Skip Links

Network World

Resource Library

  • IDC: The New B2B: Business Transformation through Big Data and Analytics
    Source: Dell and Intel®
    White Paper: What role does Big Data play in today's business transformation efforts? Big Data has become a team sport in which business and IT executives, managers, and staff are embracing new analytics, new data types, new users, and new metrics. This IDC white paper uses extensive case-based and survey research to explain the value of Big Data and analytics in business transformation and highlights why Dell is among the few vendors that can deliver on the potential of the Big Data value proposition.

    Intel Inside®. Powerful Data Center Outside.

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
  • Being Ready for Digital, Explained
    Source: Axway
    White Paper: The greatest disruption in business as usual in the age of digital is that someone else is now calling the shots. It's not the corner office, or board members or stock investors. It's not Wall Street or the government. It's the consumer. Sure, on our way up the career ladder we've all been fed the same clichés:

    "The customer is always right." "The customer always comes first."

    But this time, it's different.

    Centered in a vast digital ecosystem swirling with data, and equipped with pocket-sized portals of connectivity loaded with captivating apps ready to please anytime, anywhere at the slightest whim, today's consumer is now the definitive lord and master of commerce. The genie is out of the bottle and its name is digital business. As IT and enterprise leaders, it now falls upon you to understand exactly what the customer wants.

    The big question is: are you prepared for the journey? Is your organization ready for digital? And what, exactly, does that mean? Download this whitepaper to learn more.
  • Don't Let "Trusted" Vendors Become Cyber-Breach Enablers
    Source: Bitsight Technologies
    White Paper: In a recent IDG survey of more than 260 IT managers and professionals, nearly 70% said they are extremely or very concerned about the security risks posed by third-party vendors and suppliers. Despite this awareness, relatively few companies have implemented the comprehensive vendor risk management (VRM) programs that this threat warrants. This paper examines the state of VRM programs today, and explains how companies can - and should - leverage automated services that continuously track and rate vendor security profiles.
  • Digital Business Enablement for the Supply Chain
    Source: Axway
    White Paper: Transform your supply chain to meet a new digital business reality.

    By underpinning your enterprise with a solid data integration foundation, you become more agile in creating new and innovative business models with full end-to-end visibility, more process-efficient with analytics tools that monitor data flows between systems, and more enabled to digitally engage your ecosystem of partners, suppliers, consumers, processes, data, and devices.

    Is your current integration foundation secure and agile enough to grow with you? Modernize your IT infrastructure with a next-generation data exchange layer that combines file transfer, EDI and API connectivity to improve operational efficiency across many industries. Download this whitepaper to learn more.
  • Optimize Patient Care with Secure Access to Apps and Data
    Source: Citrix Systems
    White Paper: Innovations like EHR, CPOE and medical imaging enable clinicians to review and document every aspect of patient care. In this white paper, learn how virtualization can help IT deliver clinical and business apps to any device - enabling clinicians to seamlessly access the data needed to deliver optimal patient care from anywhere.
  • Security and Compliance in Mobility-Transformed Healthcare Organizations
    Source: Citrix Systems
    White Paper: As healthcare organizations transition to innovative new healthcare models to increase clinician mobility, they need a strategy to maintain security, privacy and compliance wherever they deliver care. This white paper discusses how three leading healthcare organizations implemented IT solutions to deliver patient care more efficiently, while addressing HIPAA, HITECH, PCI DSS, meaningful use and other regulatory mandates.
  • Challenging Some of the Myths about Static Code Analysis
    Source: Rogue Wave Software
    White Paper: Static code analysis (SCA) has many benefits, but there are some misconceptions, from a belief that SCA tools are glorified compilers to tools intended only for junior developers. This paper dispels the common myths surrounding SCA and highlights the many benefits of faster project execution, better source code at check-in, less costly development cycles and shorter time-to-market.
  • Top Automotive Security Vulnerabilities
    Source: Rogue Wave Software
    White Paper: Building connected automotive software that's both bulletproof and secure is a big task. Nearly 90 percent of all detected security holes can be traced back to just 10 types of vulnerabilities. This paper explores the issues affecting different types of embedded systems. Using examples from actual source code, it looks at what changes can be made to coding style and processes to avoid these common risks.
  • Static Code Analysis in an Agile World
    Source: Rogue Wave Software
    White Paper: Enhance Agile development processes and empower Agile teams. Learn how the use of automated static code analysis technology enables development teams to locate and describe software source code weaknesses and establish a repeatable process to achieve working software with each iteration before code is delivered to the integration build or testing team.
  • Defend Against Injection-Based Attacks
    Source: Rogue Wave Software
    White Paper: Ensuring software code is resistant to malicious attacks has become a key software development priority. This paper explores some of the most common injection vulnerabilities plaguing the software development industry and presents different ways in which Static Code Analysis tools can help you identify, understand and remove these types of issues from an existing code base, as well as from new code, while you're writing it.
  • Open Source Support Report
    Source: Rogue Wave Software
    White Paper: Despite the reach and dominance of open source software (OSS), there is surprisingly little information on how to effectively support it. This report presents real-world data to explain how open source support insulates organizations from licensing, configuration, and production risks. Discover how you can best prepare to handle OSS by staying abreast of all your OSS packages with the proper support, governance and management.
  • CloudFlare Advanced DDoS Protection
    Source: CloudFlare
    White Paper: Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include distributed (DDoS) and, more recently, distributed reflector (DRDoS) attacks-attacks that simply cannot be addressed by traditional on-premise solutions.
    In this whitepaper, you'll learn the anatomy of each attack method and how to protect your web presence from attacks, such as Layer 3 and 4, DNS amplification, SMURF, ACK, and Layer 7.
  • Reduce Your Open Source Security Risk
    Source: Rogue Wave Software
    White Paper: The vulnerabilities and security issues that open source software can introduce into development projects make open source security a top priority. Read on to learn the strategies and tactics required to make it easy to acquire, distribute, use, monitor, analyze, and keep track of open source software to reduce risks and keep vulnerabilities of buggy software and applications to an absolute minimum.
  • Four Strategies to Reduce Your Open Source Risk
    Source: Rogue Wave Software
    White Paper: Open source plays a dominant role in the success of software development teams. Yet few organizations are aware of the risks inherent in the software choices they're making. The four strategies outlined in this white paper will help you understand the importance of establishing an open source management policy so that you can maximize the value of open source software while reducing both technical and legal risks.
  • Fitting Static Code Analysis into Continuous Integration
    Source: Rogue Wave Software
    White Paper: Continuous Integration (CI), a software development practice where new code is frequently integrated and tested, has become a key component of successful DevOps practices. The benefits of CI are clear - the earlier a bug is identified, the easier and faster it is to fix. This white paper details how to maximize the benefits of CI to detect as many issues as possible in each integration build while avoiding manual testing.

Results 1 - 15 of 691