Share Business Whitepapers and Research Papers.

Join the community of professionals just like you.

Featured Whitepaper

Red Hat JBoss Fuse

Red Hat JBoss Fuse is an open source enterprise service bus (ESB) with an elastic footprint that supports integration...

Leveraging Intel from Hackers to Mitigate Risks

What can the IT security community learn from a ‘blackhat,’ who says he’s decided to go legit? While many IT...

How a Hacker Breaks An Application with Vulnerability Chaining

Sometimes the exploit of a single vulnerability can lead to newsworthy stories of businesses getting compromised. But more often...

User Onboarding And Deprovisioning In Google Apps

User management is one of the most important roles of Google Apps administrators, and the processes of onboarding and...

Eagle Bank Secures Deposits and Customer Data with Single Sign-On

When a security audit revealed the bank\'s password-protection vulnerability, Eagle Bank, a mutual bank with over $430 million in...

Top 10 Smart Steps to Maximize eCommerce Revenue 2013

This informative 2013 Bestpractices eGuide from BlueSnap talks about the top 10 steps that can be adopted to Maximize...

The Intelligent Integrated Enterprise Advantage

Read this paper to learn how you can create an intelligent, integrated enterprise that dramatically increases both customer satisfaction...

Behavior-Driven Development and BRMS

Behavior-driven development is an agile application life-cycle management framework that helps developers and business experts communicate effectively. Red Hat...

Is an Open Source Business Process Management Solution Right for You?

If you are considering deploying business process management (BPM) solutions, but have been daunted by the cost, footprint, risk,...

Design Patterns in Production Systems

Design patterns are reusable, mini-software architectures created to solve particular classes of implementation problems that frequently arise in practice....

Building a Better IT Service Channel

How do you build a better service channel for your company? As IT has evolved, support teams face the...

Google Apps Guide: User Onboarding and Deprovisioning in Google Apps

User management is one of the most important roles of Google Apps administrators, and the processes of onboarding and...

2012 CPOE and Meaningful Use Research Brief

A recent survey was conducted to identify how single sign-on accelerates EMR adoption, Computerized Physician Order Entry (CPOE)...

Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital

This IDC Health Insights report focuses on the implementation of single sign-on at Johns Hopkins Hospital. Faced with government...

Building a Better IT Service Channel

How do you build a better service channel for your company? As IT has evolved, support teams face the...

Embedded Devices and Data Thieves

In an era known as \"the Internet of Everything,\" embedded devices are on the rise - still embedded security...

Building a Better IT Service Channel

As IT has evolved, support teams face the task of providing better service while reducing budgets and headcount at...

How Red Hat\’s JBoss Enterprise Application Platform 6 Is Extending Business Value

This white paper leverages IDC primary research and buyer-focused research to derive an understanding of the customer perception of...

Top 10 reasons to choose Red Hat JBoss Enterprise Application Platform

When it comes to building, deploying, and managing enterprise-level Java™ applications and services, could you benefit from a more...

[Lab Report] Mixed All Flash Array Delivers Safer High Performance

MLC and SLC are the most common types of flash used in storage systems. MLC is less expensive but...
 
Page 183 of 202«181182183184185»