Downloads
|
Introduction to AWS Security
6 March 2017 / Cybersecurity
Amazon Web Services (AWS) delivers a scalable cloud computing platform designed for high availability and dependability. |
|
|
Information Age magazine: February 2017
22 February 2017 / Data Analytics & Data Science
In a special issue of Information Age, we reveal the winners of the Women in IT Awards 2017, the largest tech diversity event ever staged. |
|
|
Amazon Web Services: Overview of Security Processes
20 February 2017 / Software and Applications
Amazon Web Services (AWS) delivers a scalable cloud computing platform with high availability and dependability, prov... |
|
|
Amazon Web Services: Risk and Compliance
20 February 2017 / Cloud & Edge Computing
This document is intended to provide information to assist AWS customers with integrating AWS into their existing con... |
|
|
Create Your 50 Question RFP: Make Better ITSM Tool Selection Decisions
16 February 2017 / IT management
These documents aren’t easy or fun to create and use, for both customers and tool vendors, and one has to question wh... |
|
|
A European research report on service integration and management (SIAM) adoption
16 February 2017 / IT management
The survey looked at whether these IT professionals are leveraging service automation processes in the supply chain. |
|
|
Shining the Light on Shadow IT
16 February 2017 / IT management
I know of a business manager who was allowed to purchase laptop computers for his team as long as they were not Apple... |
|
|
5 Habits of Highly Effective Service Management Leaders
16 February 2017 / Cloud & Edge Computing
Where does a service management leader start, and how does this person know which projects to spend the bulk of their... |
|
|
The Sad State of Cybersecurity
7 February 2017 / Cybersecurity
Each year, IT faces an increase in targeted cyberattacks, more sophisticated and prepared attackers, a significant in... |
|
|
Safeguarding the internet
7 February 2017 / Cybersecurity
Today, none of us are immune to the impact of botnets on Internet-connected organisations. |
|
|
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
7 February 2017 / Cybersecurity
In particular, network-based security offers enhanced protection against the growing number of unknown threats that a... |
|
|
Information Age Magazine January 2017
16 January 2017 / Diversity
We’re now several years into Information Age’s campaign to achieve diversity in the technology sector, and we dedicat... |
|

