Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Zynga Takes Cloud And Customer Service In New Directions

by InformationWeekSep 17, 2012

In San Francisco's thriving South of Market district, one of the neighborhood's most recent additions resides in a huge building with a bulldog emblazoned in the center. It's the online gaming company Zynga. Founder Mark Pincus wrote Zynga's Hold'em Poker game at his kitchen table with his American bulldog, Zinga, sleeping at his feet. Zinga died three years ago of cancer, but the tradition of working with your dog at your side lives on at 650 Townsend St.Even in the IT department, called Global

  • InformationWeek 500
  • Cloud computing
  • Social Networking and Collaboration
  • InformationWeek
  • Details

Zeroing in on Security for Collaboration

by HotshotOct 02, 2019

Enterprises and government agencies need modern messaging-based collaboration tools to conduct their business, but they also need to protect their intellectual property while meeting stringent compliance and privacy regulations.

A number of unified communications and collaboration (UC&C) infrastructure vulnerabilities exist in your organization?s networks today. Tackling these vulnerabilities requires a special approach to security that includes a zero-trust architecture,

  • Security
  • Unified Communications
  • Details

Zero-Trust In Practice

by GigamonMar 05, 2020

Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model ? trust nothing, verify everything ? is the proposed answer to this problem. But it?s easier said than done in real enterprise. In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security


Zero Trust Internet: 100% Email & Web Security

by Menlo SecurityOct 22, 2019

The "detect and prevent" approach has reached its potential. Attackers have learned how to bypass this defense method. With Menlo Security's Internet Isolation Platform, you can achieve a Zero Trust Internet.

Learn: How companies can separate their enterprise network from the public web, while allowing employees seamless access to the Internet. How you can warn employees that they are on a phishing site, never having to worry about malware, viruses, or ransomware being downloaded.

  • Menlo Security
  • Cybersecurity
  • Network & Perimeter Security
  • Details

YouTooCanTube: How Businesses Can Put Web Video To Use

by InformationWeekOct 02, 2006

New products from Cisco and others will help them make informal video like YouTube's relevant to their companies.

  • Business Intelligence
  • InformationWeek
  • Details

Your On-The-Go Employees Need Mobile Broadband

by InformationWeekMay 12, 2008

Figuring out the 3G and 4G connectivity market is only slightly easier than learning to speak Swahili. But the rewards of providing nomadic employees with broadband connectivity make the effort worthwhile.

  • Social Networking and Collaboration
  • Wireless
  • InformationWeek
  • Details

Your Health? There's an App for That

by InformationWeekSep 26, 2010

 Pharmaceutical giant Merck is bringing patient care into the age of smartphones. The company has launched a series of mobile applications to help users manage ailments ranging from cancer to diabetes to migraines. These free, unbranded applications--including iChemoDiary, iManage Migraine and Vree, which is for people with Type II diabetes--are designed to help patients and caregivers track symptoms, implement treatment plans and get access to important health information. The apps

  • InformationWeek 500
  • Healthcare
  • InformationWeek
  • Details

Your Datas Here Somewhere

by InformationWeekSep 29, 2008

From enabling e-discovery to helping employees dig for information, the demands on enterprise search keep multiplying. Dont count on one approach to meet them all.

  • Business Intelligence
  • InformationWeek
  • Details

Your Data And The P2P Peril

by InformationWeekMar 17, 2008

Usher, 10,000 BC, and your company's confidential spreadsheets could all be out there for the world to grab. Here's how these data leaks happen and what you can do to prevent them.

  • Compliance
  • Security
  • InformationWeek
  • Details

You’re Only as Strong as Your Weakest Third Party

by LookingGlass Cyber Solutions, Inc.Feb 01, 2019

Third party breaches are on the rise and relying on point-in-time assessments won't protect you from tomorrow's breach. Learn how a continuous monitoring program will help your security team monitor, respond, and remedy vendor threats in real-time.

  • LookingGlass Cyber Solutions, Inc.
  • Security
  • Cybersecurity
  • Details