Skip Links

Network World

Resource Library

  • The Wall Street Journal: CIO Journal
    Source: ServiceNow
    White Paper: Article describes how cloud ITSM:
    * Reduces drain on IT, increased response time
    * Eliminates roadblocks to completion
    * Enables IT to deliver better usability and access
    Read Now
  • Upstream Print Solutions improve customer service
    Source: ServiceNow
    White Paper: Upstream Print Solutions improves customer service following SaaS rollout
  • Transform IT: Transform the Enterprise
    Source: ServiceNow
    White Paper: This paper provides IT leaders with insight into three IT imperatives that 24 CIOs and senior IT executives used to reposition IT and transform the enterprise: Learn how CIOs are:
    * Driving Enterprise Visibility and Standardization
    * Creating Intuitive, Approachable, and Business-Friendly IT Service Delivery
    * Automating and Accelerating IT Responsiveness and Innovation
    Read Now
  • The Truth About Cloud Security
    Source: Dropbox
    White Paper: "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure. But the truth is, cloud solutions can offer companies real, tangible security advantages. Before you assume that on-site is the only way to keep data safe, it's worth taking a comprehensive approach to evaluating risks. Doing so can lead to big benefits.
  • Evaluating File Sync and Share Solutions: 12 Questions to Ask about Security
    Source: Dropbox
    White Paper: File sync and share can increase productivity, but how do you pick a solution that works for you? There will likely be a number of factors guiding your decision, and if you're like most businesses, security is high on the list. Download to learn some important questions to ask file sync and share vendors about security.
  • The Keys to Securing Data in a Collaborative Workplace
    Source: Dropbox
    White Paper: Losing data is costly. According to the Ponemon Institute, the average data breach costs US organizations an estimated $200 per record, or $5.4 million total per breach. And apparently these breaches are equally likely to be from criminal attack as from employee or contractor negligence. It makes sense then that surveys point to data loss via unsecured file sync and share solutions as one of IT's biggest concerns. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?
  • What is this "File Sync" Thing and Why Should I Care About It?
    Source: Dropbox
    White Paper: Not so long ago, the office was the only place you could work. But when smartphones and tablets came along, the only thing holding us back from getting work done anywhere, any time was having access to our data. That led to the creation of a whole new class of solutions designed to keep files current across our rapidly proliferating fleets of devices - through a technology known as 'sync.' All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking "Save." So it's no surprise that 55% of information workers in North America and Europe who use a tablet at work are using file sync and share tools
  • 5 Ways Dropbox for Business Keeps Your Data Protected
    Source: Dropbox
    White Paper: Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Security is at the heart of Dropbox for Business, informing not only how we approach new features and enhancements, but also how we've designed the product itself. Download here to find out how we've built Dropbox for Business to keep data safe for all our users.
  • Accelerate Apps to Gain a Competitive Edge
    Source: Cisco Systems
    White Paper: What would you do with faster applications and faster answers? Getting faster results-the fuel for better decision making-is increasingly at the root of competitiveness, even survival. Learn how the all-flash Cisco UCS Invicta Series can put IT at the center of the acceleration solution.

    Read Now
  • Forrester: How IT Leaders Beat I/O Constraints
    Source: Cisco Systems
    White Paper: Despite the higher price tag on solid-state drives, IT leaders told Forrester they perceive cost savings that justify the investment. Dive into the details in this survey of over 100 IT infrastructure and operations decision-makers.

    Read Report
  • Increase VDI Performance with Cisco UCS Invicta
    Source: Cisco Systems
    White Paper: High-performing VDI deployments in traditional environments can hinder the end user's experience-and prove costlier than expected. Stop purchasing more resources than necessary. Give your end users the performance they need with innovative Cisco UCS Invicta all-flash arrays.

    Learn More
  • Overcoming the I/O Barrier: How Cisco Does It
    Source: Cisco Systems
    White Paper: Mission-critical applications often rely on near-instantaneous access to data. Find out how Cisco solid-state all-flash arrays break through the I/O limitations of traditional configurations using new technology and an innovative OS to increase performance, endurance, and consistency.

    Read Now
  • Say Goodbye to I/O and Data Bottlenecks
    Source: Cisco Systems
    White Paper: Cisco and Intel have harnessed flash memory technology and truly innovative system software to blast through the boundaries of today's I/O-bound server/storage architectures. See how they are bringing real-time responsiveness to data-intensive applications-for unmatched business advantage.

    Read Now
  • Comprehensive Advanced Threat Defense
    Source: General Dynamics Fidelis Cybersecurity Solutions
    White Paper: The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it's the science - and the art - of defending yourself against sophisticated, persistent adversaries who can get past (or have already gotten past) your security defenses.
    We like to define advanced threat defense in terms of the adversary rather than the attack technique used to remind ourselves that what we are really up against is a person or, more likely, a group of people who are specifically targeting your organization, and will use whatever attack vectors and techniques necessary to achieve their objectives.
    This paper describes a comprehensive, network-­based approach to Advanced Threat Defense.
  • Workload Change: The 70 Percent of Your Business DevOps Forgot
    Source: BMC Software
    White Paper: Organizations that have successfully integrated workload automation (WLA) into their software development lifecycle have seen substantial benefits. So why is WLA, also referred to as job scheduling or batching processing, largely missing from the DevOps discussion? Adding WLA early in the development process ensures that the benefits of DevOps accrue for all applications, including your batch services.  This paper explores the benefits in greater detail and explores possible ways to remedy the situation. 

Results 1 - 15 of 548