Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

70 Results Found for "ansible"

Results per page: 10 40 80

10 Ways Cloud is Changing the World

White Paper | Aug. 14, 2015

Cloud computing is constantly reshaping the way we work, learn and play. Let's look at 10 ways the cloud will (and to a large degree already has) changed the world.

Five Security Concerns with Mobile Payment Systems

White Paper | March 10, 2015

Learn about the five major security concerns with mobile payment systems before you link your finances to a mobile device for payments. Download your copy!

VSAN: Reimagining Storage in vSphere

White Paper | March 26, 2014

Learn about VMware Virtual SAN (VSAN), its basic requirements and how it works.

What's New in IP Office Manager Release 9.1

White Paper | May 26, 2015

Prepare to install and administer IP Office Manager 9.1.

Virtualization and Cloud Computing: Does One Require the Other?

White Paper | July 07, 2014

This white paper examines the relationship between cloud computing and virtualization.

Complex Decisions Made Simple With Structure and Tools

White Paper | Dec. 20, 2016

Structuring techniques are the foundation of decision making. This white paper introduces some of the simplest and most effective structuring techniques including sorting, sequencing, placement, decision trees, and ranking.

Amazon Web Services: An Overview

White Paper | Dec. 04, 2017

There's a great chance that AWS has more than a few products to help you work faster, smarter, and more cost effectively. So, where should you start?

Guide to ITIL® Certifications and Tips for Exam Success

White Paper | Jan. 03, 2018

The certification and exam guide discusses the benefits of having a ITIL certification with each level and tips for the ITIL certification exams.

“Reasonable Security” Best Practices: Learning From Notable Data Breaches

White Paper | Nov. 28, 2016

David Willson discusses the best practices for reasonable security after learning from notable data breaches from different organizations. Learn more here.