Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

82 Results Found for "ansible"

Results per page: 10 40 80

Office 365: An Introductory Guide

White Paper | June 12, 2015

Explore how Microsoft Office 365 works, and then discover what steps your organization should choose to implement an infrastructure that is completely driven by it.

Security and the Rise of Machine-to-Machine (M2M) Communications

White Paper | Aug. 26, 2014

Kerry Doyle discusses Security and the Rise of Machine-to-Machine (M2M) Communications to help avoid any security risk in the future. Learn more here.

Types of Cloud Deployments

White Paper | June 23, 2015

Learn the basics of cloud computing and the types (models) available.

Zero Day Exploits

White Paper | Oct. 23, 2012

A zero day exploit is an attack that was previously unknown to the target or security experts in general.

Cisco UCS B Series Uplink Strategies

White Paper | April 10, 2015

Learn about the uplink strategies for traffic coming in and out of a Cisco Unified Computing Solution (UCS) chassis.

DevOps is the Missing Piece for Businesses that Demand Change

White Paper | Feb. 27, 2018

This white paper will bring you up to speed on what DevOps is, how it can help IT deliver value to the business, and position the IT organization to keep up with business demand for change.

A Practical View of NIST's Cloud Definition

White Paper | July 14, 2014

This white paper examines NIST's cloud definition in detail with real world case study examples to illustrate how it is applicable to today's cloud market landscape.

Human Vulnerabilities in Our Current Threat Landscape

White Paper | Jan. 23, 2015

Discover how the current threat landscape pertains to human vulnerabilities and how to take the first steps toward mitigating them.

The Internet of Things: A Primer for the Curious

White Paper | April 08, 2015

Discover what the Internet of Things (IoT) is, where it can affect the most short-term change, its impact on existing networks, as well as some business, cultural, and ethical considerations.