what IT decision-makers should be thinking about in their adoption of cloud-native applications.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

ComputerWeekly.com

Multi-pronged approach to cyber security professional development
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ComputerWeekly.com

Kubernetes for Operators
sponsored by VMware Tanzu
EBOOK: One of operations’ main tasks is to ensure everything operates reliably at scale. Thanks to a combination of cloud-native technologies and containers, the goal of scalability is now much more attainable. In this Kubernetes for Operators eBook, learn about the 2 crucial elements of Kubernetes, the top 6 questions about Kubernetes, and more.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

VMware Tanzu

Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to software-defined networking in the enterprise
sponsored by ComputerWeekly.com
EGUIDE: The trends of software-defined networking have implications for many other areas of a business. In this 15-page buyer's guide, Computer Weekly looks at campus LAN design, the differences between SDN and DevOps, and how to connect to a container-based architecture.
Posted: 18 Sep 2018 | Published: 18 Sep 2018

ComputerWeekly.com

Computer Weekly – 15 August 2017: Tech takes the lead in the Tour de France
sponsored by ComputerWeekly.com
EZINE: When watching sports on television you are consistently confronted with a barrage of data, giving insight into the most complicated inner workings of football, tennis, cricket, etc., but never in cycling. Access this week's ComputerWeekly to learn how IoT is being introduced to the Tour de France and what that means for the viewer.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

ComputerWeekly.com

Software-Defined, Full-Stack Network Modernization for Hybrid/Multi-Cloud
sponsored by VMware Intel
RESOURCE: According to business decision makers surveyed, 21% say poor web or cloud application performance due to network connectivity is among their biggest productivity drains. In this resource, learn how VMware and Intel are helping organizations address their application connectivity service needs.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

VMware Intel

Diving Deep into Kubernetes Networking
sponsored by Rancher
WHITE PAPER: Networking is a critical component for the success of a Kubernetes implementation. Download this ebook—designed for operators and developers alike—to review Kubernetes networking from basics to advanced topics.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Rancher

Application Delivery Solutions
sponsored by Citrix
WHITE PAPER: Your ADC plays a pivotal role in unlocking the true potential of microservices and containers like Kubernetes. In this white paper, learn about Citrix app delivery solutions and find out how to get your microservices-based apps to production faster.
Posted: 26 Feb 2021 | Published: 31 Dec 2020

Citrix

Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

ComputerWeekly.com

Jargon Buster Guide to Virtualisation
sponsored by ComputerWeekly.com
EGUIDE: This jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates.
Posted: 14 Jan 2019 | Published: 14 Jan 2019

ComputerWeekly.com

4 Ways MSPs can Fine-Tune Their Cybersecurity Go-To-Market Strategy
sponsored by Carbonite
EBOOK: The biggest challenge with bringing a cybersecurity offering to market is meeting the expectations of the prospective customer. In this eBook, explore four ways to hone your cybersecurity GTM strategy. Plus, some guidance on how to approach bringing your cybersecurity offering to market. Download here to read more.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Carbonite

Top 10 Australian IT stories of 2017
sponsored by ComputerWeekly.com
EGUIDE: In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to improve work productivity, upgrade its supercomputing infrastructure, harness the internet of things to improve business operations and realise its space ambitions.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

ComputerWeekly.com

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 06 Apr 2020 | Published: 07 Apr 2020

ComputerWeekly.com

Computer Weekly – 18 July 2017: Airbus secures critical infrastructure
sponsored by ComputerWeekly.com
EZINE: This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

This is what we die for
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This investigation by Amnesty International examines human rights abuses in the extraction of cobolt and the extent to which manufacturers have conducted due diligence in sourcing cobolt for mobile phone production.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Production Kubernetes
sponsored by VMware Tanzu
ANALYST REPORT: Many organizations have an existing Kubernetes footprint, there are far fewer that have reached production—and even less operating at scale. In this guide, O’Reilly breaks down all you need to know about Production Kubernetes, from building application platforms on Kubernetes to deployment models. Download the guide here.
Posted: 03 Feb 2021 | Published: 03 Feb 2021

VMware Tanzu

Networking Engineering in Extraordinary Places
sponsored by SearchNetworking.com
EZINE: In this edition of the Network Evolution e-zine, find out how network locations dictate the need to adapt to new and sometimes unusual challenges.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

SearchNetworking.com

Accelerating Edge Computing with Arm and Rancher k3s Lightweight Kubernetes
sponsored by Rancher
WHITE PAPER: Download this whitepaper to learn more about the rise of Kubernetes as a piece of your edge computing strategy, and how you can adopt Kubernetes quickly at your organization.
Posted: 29 Oct 2019 | Published: 30 Sep 2019

Rancher

Container Monitoring and Observability
sponsored by Splunk
WHITE PAPER: This whitepaper lays out the importance of a monitoring and observability strategy for containers, highlighting the role of monitoring on AWS container environments and how to decide which AWS container service works best with microservices-oriented applications. Download the guide here for safe-keeping.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Splunk

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

CW ANZ: Prepare for EU data law
sponsored by ComputerWeekly.com
EZINE: Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

ComputerWeekly.com
 
Browse by Report Type:
CNI White Papers | CNI Multimedia | CNI IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info