White Papers/Resources

The Technology Decisions Resource Library contains white papers, eBooks, webcasts, videos and technical papers to help you manage and solve work related problems. Select from a variety of application and technology related subjects, supplied by market-leading vendors or written by our editorial team.

Note: This is a Member only section and will require you to log-in or join up.


Leading expert insights on Australian public safety

Supplied by Hitachi Data Systems on 17 May, 2017

A recent industry panel of leading experts in counterterrorism, aviation, utilities and education discussed Australian cases of transformation in public safety. A fundamental shift is evident beyond the traditional access control, CCTV and cybersecurity.


How AI slashes your cybersecurity costs — an eBook

Supplied by Cylance Inc on 11 May, 2017

Prevention achieves everything detection can’t. When you move to 100% prediction you save time, money and resources. This white paper walks you through the problem of traditional security and demonstrates the benefits attainable from a radical new solution.


The solutions to your network monitoring challenges

Supplied by Paessler AG on 10 May, 2017

Network monitoring serves as a supplementary, strategically important module in IT security, which should go above and beyond the use of firewalls and virus scanners.


What will next-gen IT architectures look like? — An IDC report

Supplied by Equinix on 10 May, 2017

IDC believes that next-gen IT architectures will be as dynamic and responsive as the real-time business needs they are designed to serve. This kind of digital transformation requires 3rd Platform IT and interconnected services.


New KVM technology for control rooms and operations centres

Supplied by Black Box Network Services Australia on 08 May, 2017

KVM systems have long been one of the hidden foundations of a control room. They have evolved from being an occasional use tool for set-up and troubleshooting into one of those infrastructure items that are used every moment of the day.


The radical strategy transforming cyber risk management

Supplied by Cylance Inc on 04 May, 2017

The 9 Box of Controls is an innovative framework that helps model where an enterprise is with its security and where it could be, with automation and security fully integrated to change the speed and efficacy of protection.


4 foundational steps to build your digital platform

Supplied by Equinix on 18 April, 2017

Digital disruption is pushing enterprises to re-architect networks to support new digital engagement capabilities and leverage digital ecosystems.Achieving this level of engagement requires an interconnection-first approach with four initial steps.


Online strategies to optimise efficiency in government IT

Supplied by on 10 April, 2017

Organisations are saving 14% of their budgets as an outcome of cloud adoption (Gartner reports). More government departments and agencies across the globe are joining the commercial sector and embracing cloud and virtualisation technologies.


The insider’s guide to HD video matrix switching

Supplied by Black Box Network Services Australia on 02 March, 2017

Explore video standards and how they are changing. Understand how matrix switching works, and its benefits. Learn more about HDMI, HDCP and EDID/DDC.


Predictive cybersecurity rewrites the rules of protection

Supplied by Cylance Inc on 01 March, 2017

A new technology paradigm based on artificial intelligence (AI) and machine learning is redefining endpoint protection—and possibly security as a whole. The results are striking. With efficacy rates at 99%, artificial intelligence and machine learning applied at the endpoint protects at levels never before seen.


Colocation-based interconnection critical for digital business — a Gartner report

Supplied by Equinix on 27 February, 2017

Digital business is enabled and enhanced through high-speed, secure, low-latency communication among enterprise assets, cloud resources and an ecosystem of service providers and peers. Architects and IT leaders must consider carrier-neutral data centre interconnection as a digital business enabler.


How application whitelisting can diminish cybercrime

Supplied by Cylance Inc on 31 January, 2017

The Australian Signals Directorate identifies application whitelisting as the most effective strategy to mitigate targeted cyber intrusions. This Australian government agency reports that application whitelisting and the right combination of patches and administrative privilege restrictions can prevent the vast majority of targeted cyber intrusions.


How to deliver cost-effective fibre connectivity

Supplied by Black Box Network Services Australia on 31 January, 2017

Fibre connectivity thrives in high bandwidth and long distances, and has complete immunity to electrical interference. Integrating fibre-optic cabling and active equipment into existing copper-based, structured cabling systems will also generate significant savings.


Your essential guide to RS-422 and RS-485 systems

Supplied by Black Box Network Services Australia on 20 January, 2017

Learn about the main elements of an RS-422 and RS-485 system.


Uncover your organisation’s bad data with this data quality challenge

Supplied by Information Builders on 22 December, 2016

Increasingly complex business transactions, third-party sources and social media channels have led to mounting volumes of bad data living within legacy systems.


  • All content Copyright © 2017 Westwick-Farrow Pty Ltd