Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

3 Things You Need to Know About Prioritizing Vulnerabilities

by TenableAug 19, 2019

91% of organizations had one cyberattack in the last 2 years. Learn how Predictive Prioritization can help you.

  • Tenable
  • Cloud Security
  • Network & Perimeter Security
  • Details

AI vs. AI: The Good, the Bad and the Ugly

by Deep InstinctSep 10, 2019

Think about what would happen when hackers start using the power of AI for their malicious ends? With the dissemination of AI knowledge and resources, this has become not a theoretical question of if, but when. In this webinar we?ll be drawing out the implications of this, as we explore the three possible types of attack which include: AI based attacks ? where malware is built on AI algorithms as an integral part of its business logic. AI based attack infrastructure and frameworks ? where

  • Vulnerabilities & Threats
  • Details

How to Navigate the Intersection of DevOps and Security

by Synopsys Inc.Sep 28, 2018

Learn how to build security into your DevOps culture to ensure secure, high-quality software without sacrificing speed.

  • Synopsys Inc.
  • Security Management & Analytics
  • Risk Management
  • Details

InformationWeek Special Issue: February 2013

by InformationWeekFeb 20, 2013

Disaster Recovery Roadblocks: Don't let data, WAN and integration challenges get in the way of automated failover.
Why Automation's A Good Thing: The conventional wisdom is wrong. It's smart, affordable and good for IT.
Data Points: Find out more from our recent State of Storage Survey.

  • Business Continuity
  • Business Intelligence
  • InformationWeek
  • Details

Informed CIO: Identity Management

by InformationWeekJun 01, 2009

Identity Management: 10 Questions to AskIn today’s global business operating environments, where organizational and geographical boundaries are crossed hundreds of times a day to get the job done, there’s a critical need for standardized identity management. CIOs should keep an eye on government and private-sector federation initiatives—including the GSA’s E-Authentication program, the Liberty Alliance Identity Assurance Framework (LIAF) and the Transglobal Secure

  • Security
  • Risk Management
  • InformationWeek
  • Details

Informed CIO: Storage Automation

by InformationWeekAug 01, 2009

Storage Automation: 8 Questions to Ask Before BuyingImplementing automation tools and processes requires an upfront investment in funding, planning and integrity testing. But the business will reap benefits both immediately and as the footprint and complexity of storage services increase. Operationally, data protection activities, such as snapping clones and replication pairs, can often be readily automated and pay instant dividends by enhancing recoverability in the event of a data loss or

  • Storage
  • Application acceleration
  • Business Continuity
  • Virtualization
  • InformationWeek
  • Details

Research: Choosing a Smartphone

by InformationWeekNov 30, 2008

The Smartphone To OwnThe enterprise smartphone is no longer simply a compact, mobile e-mail device slash
fashion item; it’s quickly becoming an essential tool for corporate applications, collaboration, and personal media, in many cases eclipsing the laptop as the device of choice for mobile professionals.To help enterprise IT groups balance their requirements and future mobility plans with demands from employees wowed by flashy new features, InformationWeek Analytics surveyed 688

  • Wireless
  • Application acceleration
  • Social Networking and Collaboration
  • InformationWeek
  • Details

Research: E-Mail Archiving

by InformationWeekNov 01, 2008

E-Mail Archives: Essential For Today’s BusinessEvery good courtroom drama shows a beleaguered attorney sifting through mountains of paper in search of a damning document that will sink the opposition's case like a depth charge.These days, that beleaguered attorney is more likely to be sitting in front of a computer screen, trying to filter terabytes of data with complex search queries.It may be less cinematic, but it's reality.It's also the reason so many enterprises are investigating

  • Business Intelligence
  • InformationWeek
  • Details

Research: Remote Application Delivery

by InformationWeekJun 01, 2009

Anywhere, Anytime: Enabling Fast Remote Application DeliveryWe just dodged a tsunami of demand for remote access to desktop applications—had the H1N1 flu pandemic proved deadly on a wide scale in the United States, governments and large enterprises were set to pull the trigger on massive telework contingency plans. So what, you say? The Federal Mobility 2.0 study released by the Telework Exchange reported that 1,250,980 federal employees were eligible to telework in July 2008, with that

  • Application acceleration
  • Data centers
  • Infrastructure
  • InformationWeek
  • Details

.NET Apps Put to the Test

by InformationWeekJul 12, 2011

Unit testing is a popular practice in which small tests are written to quickly validate the operation of a unit of code. Typically, a project will have hundreds if not thousands of tests to validate the code.
Unit testing is an automatic tool that can catch regressions--unwanted changes in previously working code--introduced during development and refactoring. However, it won’t guarantee the quality and correctness of your software.

  • Data centers
  • Business Intelligence
  • InformationWeek
  • Details