Latest
OpenAI is Planning to Launch ‘Operator,’ its First AI Agent
Five9 Updates Virtual Agents with Generative AI and NLP Integration
0G Labs Secures USD 40 M to Develop Decentralized AI OS
Juniper Partners with Recogni, an AI Chip Startup
Lume AI Raises USD 4.2 M to Enhance its Data Migration Technology
LocalStack Raises USD 25 M to Serve User Cloud Emulator
Zscaler Launches Zero Trust Segmentation to Boost Security
Writer Secures USD 200 M for Its Generative AI Toolkit
NetApp Launches Midrange All-flash Arrays for Storage Portfolio
ENS Labs is Set to Launch Namechain for Blockchain Name Service
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
Guest Blogs
cloud
All
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Master Data Management
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unifed Comm
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Mixed Reality
Virtual Reality
toolkit checklist: does your cms include these ess...
digital accessibility as strategy: a practical gui...
the new cyber security opportunity in an ‘ai eve...
6 steps to find the right wfm vendor for your grow...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
find out how to turn ai into real business value...
discover why 96% of users trust sap s/4hana cloud ...
discover why 96% of users trust sap s/4hana cloud ...
discover why 96% of users trust sap s/4hana cloud ...
discover why 96% of users trust sap s/4hana cloud ...
All
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality
explore embedded analytics for real-time, contextu...
engage, educate, convert with b2b video marketing...
maximize marketing roi with marketing mix modeling...
committee machine in ml harnessing ensemble techni...
strategic guide to inter process communication off...
innovation in it to revolutionize conventional sof...
information processing language serves scalable an...
critical role of real-time operating systems in bu...
operational innovation for sustainable growth...
cloud analytics unlocking scalable business intell...
elevate your marketing with data-driven personaliz...
ai agents in business: transforming operations & d...
continuous data protection strengthening business ...
cloud encryption fortifies digital frontier for en...
b2b marketing survey: what businesses need to know...
grid computing harness distributed resources for s...
uncovering multi-threading in sales with unique st...
ai adoption framework: key components for effectiv...
machine learning use cases that deliver tangible r...
enhancing cyber resilience: a strategic approach t...
All
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality
openai is planning to launch ‘operator,’ its f...
five9 updates virtual agents with generative ai an...
0g labs secures usd 40 m to develop decentralized ...
juniper partners with recogni, an ai chip startup...
lume ai raises usd 4.2 m to enhance its data migra...
localstack raises usd 25 m to serve user cloud emu...
zscaler launches zero trust segmentation to boost ...
writer secures usd 200 m for its generative ai too...
netapp launches midrange all-flash arrays for stor...
ens labs is set to launch namechain for blockchain...
data management startup connecty ai raises usd 1.8...
cogna secures usd 15 m for its ai-driven erp platf...
siit secures usd 5 m to enhance integrating servic...
fortinet launches fortiai integrations to expand a...
permiso releases a suite of three open-source tool...
diliko launches ai-powered on-demand data manageme...
nvidia releases new tools for ai-powered robots an...
kloudfuse launches kloudfuse 3.0 for enterprise ob...
fortanix and versasec partner to strengthen crypto...
crowdstrike to acquire adaptive shield, a cloud se...
All
IT Infra
Networking
Security
Tech
resurgence in lockbit drives record high ransomwar...
14 interesting trends that affect innovation and t...
what is web hosting?...
data privacy best practices every business should ...
Home
All Whitepapers
Whitepapers
Search by sponsor
1
3
4
7
8
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Search by category
--Whitepapers Category--
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Master Data Management
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unifed Comm
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Mixed Reality
Virtual Reality
real-time deep memory inspection
Sponsored by:
SonicWall
Published By:
Research Desk
Released:
Apr 22, 2019
SonicWall Real-Time Deep Memory Inspection (RTDMI™) technology enables SonicWall Capture Advanced Threat Protection (ATP) to catch more malware faster than behavior based sandboxing methods, with a ...
Read more
cybercriminals are more cunning than ever: stay one step ahead
Sponsored by:
Lenovo
Published By:
Research Desk
Released:
Apr 22, 2019
ThinkShield by Lenovo is the most comprehensive suite of end-to-end security solutions on the market, with cutting-edge innovations that protect you from today's sophisticated cyberthreats. Sponsor...
Read more
there are two types of companies today: those that have had security breaches, and those t...
Sponsored by:
Lenovo
Published By:
Research Desk
Released:
Apr 22, 2019
ThinkShield by Lenovo is the most comprehensive suite of end-to-end security offerings for business on the market today. Scalable to meet your unique requirements, and encompassing device, data, iden...
Read more
hackers can strike your device before you even open the box
Sponsored by:
Lenovo
Published By:
Research Desk
Released:
Apr 22, 2019
ThinkShield by Lenovo is the most complete security suite for business. From concept and development to supply chain and manufacturing, we ensure your device is secure from every angle. Sponsored b...
Read more
be shielded from every angle in the battle for cybersecurity
Sponsored by:
Lenovo
Published By:
Research Desk
Released:
Apr 22, 2019
ThinkPads with Windows 10 Pro have the most comprehensive suite of security. With ThinkShield, you can worry no more. Stay ahead of criminals and protect yourself today. Sponsored by Lenovo and Int...
Read more
change healthcare: securing applications using micro focus® fortify on demand
Sponsored by:
MicroFocus
Published By:
Research Desk
Released:
Apr 19, 2019
Change Healthcare runs the largest financial and administrative healthcare network in the United States. Whether for pharmacies, dentists, hospitals, laboratories, or other healthcare organizations, t...
Read more
seamless application security: security at the speed of devops
Sponsored by:
MicroFocus
Published By:
Research Desk
Released:
Apr 19, 2019
On top of all the challenges created by increased number of applications, increasing complexity and faster releases, regulations like GDPR and capturing customer data for business purposes has become ...
Read more
warning! your applications are under attack
Sponsored by:
MicroFocus
Published By:
Research Desk
Released:
Apr 19, 2019
It’s not just customers who look at your apps.... In 2016/17 alone there were attacks on the US Presidential elections, the WannaCry ransomware attack, insider attacks at HBO and Netflix. —and ...
Read more
transform your field service with iot, ai, and mixed reality
Sponsored by:
Microsoft
Published By:
Research Desk
Released:
Apr 19, 2019
Once considered a cost center, field service— including service requests, scheduling, resource assignment, and parts management—is becoming a profitable source of business intelligence and brand d...
Read more
10 signs it’s time to review your endpoint protection
Sponsored by:
Cylance
Published By:
Research Desk
Released:
Apr 18, 2019
In the past, new malware could be individually detected, catalogued, and blocked by security companies. Malicious fi les were identifi ed by their unique fi le hash, aka “signature,” and restricte...
Read more
Posts navigation
Prev
1
…
1,472
1,473
1,474
1,475
1,476
1,477
1,478
…
1,578
Next
Whitepapers
News
Insights
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Master Data Management
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unifed Comm
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Mixed Reality
Virtual Reality
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality