Share Business Whitepapers and Research Papers.

Join the community of professionals just like you.

Featured Whitepaper

Google Apps Guide: User Onboarding and Deprovisioning in Google Apps

User management is one of the most important roles of Google Apps administrators, and the processes of onboarding and...

The economics of cloud managed integration

In this paper we will consider what is required to enable cloud-managed integration from a technical perspective. Much of...

Which Security Assessment Is Right For Me

At Dell SecureWorks, we strive to be a trusted security advisor to our customers. Part of building this trust...

EMA Radar™ for Hybrid Cloud Integration Technologies

In this EMA Radar Report, Enterprise Management Associates evaluates seven of the leading vendors of cloud integration platforms, for...

Ovum: Profile of Dell Boomi

Ovum does a deep dive profile of Dell Boomi. Read this report to understand how Dell Boomi can be used...

Embedded Devices & Data Thieves

In an era known as \"the Internet of Everything,\" embedded devices are on the rise - still embedded security...

New Paper: The CISO’s Guide to Advanced Attackers

Much of the security industry spends significant time and effort focused on how hard it is to deal with...

Security Testing and Assessment Services Guide

This document provides you with an understanding of common cyber security tests and assessments organizations can use to evaluate...

Crossing the Digital-Analog Divide

Digital signals are an idealization and as data rates climb above a few Gb/s, they betray their microwave analog...

Google Apps Guide: User Onboarding and Deprovisioning in Google Apps

User management is one of the most important roles of Google Apps administrators, and the processes of onboarding and...

Responsive Delivery: A methodology for mobile development and deployment

Responsive Delivery is a methodology employed to deliver HTML5 user experiences on a variety of devices—typically mobile and tablet—by...

New Free Tool to Detect SQL Server Database Corruption

SQL Integrity Check, the latest free tool from Idera, allows DBAs to skip the time-consuming task of writing and...

10 Tips to Minimize the Impact of a Security Breach

The Dell SecureWorks Counter Threat Unit research team has developed a set of 10 recommended best practices to help...

Actionable Leadership in the Creative Age

This paper provides some techniques for developing a culture that fosters innovation and encourages 21st century leadership methods and...

Making the move from 2.0 to 3.0 USB

With a growing number of USB 3.0 hard disks, drive enclosures, and other devices on the market, it’s time...

Why Now is the Time to Get Started with BlackBerry Enterprise Service 10

BlackBerry® 10 smartphones support Microsoft® ActiveSync™ right out of the box, giving IT a fast and easy solution for...

Debugging Hi-speed USB 2.0 Serial Buses in Embedded Designs

The hi-speed USB 2.0 serial bus is used today in a broad range of computer as well as embedded...

Continuing the In-Store Conversation Online

The need to develop a solid cross-channel marketing strategy encompassing email, mobile and social has become a priority for...

Storage as a service – Recover

The risk of data loss is not something you can afford to ignore. You need to know that backups...

10 Tips to Minimize the Impact of a Security Breach

The Dell SecureWorks Counter Threat Unit research team has developed a set of 10 recommended best practices to help...
 
Page 172 of 190«170171172173174»