White Papers/Resources
The Technology Decisions Resource Library contains white papers, eBooks, webcasts, videos and technical papers to help you manage and solve work related problems. Select from a variety of application and technology related subjects, supplied by market-leading vendors or written by our editorial team.
The radical strategy transforming cyber risk management
Supplied by Cylance Inc on 04 May, 2017
The 9 Box of Controls is an innovative framework that helps model where an enterprise is with its security and where it could be, with automation and security fully integrated to change the speed and efficacy of protection.
4 foundational steps to build your digital platform
Supplied by Equinix on 18 April, 2017
Digital disruption is pushing enterprises to re-architect networks to support new digital engagement capabilities and leverage digital ecosystems.Achieving this level of engagement requires an interconnection-first approach with four initial steps.
Online strategies to optimise efficiency in government IT
Supplied by on 10 April, 2017
Organisations are saving 14% of their budgets as an outcome of cloud adoption (Gartner reports). More government departments and agencies across the globe are joining the commercial sector and embracing cloud and virtualisation technologies.
The insider’s guide to HD video matrix switching
Supplied by Black Box Network Services Australia on 02 March, 2017
Explore video standards and how they are changing. Understand how matrix switching works, and its benefits. Learn more about HDMI, HDCP and EDID/DDC.
Predictive cybersecurity rewrites the rules of protection
Supplied by Cylance Inc on 01 March, 2017
A new technology paradigm based on artificial intelligence (AI) and machine learning is redefining endpoint protection—and possibly security as a whole. The results are striking. With efficacy rates at 99%, artificial intelligence and machine learning applied at the endpoint protects at levels never before seen.
Colocation-based interconnection critical for digital business — a Gartner report
Supplied by Equinix on 27 February, 2017
Digital business is enabled and enhanced through high-speed, secure, low-latency communication among enterprise assets, cloud resources and an ecosystem of service providers and peers. Architects and IT leaders must consider carrier-neutral data centre interconnection as a digital business enabler.
How application whitelisting can diminish cybercrime
Supplied by Cylance Inc on 31 January, 2017
The Australian Signals Directorate identifies application whitelisting as the most effective strategy to mitigate targeted cyber intrusions. This Australian government agency reports that application whitelisting and the right combination of patches and administrative privilege restrictions can prevent the vast majority of targeted cyber intrusions.
How to deliver cost-effective fibre connectivity
Supplied by Black Box Network Services Australia on 31 January, 2017
Fibre connectivity thrives in high bandwidth and long distances, and has complete immunity to electrical interference. Integrating fibre-optic cabling and active equipment into existing copper-based, structured cabling systems will also generate significant savings.
Your essential guide to RS-422 and RS-485 systems
Supplied by Black Box Network Services Australia on 20 January, 2017
Learn about the main elements of an RS-422 and RS-485 system.
Uncover your organisation’s bad data with this data quality challenge
Supplied by Information Builders on 22 December, 2016
Increasingly complex business transactions, third-party sources and social media channels have led to mounting volumes of bad data living within legacy systems.
Your best practice guide for wireless site design
Supplied by NetScout on 21 December, 2016
With new high-speed standards in place, new regulatory challenges and demand for seamless access, the Wi-Fi network should be at the heart of planning for the future. IT professionals need to come to grips with a broad range of technical, cultural and security issues when designing and implementing or upgrading a wireless network.
Leaders and followers in data protection and availability revealed
Supplied by Veeam Pty Ltd on 09 December, 2016
This report provides a side-by-side comparison of leading data protection and availability solutions, looking at the ability to deliver a holistic backup and recovery strategy. The results are delivered as the Ovum Decision Matrix (ODM), a framework proven to greatly reduce the time and risk involved in product and service procurement.
The future for IT services management — an IDC report
Supplied by on 09 December, 2016
This IDC insight highlights the growing importance of IT services management (ITSM) in the light of digital transformation in. ITSM is now maturing past its traditional processes to include agile and automated services critical to business operations.
How to protect your business from extortive threats
Supplied by Cylance Inc on 01 December, 2016
Australia is being called the land of opportunity for hackers. Attack volumes are up over 100% each year and tens of millions of dollars are flowing to overseas bank accounts as ransomware victims try to buy their way out of security breaches.
Public service strategy for customer engagement
Supplied by SAP Australia Pty Ltd on 22 November, 2016
Public service organisations are under pressure to make service delivery to citizens more accessible and convenient by offering the same consumer-grade experience that users typically encounter with banking and retail.