• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Network
flow-image
Dell Technologies & Intel Corporate

Key Storage Considerations in Determining Optimal Workload Placement

In early 2020, IDC performed in-depth primary research on how organizations determine workload placement as they evolve through digital transformation (DX) and what implications this has for modernized infrastructure objectives and strategies. Most IT organizations are in the midst of a DX. IDC defines DX as the continuous...

Published: Jan 26, 2021
View More
flow-image
Imperva

DDoS in the time of COVID-19

COVID-19 has caused major disruption to business on a global scale creating the perfect storm for cyber criminals. Organizations around the world have been forced to pivot and adapt to a new way of working in order to remain operational while millions of people have made the switch to remote working and sheltering in place....

Published: Feb 08, 2021
View More
flow-image
Fujitsu

SAP S/4HANA: Changing Perceptions — From Upgrade to Crucial Business Enabler

In this whitepaper IDC explores the business value that ERP modernization can deliver to digital executives and the broader organization. It showcases the results of a global study on S/4HANA migrations carried out with 700 digital and IT executives from organizations that are SAP customers. The objective is to provide...

Published: Feb 26, 2021
View More
flow-image
syslog-ng

NIST Cybersecurity Framework

The document gives you an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure. This document is recommended for C-level executives and security specialists who work on adopting technologies...

Published: Feb 18, 2021
View More
flow-image
syslog-ng

Five things every business needs to know about GDPR

After years of preparation and drafting, the final t’s were crossed and i’s dotted on the General Data Protection Regulation (GDPR), when the Council of the European Union and the European Parliament adopted it. It means that it’s time to stop thinking about GDPR and to start acting. Particularly as they...

Published: Feb 18, 2021
View More
flow-image
Imperva

14 Questions to Ask Your Application Security Vendor

When evaluating application security vendors, you have a great deal to consider. Understanding your goals will help. If your goal is vendor consolidation then selecting those offering multiple security capabilities over single products may make more sense. If your goal is out-of-the-box functionality then understanding...

Published: Feb 08, 2021
View More
flow-image
BlackBerry

Ransomware Prevention and Remediation

The global damage costs of ransomware are projected to reach $20 billion in 2021. This includes not only ransom pay-outs, but also costs for recovery and remediation, lost productivity, reputational harm, and more. Despite the known risks, many firms remain poorly prepared for a ransomware attack or its aftermath. ...

Published: Jan 26, 2021
View More
flow-image
Aruba

IT’s 5 Toughest Work from Home Challenges

All of a sudden, you (and everyone else) found yourself working from home (WFH). The one advantage was the lack of a soul-crushing commute. Unfortunately, many of your co-workers had never really signed in from home, so help desk calls reached an all-time high. Questions ranged from how to access protected files, to whether...

Published: Feb 09, 2021
View More
flow-image
Egnyte

A Spec for Success: Building within a Common Data Environment

 In the decade since the 2009 economic downturn in the UK, there have been a number of changes in the construction industry. With consolidation in the sector and intensification of competition, companies have found themselves having to identify technology to help them become more efficient not only in the bidding...

Published: Feb 02, 2021
View More
flow-image
Citrix

The present and the future of higher education IT

Every sector, business and individual has had to adapt over the last 12 months as a result of the global pandemic, but higher education has seen one of the biggest overhauls in its history. From classes and campuses packed to the gills with educators and students, to a disconnected and disjointed web of individuals trying...

Published: Mar 03, 2021
View More
flow-image
F5 Networks

Edge Computing in Telco Networks: Gaining the Competitive Edge

Earlier this year, Wind River® teamed up with F5, Schneider Electric, and Heavy Reading on a global survey of communications service providers (CSPs) in order to better understand what drives their edge computing strategies. Download this paper to get the details about out how CSP's are approaching their edge business....

Published: Feb 25, 2021
View More
flow-image
Imperva

15 Ways Your Website is Under Attack

Web applications are the home of your business on the internet. The functionality within your website, the structure of your technology stack, and the code used to build it are under constant attack from bad actors attempting to compromise your business. Understanding these types of attacks will help you prevent fraud,...

Published: Feb 08, 2021
View More
flow-image
HP

Staying a step ahead of the bad guys in tomorrow’s workplace

Today’s work/life style is connected, connecting, and converged. With 62 percent of employees working regularly from more than one location. 65 percent of workers say they collaborate multiple times a day. 81 percent report that work activities happen during personal time. And perhaps not surprisingly,...

Published: Apr 17, 2019
View More
flow-image
Red Hat

IT Modernization: Achieving a Balance Between 2nd and 3rd Platform Investments

This IDC white paper considers the challenge customers face today in balancing investments in existing infrastructure with goals of improving efficiency and modernizing their datacenter. Simultaneously, customers need to embrace new technology development and deployment techniques that offer the promise of substantial...

Published: Apr 08, 2019
View More
  •  
  •  
  • ...
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x