Resources & Whitepapers

Listed below is a selection of technical whitepapers and other advisory notices produced by iTnews' sponsors.

These reports are available free of charge to our subscribers.

Filter by company:

Master the mobile moment

Master the mobile moment

Build mobile apps that build loyalty through a great user experience.
May 15 2015 10:07AM
Measure what matters

Measure what matters

For mobile apps, the user experience is everything. Make sure you’re measuring it - completely and correctly.
May 15 2015 10:02AM
HP AppPulse Mobile

HP AppPulse Mobile

Measure the user experience, understand the business impact.
May 15 2015 9:56AM
The user experience is everything

The user experience is everything

Give users a great experience or they’ll give you the finger.
May 15 2015 9:53AM
What's your FunDex?

What's your FunDex?

Track the user experience of your mobile apps with a single, meaningful score
May 15 2015 9:46AM
Failing to meet mobile app user expectations

Failing to meet mobile app user expectations

A mobile app user survey
May 15 2015 9:39AM
Protect Your Data. Secure Your Threat Vectors.

Protect Your Data. Secure Your Threat Vectors.

No one would simply lock their front door and leave the other “ways in” to their home wide open. Yet many organisations take this exact risk every day with their network security.
Apr 23 2015 2:07PM
Embracing development agility and speed

Embracing development agility and speed

The DevOps debate hasn’t lost any heat.
Mar 3 2015 8:40AM
Moving Beyond Proxies

Moving Beyond Proxies

This webinar looks at the new approach the cyber security.
Feb 27 2015 11:27AM
Database Storage For Dummies®, Oracle Special Edition

Database Storage For Dummies®, Oracle Special Edition

Oracle FS1 intelligently delivers flash performance when you need it and reduces costs by moving data automatically to lower-cost media when you don’t.
Feb 17 2015 3:42PM
2014 Cost of Cyber Crime Study: Australia

2014 Cost of Cyber Crime Study: Australia

Protect what matters. See. Understand. Act.
Jan 22 2015 4:00PM
Case Study: SAP uses HP Fortify to help produce secure applications

Case Study: SAP uses HP Fortify to help produce secure applications

World’s largest business software company relies on HP’s static analysis solution to efficiently scan critical Java code.
Jan 22 2015 3:58PM
Seven steps to software security

Seven steps to software security

Trust your software? Secure your software in seven days
Jan 22 2015 3:54PM
Migrating from Cisco ASA to Palo Alto Networks

Migrating from Cisco ASA to Palo Alto Networks

In this webinar we'll show you how easy it is to move to a next-generation security platform.
Dec 12 2014 9:17AM
The Business Value of IBM zEnterprise System Deployments

The Business Value of IBM zEnterprise System Deployments

IDC has studied the spending patterns of customer sites that have deployed the IBM zEnterprise System for a range of workloads.
Nov 26 2014 4:02PM
Open up the Possibilities of Open Source

Open up the Possibilities of Open Source

More and more companies are taking advantage of open source platforms to address their cloud, analytics, mobile and social needs.
Nov 26 2014 3:55PM
Open source is driving innovation

Open source is driving innovation

Businesses know it. And they’re doing something about it. With over 1 million unique open-source projects, organizations are taking advantage of the benefits.
Nov 26 2014 3:49PM
Banca Carige

Banca Carige

Providing superior customer service by launching innovative mobile services on a secure platform
Nov 26 2014 3:46PM
 America First Credit Union

America First Credit Union

Building a thriving member base on next-generation infrastructure
Nov 21 2014 4:06PM
Preparing for a data centre migration

Preparing for a data centre migration

Preparing for a data centre migration? Here's the top ten tips for a successful move.
Nov 12 2014 12:20PM

Log In

  |  Forgot your password?