Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...

...or search.
White Paper | Presented by PC Connection

HP Desktop Mini: The Desktop Has Evolved

With desktop virtualization just emerging, a powerful business PC is still where the majority of daily work gets done. HP's newest and smallest business desktop platform, the HP Desktop Mini, fits the bill without filling the space.

KnowledgeVault | Presented by Venafi

Securing Keys and Certificates for Trusted Access to Critical Assets

Today's most devastating cyber attacks-including ShellShock and Heartbleed-prey on trust. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets.

17 ways to speed your SQL queries

SQL unleashed: 17 tips for faster SQL queries

These tried-and-true techniques will improve both the speed and concurrency of your dawdling database

White Paper | Presented by CommVault

2014 Healthcare Data Management Survey Summary

This report provides insights into how much information Healthcare IT organizations are managing, the rate of data growth they are experiencing and which applications and business needs are driving that growth.

White Paper | Presented by CommVault

5 Steps to Application-Aware Data Protection

Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection.

White Paper | Presented by CommVault

5 Strategies for Modern Data Protection

Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you're poised to meet future demands.

Video/Webcast | Presented by AlienVault

An Incident Response Playbook: From Monitoring to Operations

As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop incident detection and response processes that work for different situations.

Video/Webcast | Presented by AlienVault

Best Practices for Leveraging Security Threat Intelligence

In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX.

White Paper | Presented by VCE

Business Benefits of Running SAP on True Converged Infrastructure

Forrester Consulting conducted a Total Economic Impact™ (TEI) study and examined the potential return on investment (ROI) enterprises may realize by replatforming SAP on factory-integrated systems.

Charting Your Analytical Future- "From Insight to Foresight with Business Intelligence and Predictive Analytics" Webinar

To make game-changing decisions, predictive analytics enables you to discover trends, patterns and relationships in your data and helps to strengthen and attain business goals.

Load More