white paper

Results 1 - 25 of 5627Sort Results By: Published Date | Title | Company Name
Published By: Chatsworth     Published Date: May 10, 2016
The modern data center has changed. There are new demands around cloud computing, big data and infrastructure efficiency. This change in the data center is being driven by more users, more data and a lot more reliance on the data center itself. With private cloud technologies and the rapid growth in data leading the way within many technological categories (the Internet of Things), working with the right data center optimization technologies has never been more important. In this white paper, we explore new concepts around data center demand, where energy efficiency and cooling optimization fit in and modern best practices around your data center.
Tags : 
chatsworth, data center optimization
    
Chatsworth
Published By: FORTRUST     Published Date: Aug 14, 2015
Companies rely on their data center to provide the foundation for much of their business. Because of that, a thorough evaluation of the key geographical factors related to risk mitigation and data center site selection is critical. This white paper examines several of the major criteria to use in geographic data center site selection, and provides an overview of the FORTRUST facility as it relates to those criteria.
Tags : 
    
FORTRUST
Published By: FORTRUST     Published Date: Aug 14, 2015
When companies evaluate potential data centers and colocation service providers, they normally compare them using some kind of criteria or checklist. However, many such efforts fail to sufficiently evaluate the breadth and depth of detail necessary to make a well informed decision. This white paper examines several key criteria as they relate to service delivery from a data center or colocation provider. Specifically, this paper examines the importance of factors such as risk mitigation, operational processes and service assurance, combined with maintenance and lifecycle strategies that directly contribute to “high-availability service delivery.”
Tags : 
    
FORTRUST
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA). It is important to consider while differences emerge among specific compliance mandates, many of the common mistakes and challenges associated with each will apply to all compliance efforts.
Tags : 
    
FORTRUST
Published By: RagingWire Data Centers     Published Date: Oct 09, 2015
Data Center Migration, three words that can cause sleepless nights to even the most experienced professionals involved in enterprise IT and facilities departments. While it can be a daunting challenge, it also offers a great opportunity to improve and rethink your IT architecture and examine how well it meshes with your organization’s long term business strategies. This whitepaper examines some of the major strategic issues that should be an integral part of your evaluation when forming a data center migration strategy.
Tags : 
    
RagingWire Data Centers
Published By: RagingWire Data Centers     Published Date: Nov 03, 2015
This whitepaper examines some of the short- and long-term issues and challenges that should be part of your due diligence when facing growing demands of your organization’s evolving computing architecture and making major strategic and economic decisions. It also provides guidelines for evaluating the alternative choices, such as co-location and hosted service providers, as well as cloud services, which can all be utilized together for enhanced flexibility.
Tags : 
    
RagingWire Data Centers
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
Digital transformation has arrived, and it’s creating unprecedented opportunities for companies of all sizes to become market leaders through the evolution of business processes and the creation of new products and services. Organizations that master digital transformation will see a dramatic increase in revenues and profitability by converging people, processes and technologies; those that do not will struggle to survive. Evidence of this is clear to see by looking at the churn in the biggest companies in the world. For example, a Capgemini study found that since 2000, 52% of the Fortune 500 has disappeared through acquisitions or bankruptcies. The study also found that digital organizations control 70% of market share in all industries today. Therefore, making the shift to a digital business must be a top initiative for IT and business leaders. Download this whitepaper to see how Cisco has become the Market Share Leader in Online Meetings.
Tags : 
cisco, digital transformation, collabaration
    
Cisco EMEA Tier 3 ABM
Published By: Zendesk     Published Date: May 21, 2018
The start of a new chapter of your business, whether you're moving upmarket or adding products and features, is a great time to scale your customer service operations in a smart way. We know customers prefer self service, via a knowledge base, if one is available. A Gartner report estimates that CIOs can reduce customer support costs by 25% or more when proper knowledge management discipline is in place. If you've been on the sidelines waiting to take the self-serv ice leap, this white paper will prove that you and your agents already partake in the activities needed to offer great self-service,every single day.
Tags : 
    
Zendesk
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
For data-driven businesses, cloud can be a boon. Data can be found, processed and managed on the cloud without an investment in local hardware infrastructure, but what does that mean to information trust and governance? When data comes from cloud-based sources, IT needs a plan for data integration and security. Download this insightful white paper and learn the four key priorities you must consider when developing your IT strategy to promote good hybrid information governance. Learn the blend of process, organizational and technical enablers that will allow you to move to a hybrid environment with speed and confidence.
Tags : 
data-driven business, cloud, information trust, information governance, data integration, data security, it strategy
    
Group M_IBM Q1'18
Published By: Schneider Electric     Published Date: May 04, 2018
Before creating new technologies, we must think about how to create the right values to be also able to sell it. All the technology that is required for “Industry 4.0” is available today already, so in fact Industry 4.0 can be seen more than an innovation driver for new businesses that are not exploited today, than an innovation driver for technology. If these existing technologies are assembled properly together and combined with the right business models, there is really good chance to profit from Industry 4.0. This white paper looks into the ways one can profit from Industry 4.0 by differentiating through new business models.
Tags : 
keywords, packaging, oem, smart machines, food & beverage, bottling, conveying, industrial automation, energy, robotics
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Integrating safety and process environments can improve reliability, profitability and cybersecurity. Read Frost & Sullivan’s white paper and plan your digital transformation today.
Tags : 
process safety, profitable safety, smart control, empowered operators, optimized assets, future of automation, reliability, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Today’s plants are faced with managing two major challenges: the increasing speed of business and integrating emerging technologies. Leveraging IIoT as a basis for plant modernization could result in big payoffs: download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, operational profitability
    
Schneider Electric
Published By: HP Inc.     Published Date: Jun 13, 2018
HP is ushering in a new era for manufacturing with Multi Jet Fusion technology. In this white paper, see how innovations such as high-speed synchronous architecture – that builds parts layer-by-layer – and HP’s Multi Jet Fusion Open Platform are poised to redefine 3D printing. Download the white paper
Tags : 
    
HP Inc.
Published By: Workday     Published Date: Nov 27, 2017
Revenue recognition is no walk in the park. We know—we’ve been there. Workday was one of the first companies to adopt the new standard, ASC 606. Read this whitepaper to help you prepare for the transition to ASC 606 and IFRS 15. Discover the challenges other companies are facing, what they’re doing to make the change, and the key things you need to consider as you prepare.
Tags : 
asc 606, ifrs 15, prepare, transition
    
Workday
Published By: Workday     Published Date: Mar 01, 2018
A cloud-based system for finance frees your finance team to do more than manage controls and transactions. But choosing one that supports your goals today and into the future, while helping your finance team act strategically, can be difficult. Read this whitepaper for guidance in selecting a system.
Tags : 
cloud-based system, strategically, finance
    
Workday
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com