Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

95 Results Found for "azure"

Results per page: 10 40 80

Security and the Rise of Machine-to-Machine (M2M) Communications

White Paper | Aug. 26, 2014

Kerry Doyle discusses Security and the Rise of Machine-to-Machine (M2M) Communications to help avoid any security risk in the future. Learn more here.

Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure

White Paper | July 08, 2014

Knowing about the different components of IBM Tivoli Monitoring (ITM) and how they interact can make all the difference in terms of keeping an ITM system running strong.

AWS Storage Solutions 101

White Paper | Dec. 08, 2014

It's important to understand the characteristics of each AWS storage option so that you can implement one or more AWS storage services to meet your needs.

10 Network Security Tools and Tests Everyone Should Use

White Paper | Nov. 28, 2017

This white paper provides a list of 10 security tools and tests that will help you check out suspicious issues and keep ahead of new risks and threats.

Five Simple Symbols You Should Know to Unlock Your Powershell Potential

White Paper | May 06, 2015

Learn the five symbols are regularly used in PowerShell and their meanings.

Successful Business Analysis Interviews Hinge on Prep Work

White Paper | Feb. 06, 2017

A structured business analysis interview is much more than a conversation; it is a controlled event requiring attention to detail, cautious design, and a strong social foundation from which to build a trusting and lasting relationship.

Collaboration Systems Release 10.6 Features Overview

White Paper | June 19, 2015

Get an overview of Cisco Collaboration Systems Release (CSR) 10.6 with a focus on Cisco Unified Communications Manager (CUCM) supported features.

Legal Issues of Cloud Forensics

White Paper | March 06, 2013

Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. What issues will they face, and, if needed, how can they collect information from the cloud?

What to Consider When Implementing Software as a Service (SaaS)

White Paper | Jan. 07, 2016

From application access to platform maintenance and security, learn what factors you should take into account when deciding to use Software as a Service(SaaS).

12 Advantages of Agile Software Development

White Paper | Dec. 21, 2010

Learn how Agile practices can help ensure you meet customer expectations, deliver products on time, and are able to adapt to change.