CSI Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Computer Weekly 16 August 2011: Read our analysis of the week’s biggest news stories in IT and in-depth features examining the latest technology trends
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week’s issue of Computer Weekly we kick-off a programme of content aimed at providing a resource for IT training, education and career development. We also look at the controversial supplier contracts for the NHS IT programme, and examine the challenges of Big Data - plus our usual analysis of the week’s news. Download the latest issue now.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

TechTarget ComputerWeekly.com

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011


Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011


The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012


The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

CSI Endpoint Security Survey 2022
sponsored by Tanium
RESOURCE: The recent, massive shift to remote work has increased the complexity of securing the endpoint. The 2022 Endpoint Security Visibility Report reveals real impacts to business when there is a security incident. Download the report to explore the data.
Posted: 29 Dec 2021 | Published: 30 Dec 2021


Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009


Red Hat OpenShift on Nutanix HCI
sponsored by Nutanix
ESG: Discover in this ESG technical validation how Red Hat OpenShift on Nutanix HCI can help your organization reduce complexity in your hybrid cloud environments.
Posted: 08 Mar 2023 | Published: 08 Mar 2023


How HammerSpace is dismantling data silos
sponsored by HammerSpace
EGUIDE: Jump into this E-Guide to learn why Primary Data was doomed to fail, how HammerSpace is doing things differently, and how the addition of Kubernetes capabilities could change your container storage strategy.
Posted: 12 Mar 2019 | Published: 12 Mar 2019


Veritas Alta™ Application Resiliency and Veritas Alta Shared Storage
sponsored by Veritas
WHITE PAPER: So many organizations are turning to cloud transformation and multi-cloud operations. They are also adding cloud-based container services to provide the functionality needed to streamline operations. When added with a software-defined persistent storage and resiliency functionality, and efficiency can be achieved. Read on to learn more.
Posted: 15 Mar 2023 | Published: 15 Mar 2023


Achieving Persistent Backup for Kubernetes
sponsored by Catalogic Software
EGUIDE: Explore this expert guide to learn how persistent backup for Kubernetes can be achieved with CloudCasa and learn how new backup strategies are changing IT approaches to container management.
Posted: 28 Sep 2021 | Published: 10 Aug 2021

Catalogic Software

Why Traditional Backup Won’t Work for Kubernetes
sponsored by Pure Storage
EBOOK: Traditional backup methods don’t work for containers. So, what should you do? This e-book details why traditional methods are ineffective for Kubernetes and what you can use to backup your containers. Access the e-book here.
Posted: 07 Feb 2023 | Published: 08 Feb 2023

Pure Storage

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

Master Storage for Complex IoT and Cloud Environments
sponsored by Portworx
EGUIDE: Read this expert guide to learn how solutions like persistent storage in the cloud, Kubernetes-based backups, and stateful containerized backup from organizations like Portworx can be used to master challenging storage situations like IoT and cloud environments.
Posted: 03 Jun 2021 | Published: 28 May 2021


Container Storage and Data Protection for Applications on Kubernetes
sponsored by Pure Storage
EBOOK: This O’Reilly e-book explores everything you need to know about data protection and storage on Kubernetes. The e-book covers:Why Kubernetes is complex and how traditional storage fails to meet the needs of modern cloud native appsBest practices for running stateful applications on KubernetesRead the O’Reilly e-book here.
Posted: 16 Mar 2023 | Published: 16 Mar 2023

Pure Storage

GigaOm Solution Profile: CloudCasa by Catalogic
sponsored by Catalogic Software
ANALYST REPORT: This new GigaOm report evaluates CloudCasa, a Kubernetes backup SaaS offering. Download a copy of the report to see how CloudCasa stacks up according to GigaOm’s criteria for evaluating Kubernetes data protection.
Posted: 16 Mar 2022 | Published: 16 Mar 2022

Catalogic Software

How to implement ITSM and establish a strategy beyond IT metrics
sponsored by TechTarget CIO
EGUIDE: In this expert e-guide, learn how one CIO was able to leverage ITSM to improve business processes as well as incorporate the ITSM strategy to a mobile workforce.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

TechTarget CIO

CloudCasa Backup-as-a-Service
sponsored by Catalogic Software
DATA SHEET: Explore this Evaluator Group product brief to learn about the usage and deployment of Catalogic CloudCasa and see what sets it apart from the competition.
Posted: 22 Oct 2021 | Published: 22 Oct 2021

TOPICS:  Backups
Catalogic Software

Bridging the Legacy-to-Cloud-Native IT Journey with Harvester
sponsored by SUSE
ANALYST REPORT: Digital-first business is forcing organizations to adapt to more environments, culminating in a mix of virtual machines and containers running in the cloud, at the edge, on converged and hyperconverged platforms, and on traditional on-premises infrastructure. Read this IDC report to learn how to best manage these environments.
Posted: 31 Jan 2023 | Published: 01 Feb 2023


Model Monitoring and its Importance in Production AI Systems
sponsored by Fosfor
WHITE PAPER: According to Gartner, poor data quality costs organizations an average of $12.9 million each year. You need to ensure your data quality is high, and one of the most effective ways to do that is to leverage machine learning model monitoring. Access this white paper to learn what model monitoring is and how it addresses data & concept drift.
Posted: 04 Mar 2023 | Published: 04 Mar 2023


Presentation Transcript: VDI in Branch Offices
sponsored by Virtual Bridges
PRESENTATION TRANSCRIPT: This transcript of the video "Using VDI at a Branch Office" , featuring desktop virtualization experts Brian Madden and Gabe Knuth, provides guidelines for extending central management to remote locations.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Virtual Bridges

CloudCasa - Kubernetes and Cloud Database Backup as a Service
sponsored by Catalogic Software
WHITE PAPER: CloudCasa helps organizations quickly and easily backup their complex cloud applications from Kubernetes environments to cloud databases, without extensive prior expertise. Read on learn more about CloudCasa’s offerings, including free storage management via one centralized platform that makes it easy to back up and recover your critical data.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

TOPICS:  Backups
Catalogic Software

Application Resiliency for Multi-Cloud Deployments
sponsored by Veritas
WHITE PAPER: Multi-cloud is a new buzzword in technology that refers to connecting services and infrastructures across public cloud platforms. Organizations staying ahead of the curve are using multi-cloud to increase resiliency and efficiency. Diversifying your cloud footprint allows for greater resiliency, and better use of infrastructure. Read on to see why.
Posted: 15 Mar 2023 | Published: 15 Mar 2023


Kubernetes Data Protection Without Tears
sponsored by Catalogic Software
WHITE PAPER: Read this white paper to learn about the need to protect Kubernetes infrastructure, address holes in current backup management software offerings, and examine how Catalogic Software and CloudCasa can help with SaaS backup.
Posted: 30 Aug 2021 | Published: 30 Aug 2021

TOPICS:  Data Management
Catalogic Software

The Hybrid Cloud Journey Takes Time, but Well Worth the Wait
sponsored by VMware and VCE
EGUIDE: This expert guide will help you as you look to move your SAP environment to the cloud.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

VMware and VCE

Kubernetes for Operations Cheat Sheet
sponsored by D2IQ, Inc.
WHITE PAPER: Gartner predicted that by 2022, more than 75% of global organizations would be running containerized applications in production. Keep this cheat sheet handy for all your container needs.
Posted: 11 Jan 2022 | Published: 11 Jan 2022

D2IQ, Inc.

Kubernetes Data Protection Heavy on Automation, Integration
sponsored by Catalogic Software
EGUIDE: While Kubernetes applications are designed for resiliency, capabilities built in for backup and operational recovery are often lacking. That's why organizations need third-party Kubernetes data protection. Access this custom e-guide to learn about new Kubernetes offerings that can help your organization defend against ransomware.
Posted: 07 Nov 2022 | Published: 03 Nov 2022

Catalogic Software

Enterprises Wear Large Targets in Cloud Cryptomining Hacks
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.
Posted: 23 Aug 2018 | Published: 28 Mar 2018

Cisco Umbrella

Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal
sponsored by Infoblox
WHITE PAPER: Check out this white paper for a close look at today’s DNS threats, and discover how to use DNS to expand your cybersecurity arsenal.
Posted: 01 Mar 2023 | Published: 01 Mar 2023


Managing Cloud Native Data on Kubernetes
sponsored by Pure Storage
EBOOK: This O’Reilly e-book details what you need to know about managing data in Kubernetes, including:Learn how to use Kubernetes resources to compose data infrastructureAutomate the deployment and operations of data infrastructure on KubernetesEvaluate and select data infrastructure tech for use in your applicationsAccess the e-book here.
Posted: 08 Mar 2023 | Published: 09 Mar 2023

Pure Storage