<?xml version="1.0" encoding="UTF-8"?>
<ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>aa.techdemand.io</Name><Prefix></Prefix><Marker></Marker><MaxKeys>1000</MaxKeys><IsTruncated>true</IsTruncated><Contents><Key>017CA2654C3E9EB4B1A0386221B0B7E9.json</Key><LastModified>2024-08-28T13:06:28.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>06E8C621A9C3ECC1D56E2577761F456B.json</Key><LastModified>2024-08-28T13:06:27.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>1ee4c62b-b51c-47f9-8da9-7ef2236a3f6a</Key><LastModified>2024-09-18T16:04:09.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>2E7E9543F4C0AE058558CE01339B120F.json</Key><LastModified>2024-08-28T13:37:34.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>8FA0FBC8CDFFA64930372D187A66724F.json</Key><LastModified>2024-08-28T13:37:33.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/</Key><LastModified>2022-06-10T15:18:57.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/Do and Donot.jpg</Key><LastModified>2022-06-16T16:55:15.000Z</LastModified><ETag>&quot;8a1959860853c57e27968de8b76185cc&quot;</ETag><Size>58971</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/Group 2739.png</Key><LastModified>2023-06-16T15:04:22.000Z</LastModified><ETag>&quot;f58a37abf537920549b355a183fdcbdf&quot;</ETag><Size>869</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/Group-2739.png</Key><LastModified>2023-06-16T15:04:40.000Z</LastModified><ETag>&quot;f58a37abf537920549b355a183fdcbdf&quot;</ETag><Size>869</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/MicrosoftTeams-image.png</Key><LastModified>2023-09-07T14:01:17.000Z</LastModified><ETag>&quot;f9e92614cb69ddadc9d3c121e9c0a962&quot;</ETag><Size>1443</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/Moveworks_5ChatBotCapabilities-pdf.jpg</Key><LastModified>2022-06-27T10:08:33.000Z</LastModified><ETag>&quot;c6feaacf334dc5fb337ade7925b19a87&quot;</ETag><Size>237253</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/PreLog.png</Key><LastModified>2023-06-16T15:07:52.000Z</LastModified><ETag>&quot;b872c74ae24bd1a10d88dbd139a18881&quot;</ETag><Size>973</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/Predictiv-Fav-01.png</Key><LastModified>2023-06-19T16:19:27.000Z</LastModified><ETag>&quot;4f3fe8d07ff12a8d4e10d2c0738f4483&quot;</ETag><Size>729</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/Predictiv-Fav-02.png</Key><LastModified>2023-06-19T16:19:39.000Z</LastModified><ETag>&quot;3d0d2171091d82c3c403e4bf45bbec0b&quot;</ETag><Size>733</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/Predictiv-logo-new.png</Key><LastModified>2023-06-16T13:47:02.000Z</LastModified><ETag>&quot;b872c74ae24bd1a10d88dbd139a18881&quot;</ETag><Size>973</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/Predictiv-logo.png</Key><LastModified>2023-06-16T10:37:36.000Z</LastModified><ETag>&quot;b872c74ae24bd1a10d88dbd139a18881&quot;</ETag><Size>973</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/Site-to-Site-VPN.jpg</Key><LastModified>2022-06-16T17:01:00.000Z</LastModified><ETag>&quot;4bb49313985407bde87dec4f78154104&quot;</ETag><Size>51683</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/arxiv.PNG</Key><LastModified>2022-12-05T15:35:41.000Z</LastModified><ETag>&quot;6f1584bd95f0d49f00f039ca398f7ba8&quot;</ETag><Size>548580</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/awss3.txt</Key><LastModified>2022-06-16T11:22:46.000Z</LastModified><ETag>&quot;39d6a259e37f48c379c03c50f64fd540&quot;</ETag><Size>24</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/d95e30b2e05b0693132d1b00d4aec3ed.svg</Key><LastModified>2026-01-29T22:05:47.000Z</LastModified><ETag>&quot;d95e30b2e05b0693132d1b00d4aec3ed&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>2886</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/ericsson_hilda_300_normal.ttf</Key><LastModified>2026-01-30T01:38:21.000Z</LastModified><ETag>&quot;df15e60c0437007be95c8427223ea863&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>69912</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/ericsson_hilda_400_normal.ttf</Key><LastModified>2026-01-30T01:37:50.000Z</LastModified><ETag>&quot;41c1b0423aa3d7168c910ca6705f9bc2&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>70056</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/fallback-image.jpg</Key><LastModified>2026-01-29T22:04:01.000Z</LastModified><ETag>&quot;7d5c26ccb22b82ab96bc38b31d3d6073&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>14485</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/floating-right.svg</Key><LastModified>2023-11-22T12:49:13.000Z</LastModified><ETag>&quot;30a7d60cb2ce146afee206ad1f48bbd3&quot;</ETag><Size>5220</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/floting-left.svg</Key><LastModified>2023-11-22T12:50:57.000Z</LastModified><ETag>&quot;d6124ef582c88df7d8d2fd8ccf96bc3a&quot;</ETag><Size>5045</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/input-output.PNG</Key><LastModified>2022-12-05T15:39:06.000Z</LastModified><ETag>&quot;b2a9d0bae5b7a90a2fafd936fc050d97&quot;</ETag><Size>826873</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/</Key><LastModified>2022-06-10T15:54:31.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Counterproductive_Performance_Management_Assumptions.jpg</Key><LastModified>2022-05-12T16:01:27.000Z</LastModified><ETag>&quot;6e6e393262ebc9ee622019295124e38e&quot;</ETag><Size>357556</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Counterproductive_Performance_Management_Assumptions.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;b3dbaaf88c52d0d4f23d0ca5ed939453&quot;</ETag><Size>128879</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Features_Every_Web_App_Firewall_Should_Provide.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;b89fe0554e3338318a096c99399426a8&quot;</ETag><Size>656367</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Features_Every_Web_App_Firewall_Should_Provide.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;b7b54139aeaad5919bb272730bf53557&quot;</ETag><Size>201647</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Reasons_Big_Data_Is_Important_Today.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;db898c7c5600fae11dbcd5f570ed3d21&quot;</ETag><Size>523387</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Reasons_Big_Data_Is_Important_Today.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;cf277cae19484f00925bc10a4e3bf482&quot;</ETag><Size>119384</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Reasons_to_Consider_Marketing_Automation.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;e8e45cab2202ca22412d8c850ea66725&quot;</ETag><Size>423708</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Reasons_to_Consider_Marketing_Automation.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;73e9e286beec32c72562a645a007319c&quot;</ETag><Size>250891</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Things_Every_Web_Application_Firewall_Should_Provide.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;b89fe0554e3338318a096c99399426a8&quot;</ETag><Size>656367</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_Things_Every_Web_Application_Firewall_Should_Provide.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;b7b54139aeaad5919bb272730bf53557&quot;</ETag><Size>201647</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_best_practices_for_automating_appointment_management.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;5e01975ecf45c4ebd02d7ece76e280e8&quot;</ETag><Size>480408</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/10_steps_to_cleaning_up_active_directory_user_accounts____and_keeping_them_that_way.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;0a31e2a811231124eb9ea456f22175df&quot;</ETag><Size>128067</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/12_Tips_for_Mobile_Design.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;3fc56059a8d575db2a130e1afda06af8&quot;</ETag><Size>499272</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/12_Tips_for_Mobile_Design.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;ce88e638098556628e03ea920fef9db9&quot;</ETag><Size>398321</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/13_Ways_to_Get_Reward_and_Recognition_Right.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;34a2ca582954f1ca566f105694d0a61b&quot;</ETag><Size>242072</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/13_Ways_to_Get_Reward_and_Recognition_Right.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;10f2b45640a5d59ee7c3ccecb45e919e&quot;</ETag><Size>81511</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/15_Keys_for_Ensuring_a_Successful_Windows_10_Migration_with_End_User_Experience_Monitoring.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;e46840d3de5180d54299927089954260&quot;</ETag><Size>551871</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/15_Keys_for_Ensuring_a_Successful_Windows_10_Migration_with_End_User_Experience_Monitoring.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;b978779e95cb86997a660dc6f019a519&quot;</ETag><Size>132607</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/15_ways_to_use_event_technology_to_create_sponsorship_packages.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;923da11fb4e4aceeb81eafabada18c99&quot;</ETag><Size>297318</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_Defense_Report_Cyberthreat_for_Financial_Services_.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;834848df1ae1f8f49df178136281536b&quot;</ETag><Size>562895</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_Defense_Report_Cyberthreat_for_Financial_Services_.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;059fecd623088f7f7c436ddcbe38b82c&quot;</ETag><Size>884220</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_Defense_Report_Cyberthreat_for_Government.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;ddb328bad2ad36aa5056a513676d92a2&quot;</ETag><Size>558950</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_Defense_Report_Cyberthreat_for_Government.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;e1d8921c88dc5eab55ffb384cf754749&quot;</ETag><Size>869384</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_Defense_Report_Cyberthreat_for_Healthcare.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;e66384c63441a8d0d077803769f891e1&quot;</ETag><Size>563043</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_Defense_Report_Cyberthreat_for_Healthcare.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;6aa443069355f3615e25d62ff865ced1&quot;</ETag><Size>835789</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_Dresner_Big_Data_Analytics_Market_Study_Sponsored_by_Pentaho_.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;ffd2682b163634f268842d0120ba810a&quot;</ETag><Size>481122</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_Dresner_Big_Data_Analytics_Market_Study_Sponsored_by_Pentaho_.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;81ce326d07082db6b0e07be3163b1211&quot;</ETag><Size>120432</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_ROI_Report_A_Small_Investment_That_Pays_Big.jpg</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;d2376e5ce07003e81a4ecb929f84571d&quot;</ETag><Size>57814</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2016_ROI_Report_A_Small_Investment_That_Pays_Big.png</Key><LastModified>2022-05-12T16:01:28.000Z</LastModified><ETag>&quot;12feb9a5fac56b8b6e0526c07bed97c3&quot;</ETag><Size>61251</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2017_Cyberthreat_Defense_Report.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;f1e043c899411aa0a7f53867959b428d&quot;</ETag><Size>1109344</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2017_Cyberthreat_Defense_Report.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;16bc1500d0aca6cbc5771f447896f17c&quot;</ETag><Size>447719</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2017_Digital_Transformation_in_Travel_Report.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;a45979a70614c0f09e357d5821316c5b&quot;</ETag><Size>850972</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2017_Digital_Transformation_in_Travel_Report.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;ed2d7fd2a1409b331c0a0ac3ea2ef937&quot;</ETag><Size>299179</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2017_Digital_Trends.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;ca20e451e85cd5f45d5fa31967aec784&quot;</ETag><Size>567465</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2017_Digital_Trends.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;f333ed9f67da7bebc26d560f6a1dfc7c&quot;</ETag><Size>119151</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2018_All_flash_Array_Buyers_Guide.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;320f2fbf50c1d916b046ff1706d954f7&quot;</ETag><Size>593387</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2018_All_flash_Array_Buyers_Guide.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;811833a55d4e3904923b22d552f7e9bb&quot;</ETag><Size>155537</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2018_cloud_big_data_platforms_buyers_guide.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;6d91d4d074c9ee26f32e273fbdb9ff92&quot;</ETag><Size>736698</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2018_cybersecurity_perceptions_and_practices.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;e80bfd1d3d1ce570ea9eebcaf0300d32&quot;</ETag><Size>396884</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/2018_cyberthreat_defense_report.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;479762f87b9ad6f24589aa5a70356c2c&quot;</ETag><Size>979932</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/451_Big_Data_Whitepaper_The_Cloud_Based_Approach_to_Achieving_Business_Value_from_Big_Data.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;5b7af17049934100ef34832c979f77f3&quot;</ETag><Size>538259</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/451_Big_Data_Whitepaper_The_Cloud_Based_Approach_to_Achieving_Business_Value_from_Big_Data.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;97c641be1b781bca6d8d3d0d801efa7b&quot;</ETag><Size>134239</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/4_Compelling_Use_cases_for_Hyper-Converged_Infrastructure.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;fe9172dce58495c58f065e482ad6a69e&quot;</ETag><Size>603741</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/4_Compelling_Use_cases_for_Hyper-Converged_Infrastructure.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;658f3e19843341702ab7ab15665cb443&quot;</ETag><Size>381144</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/4_IT_Initiatives_Boosted_by_Network_Virtualization.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;2f1521738ddf73e92ac6a16cc8b1d9a6&quot;</ETag><Size>756959</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/4_IT_Initiatives_Boosted_by_Network_Virtualization.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;3394356f68475f372264410332fadd75&quot;</ETag><Size>276873</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/4_Key_Requirements_to_Automate_Application_Delivery.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;406349ecf5f880cacc2ea7ed3af3282a&quot;</ETag><Size>834149</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/4_Key_Requirements_to_Automate_Application_Delivery.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;19e5fb45af1e67591bfa15f3b7d02e82&quot;</ETag><Size>371373</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/4_Keys_to_Customer_Analytics.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/4_Keys_to_Customer_Analytics.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/4_essentials_for_turning_the_iot_into_actionable_intelligence_snackable.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;db729da91f11789839e688bc89b308b7&quot;</ETag><Size>730012</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5 Ways Veritas Makes VMware VSphere Backup Rock!.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;33473faf3bc112bbfa11b299a9d12783&quot;</ETag><Size>1003146</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5 Ways Veritas Makes VMware VSphere Backup Rock!.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;a9da98bcf17a1e4a62013fb231607593&quot;</ETag><Size>486341</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5 Ways Veritas NetBackup 8 Makes Microsoft Hyper-V Backup Rock!.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;4c864b7973be90b27f06432cf39a1d38&quot;</ETag><Size>1011962</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5 Ways Veritas NetBackup 8 Makes Microsoft Hyper-V Backup Rock!.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;d73fab4ff680e4a22582f1280fcbd87a&quot;</ETag><Size>517055</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Categories_of_Questions_for_Evaluating_AI_Driven_Security_Solutions.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;c1bc93bdf34ce3a4e520f861aa3fd4bc&quot;</ETag><Size>894124</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Critical_KPIs_for_Field_Service_Success.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;056030fbfffc51014241e9a39ccf7783&quot;</ETag><Size>914405</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Critical_KPIs_for_Field_Service_Success.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;39aeff00ff85917b8354bf4aaf1d3715&quot;</ETag><Size>372971</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Important_Buying_Criteria_to_Enable_a_totally_Mobile_Workforce.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;86f6fa71fddef5990f820cd5b183781f&quot;</ETag><Size>458378</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Important_Buying_Criteria_to_Enable_a_totally_Mobile_Workforce.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;47fbd9e455b6375c078f54440bdfbd74&quot;</ETag><Size>73123</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_Joining_Performance_and_Learning_Drives_Growth.jpg</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;83fcf285ec25b994cda8e336a6990182&quot;</ETag><Size>788093</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_Joining_Performance_and_Learning_Drives_Growth.png</Key><LastModified>2022-05-12T16:01:29.000Z</LastModified><ETag>&quot;6e8f12bf9454207da182c21a930d0b51&quot;</ETag><Size>298465</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_Why_its_Time_to_Upgrade_Your_Servers.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;64a3c90353ff6757e3f5357c4b4507e0&quot;</ETag><Size>785790</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_Why_its_Time_to_Upgrade_Your_Servers.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;9660b0eef37dae5a0a3ef76ee742c9f6&quot;</ETag><Size>437966</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_to_Choose_VMware_Hyper-Converged_Software.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;174913e9a63992b13563133b1be3f4d6&quot;</ETag><Size>489193</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_to_Choose_VMware_Hyper-Converged_Software.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;0fa83dd0e911ad301367b7ce2609ea4c&quot;</ETag><Size>251728</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_to_Consider_Paying_for_Your_Employees_Vacations.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;79342559e0408475c3b565f9e08cfef1&quot;</ETag><Size>523121</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_to_Consider_Paying_for_Your_Employees_Vacations.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;175ed6fd84ce82e23adfe673410ea8d0&quot;</ETag><Size>113092</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_to_Run_Your_Business-Critical_Workloads_on_Oracle_Linux.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Reasons_to_Run_Your_Business-Critical_Workloads_on_Oracle_Linux.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Steps_to_Achieve_Risk-Based_Application_Security_Management.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;82004e6540e4d3de42d255b829e1fd17&quot;</ETag><Size>637308</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Steps_to_Achieve_Risk-Based_Application_Security_Management.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;b3faa5ff10d36a10324319031d6789f1&quot;</ETag><Size>184781</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Steps_to_Take_Your_Backup_from_Good_to_Excellent_with_Amazon_Web_Services.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;a4e7357bf73463b8d2aca744651876d6&quot;</ETag><Size>938503</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Steps_to_Take_Your_Backup_from_Good_to_Excellent_with_Amazon_Web_Services.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;844ce6e31c8a8177bda53b3420574639&quot;</ETag><Size>434863</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Strategies_for_More_Effective_Performance_Reviews.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;73e2b6f270503726c9b585d1fdcc7b92&quot;</ETag><Size>687179</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Strategies_for_More_Effective_Performance_Reviews.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;a27967e4cbd20e6e36ace7fbec1e3b13&quot;</ETag><Size>210409</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_Marketing_Automation_Can_Help_Your_Enterprise_Grow.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;72908a7669b3c92c4be3aad4a57cc131&quot;</ETag><Size>419394</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_Marketing_Automation_Can_Help_Your_Enterprise_Grow.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;14091f95ebcbdcc2a81e01bc081d50c0&quot;</ETag><Size>222440</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_Your_Vendor_Risk_Management_Program_Leaves_You_In_The_Dark.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;ed0fa9eb868a758f38715a364beee73a&quot;</ETag><Size>562010</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_Your_Vendor_Risk_Management_Program_Leaves_You_In_The_Dark.png</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;cef68476803f71301095cef724d6337a&quot;</ETag><Size>144345</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_for_Effective_Learning.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;f22bfabe2a8eb8baee537baccb22aa73&quot;</ETag><Size>777764</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_for_Effective_Learning.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;0309c6e565d64609ce83f885fb2d539e&quot;</ETag><Size>296731</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_to_Boost_Your_Bottom_Line_This_Holiday_Season.jpg</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;40d2084368b830257901957212b83cca&quot;</ETag><Size>530084</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_to_Boost_Your_Bottom_Line_This_Holiday_Season.png</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;8015824aa396e9ea60ad5c6de0b05a02&quot;</ETag><Size>282782</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_to_Boost_Your_Security_Teams_Impact___eBook.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;911f4d7294543cd1981c590b3f459c43&quot;</ETag><Size>723318</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_to_Boost_Your_Security_Teams_Impact___eBook.png</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;9912ddb7bcdbe98826ad50d5f510bbd3&quot;</ETag><Size>492914</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_to_Wow_the_Connected_Customer.jpg</Key><LastModified>2022-05-12T16:01:30.000Z</LastModified><ETag>&quot;c6933999ca3e27be3861da588e480b9c&quot;</ETag><Size>700176</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_Ways_to_Wow_the_Connected_Customer.png</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;a41374a7f58b032b02caaad790a639c4&quot;</ETag><Size>271193</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_proven_ways_to_motivate_and_retain_your_tech_team.jpg</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;c353b950e9286f0ae167d57bca3965a7&quot;</ETag><Size>733655</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_proven_ways_to_motivate_and_retain_your_tech_team.png</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;07e5ce878fd72b5b17551fdc3712322a&quot;</ETag><Size>473984</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_proven_ways_to_motivate_and_retain_your_technology_team.jpg</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;ae87f95aab0185864c55938fcfc93123&quot;</ETag><Size>494835</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_proven_ways_to_motivate_and_retain_your_technology_team.png</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;f71e7382a0ea11f65647cb6433358c5c&quot;</ETag><Size>334207</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_reasons_why_security_orchestration_is_not_enough.jpg</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;b98bb2629bbbf85ccfd033a86c3caa98&quot;</ETag><Size>275511</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_steps_to_an_ai_proof_of_concept.jpg</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;b2001b17b4ba098207c3e29d2dda2b90&quot;</ETag><Size>347424</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_tips_for_workplace_happiness.jpg</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_tips_for_workplace_happiness.png</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_ways_to_build_a_culture_of_learning_for_your_team.jpg</Key><LastModified>2022-05-12T16:01:31.000Z</LastModified><ETag>&quot;67ccb131f4206fcbcbf1478af16488a2&quot;</ETag><Size>313022</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/5_ways_to_build_a_culture_of_learning_for_your_team.png</Key><LastModified>2022-05-12T16:01:32.000Z</LastModified><ETag>&quot;f920c3acf09082f81bddde79db380803&quot;</ETag><Size>193954</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/6_Reasons_Your_Workloads_Demand_a_Server_Refresh_Now.jpg</Key><LastModified>2022-05-12T16:01:32.000Z</LastModified><ETag>&quot;c1ae045c8113208de21cdd23d0bf3a5b&quot;</ETag><Size>187991</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/6_Reasons_Your_Workloads_Demand_a_Server_Refresh_Now.png</Key><LastModified>2022-05-12T16:01:32.000Z</LastModified><ETag>&quot;68f52405ab7b47c7387d7c549c26f615&quot;</ETag><Size>380910</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/6_Steps_to_Performance_Management_Best_Practices_for_Mid-Market.jpg</Key><LastModified>2022-05-12T16:01:32.000Z</LastModified><ETag>&quot;eacae0f005e571d60882de3e8b6458d2&quot;</ETag><Size>684256</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/6_Steps_to_Performance_Management_Best_Practices_for_Mid-Market.png</Key><LastModified>2022-05-12T16:01:32.000Z</LastModified><ETag>&quot;7426dceef4a0f238df6da363ff30a3ff&quot;</ETag><Size>222596</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/6_critical_reasons_for_office_365_backup.jpg</Key><LastModified>2022-05-12T16:01:32.000Z</LastModified><ETag>&quot;7980bb9d5e73dc87b5f3578e3cc5caf7&quot;</ETag><Size>550617</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Data_Visualizations_Youre_Not_Using_Enough_Whitepaper_.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;1834493dcec9121c186a20a5a58c63f5&quot;</ETag><Size>475100</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Data_Visualizations_Youre_Not_Using_Enough_Whitepaper_.png</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;a6109aa30af20dc83fa9d039b740f71f&quot;</ETag><Size>63913</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Key_Success_Factors_for_SIAM_Transformation.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;40db1c54fc0193255ec7627f9392e6eb&quot;</ETag><Size>422264</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Key_Success_Factors_for_SIAM_Transformation.png</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;54c03ae8474f8530e323f4087a3e7271&quot;</ETag><Size>238405</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Reasons_Why_Micro-Segmentation_is_Powerful_to_Have_and_Painless_to_Add.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;fbb2427d81a4450e4df32f96ad0fe799&quot;</ETag><Size>1042072</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Reasons_Why_Micro-Segmentation_is_Powerful_to_Have_and_Painless_to_Add.png</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;849502f657836b4301fc5f35e3febdb9&quot;</ETag><Size>467739</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Steps_to_Build_a_GRC_Framework.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;66dff1290431d37d548f2e5ba711f59f&quot;</ETag><Size>877155</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Steps_to_Build_a_GRC_Framework.png</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;e2316a6d6e5d0c97bebf7ae26aa2ee04&quot;</ETag><Size>313097</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Steps_to_Creating_a_High-Impact_MarTech_Stack.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;d10ca0fdcaf08aed2ee9f6ab85cbbb42&quot;</ETag><Size>568318</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Steps_to_Creating_a_High-Impact_MarTech_Stack.png</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;aaa46fe6f4dc602d0202ebf9e8a6431f&quot;</ETag><Size>317494</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Tips_for_Getting_Field_Teams_to_Embrace_Construction_Software.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;9cc099ae6c6484103ed8b6432254c21f&quot;</ETag><Size>449651</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/7_Tips_for_Getting_Field_Teams_to_Embrace_Construction_Software.png</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;c1d9244206ac8f8bce14aafff13df6b2&quot;</ETag><Size>292609</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/8_Biggest_Mistake_Email_Marketers_Make_and_How_to_Avoid_Them.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;809d90fdd28721cd71144a6cf7bd3e16&quot;</ETag><Size>393722</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/8_Biggest_Mistake_Email_Marketers_Make_and_How_to_Avoid_Them.png</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;65b1e9c7c9b22b7ed26bc78ddb541720&quot;</ETag><Size>248513</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/8_Common_Pitfalls_of_App_and_Desktop_Virtualization_and_How_to_Avoid_Them.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;c2f68539a76f0d8d3864534ef246905f&quot;</ETag><Size>468160</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/8_Common_Pitfalls_of_App_and_Desktop_Virtualization_and_How_to_Avoid_Them.png</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;c675f922b47f09a73f33670a257eea28&quot;</ETag><Size>86337</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/9_reasons_to_make_the_move_to_a_cloud_contact_center.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;891972388548ee436d78ca0bc61faa82&quot;</ETag><Size>615285</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ADI_Advertising_Report_Adobe_Digital_Insights.jpg</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;3aada5634c96c1668ccf0bc78f89a88d&quot;</ETag><Size>637490</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ADI_Advertising_Report_Adobe_Digital_Insights.png</Key><LastModified>2022-05-12T16:01:33.000Z</LastModified><ETag>&quot;b147b7c5fdf0459372c1654226e4ff2c&quot;</ETag><Size>367005</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/APM_smart_paper.jpg</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;abe9e36ed6cccbb890b797b1d9bc801d&quot;</ETag><Size>585560</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/APM_smart_paper.png</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;b5a1b79a8eaae97a6a49316ae020d08f&quot;</ETag><Size>152656</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Best_Practices_for_DDoS_Resiliency.jpg</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;4ac4d0ea1124e1a5a94311a7ee2743b7&quot;</ETag><Size>436196</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Best_Practices_for_DDoS_Resiliency.png</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;25622efd71311e9cc71dc1022bdadc9c&quot;</ETag><Size>73586</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Cloud_Adoption_Framework.jpg</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;e91b826b1307db03dbb311f2b15ccb00&quot;</ETag><Size>444775</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Cloud_Adoption_Framework.png</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;5958ff99a8fd719995a94496ff52c993&quot;</ETag><Size>74747</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Cloud_Transformation_Model.jpg</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;5ab101c7f3546a9b6cc515add49f7d0b&quot;</ETag><Size>437227</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Cloud_Transformation_Model.png</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;87564a70db09a029873561f8d081753f&quot;</ETag><Size>68752</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Key_Management_Service_Best_Practice.jpg</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;0b12741f0b4ab983ec3e2accd6cbc9be&quot;</ETag><Size>437426</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Key_Management_Service_Best_Practice.png</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;248f4278c5668e082d364df10efd8148&quot;</ETag><Size>69629</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Security_Best_Practices.jpg</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;18918add9dc48ff6ce9ad9b2c3da3479&quot;</ETag><Size>441416</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Security_Best_Practices.png</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;a3d887bd13c0c4e2e80a241f3f69889b&quot;</ETag><Size>76043</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Security_Checklist.jpg</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;70f7ee360c806ba4a7b1ce53215cbf35&quot;</ETag><Size>401345</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Security_Checklist.png</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;de6dbf893dd06a29b90104521139341b&quot;</ETag><Size>271592</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Security_Whitepaper.jpg</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;e8394ffe612151fd2fe97c9780e30e25&quot;</ETag><Size>456042</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Security_Whitepaper.png</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;edd2701ea7a02c3f3eb954b3157859d5&quot;</ETag><Size>80320</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Visibility_into_Public_Cloud_Infographic_.jpg</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;fb9c1367b51ac680ddb5cfc0bedd402c&quot;</ETag><Size>203476</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/AWS_Visibility_into_Public_Cloud_Infographic_.png</Key><LastModified>2022-05-12T16:01:34.000Z</LastModified><ETag>&quot;23b0e9208bccae6e1e9a3e81cc0f1dc7&quot;</ETag><Size>305142</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Buying_Guide_For_Next-Gen_Remote_Access.jpg</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;58a2b2643803c2f48845a65317d6251b&quot;</ETag><Size>434921</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Buying_Guide_For_Next-Gen_Remote_Access.png</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;cd739eeb323f27f2ac081539550e16c6&quot;</ETag><Size>211552</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Guide_to_Private_Cloud_Security.jpg</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;9a7d1d5a9ae6e35c6e7d5fd564ba44db&quot;</ETag><Size>591581</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Guide_to_Private_Cloud_Security.png</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;b550da9a42a3f0ea76ce340e5e9c5699&quot;</ETag><Size>180358</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_New_Paradigm_for_Identity_Assurance.jpg</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;61395ad242d375cc89c8bb485c48376a&quot;</ETag><Size>838698</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_New_Paradigm_for_Identity_Assurance.png</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;9746a10c9f8fa0d9e180dc431a2ba68c&quot;</ETag><Size>365016</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Practical_Guide_For_Metrics_Monitoring_and_Approaches.jpg</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;296654e1af9323a449db76b923133d27&quot;</ETag><Size>265844</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Practical_Guide_For_Metrics_Monitoring_and_Approaches.png</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;c75423a536635da7f41b31b460348a84&quot;</ETag><Size>110746</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Practical_Guide_for_Automating_IT.jpg</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;7950f644a20bc1974f0526373bc377c2&quot;</ETag><Size>449581</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Practical_Guide_for_Automating_IT.png</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;7d83225890d55ae340f1b3684b5c4413&quot;</ETag><Size>73072</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Practical_Guide_for_GDPR_Compliance.jpg</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;028b5a76f012f6eea5426b05c4fee8e8&quot;</ETag><Size>488168</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Practical_Guide_for_GDPR_Compliance.png</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;cbff737106ef2eac19845dff2b36632a&quot;</ETag><Size>110946</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Quick_Guide_to_Modernizing_Customer_Service.jpg</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;cbb9f58e35db60e9f82cb2fd4d602128&quot;</ETag><Size>830513</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Quick_Guide_to_Modernizing_Customer_Service.png</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;717daab915b7fd31bf8080dc30d855d7&quot;</ETag><Size>302130</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Recipe_for_Lean_Account-Based_Marketing.jpg</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;9264b5746a288279342ebb2e06642bc2&quot;</ETag><Size>593657</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Recipe_for_Lean_Account-Based_Marketing.png</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;21bd445a48d1d11215ddcb439e9eef45&quot;</ETag><Size>340503</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Risk_Managers_Guide_to_GDPR.jpg</Key><LastModified>2022-05-12T16:01:35.000Z</LastModified><ETag>&quot;8600d91f2566c66b71e920cda6bbe67f&quot;</ETag><Size>996421</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Risk_Managers_Guide_to_GDPR.png</Key><LastModified>2022-05-12T16:01:36.000Z</LastModified><ETag>&quot;65d08a28aba290f91adc6b1ba2dca5ae&quot;</ETag><Size>362337</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Shift_to_Remote_IT_Services_Alleviates_Support_and_Help_Desk_Headaches.jpg</Key><LastModified>2022-05-12T16:01:36.000Z</LastModified><ETag>&quot;44256ecc91679f44801b8ab701ec82a7&quot;</ETag><Size>574888</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Shift_to_Remote_IT_Services_Alleviates_Support_and_Help_Desk_Headaches.png</Key><LastModified>2022-05-12T16:01:36.000Z</LastModified><ETag>&quot;17fcb05a8ac13dbd11648686e8263135&quot;</ETag><Size>151656</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_Simplified_Network_for_Distributed_Enterprises.jpg</Key><LastModified>2022-05-12T16:01:36.000Z</LastModified><ETag>&quot;5ae9539f936f078f7d562e314cdbcb70&quot;</ETag><Size>498271</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_guide_to_brilliant_advertising.jpg</Key><LastModified>2022-05-12T16:01:36.000Z</LastModified><ETag>&quot;abd41c459681849c59310db8288874d1&quot;</ETag><Size>638901</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/A_guide_to_brilliant_advertising.png</Key><LastModified>2022-05-12T16:01:36.000Z</LastModified><ETag>&quot;9f610fa8edb00e7fa64731d23aacadb9&quot;</ETag><Size>555293</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Aberdeen_Live_Chat_the_Gift_that_Keeps_on_Giving.jpg</Key><LastModified>2022-05-12T16:01:36.000Z</LastModified><ETag>&quot;a296689419fe257c42058aa70b05261a&quot;</ETag><Size>721471</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Aberdeen_Live_Chat_the_Gift_that_Keeps_on_Giving.png</Key><LastModified>2022-05-12T16:01:36.000Z</LastModified><ETag>&quot;ae36df844bbb74e2fae87c7a19c22b22&quot;</ETag><Size>268084</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Aberdeen_Mobile_Shopper_Experience_Management.jpg</Key><LastModified>2022-05-12T16:01:36.000Z</LastModified><ETag>&quot;e05058ad1a0378e17a2e934695a01367&quot;</ETag><Size>77294</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Aberdeen_Mobile_Shopper_Experience_Management.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;5b4aa404c8e8075f97595e05b67f7aa7&quot;</ETag><Size>12528</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Aberdeen___Video_Collaboration_in_the_Field__See_the_Path_To_Resolution.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;5da1e1e66a1e759fbb98b24fba3d85a9&quot;</ETag><Size>144505</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Aberdeen___Video_Collaboration_in_the_Field__See_the_Path_To_Resolution.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;ed24f41b9e8dae580362dc736cf0884e&quot;</ETag><Size>11345</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Accelerate_Your_Sales_Performance.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;3fb7cdecfda9ce944cd4f5e84fd539ec&quot;</ETag><Size>619380</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Accelerate_Your_Sales_Performance.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;6116b93930ceed92b23119ad88bbf6e5&quot;</ETag><Size>201209</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Account_Takeover_7_Ways_to_Mitigate_the_Growing_Risks_of_Account_Takeover.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;8f41a70176d02b0535b36a0bfdb7a9a9&quot;</ETag><Size>250421</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Account_Takeover_7_Ways_to_Mitigate_the_Growing_Risks_of_Account_Takeover.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;2fd8af494e632683de2b090c55841c24&quot;</ETag><Size>166205</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Achieve_Cloud_Success_with_AWS.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;f3b071237fdd9d4758aaa19470d92947&quot;</ETag><Size>495953</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Achieve_Cloud_Success_with_AWS.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;f641ce1cc9c6374c1cdde4cf77b0830b&quot;</ETag><Size>107305</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Achieve_Cloud_Success_with_Azure.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;16d17f123f36e626ecd2ecce8bf1e5fd&quot;</ETag><Size>487221</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Achieve_Cloud_Success_with_Azure.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;6dd171040d4cfcf1b6a42eeee2be7527&quot;</ETag><Size>105139</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Achieving_Agility_with_Cloud_UC.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;7764ea24347f99b9c93daab75726cf88&quot;</ETag><Size>724560</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Achieving_Agility_with_Cloud_UC.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;4a2cbb18f21eeb5eeb259b9bd44e182d&quot;</ETag><Size>281355</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Achieving_High_Fidelity_Security_An_EMA_White_Paper.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;04dcb1ce0ef65afd76f260f521847976&quot;</ETag><Size>574060</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Achieving_High_Fidelity_Security_An_EMA_White_Paper.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;0f55201f454a32acacc926137daa0e09&quot;</ETag><Size>158324</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Acquisition_Evolved.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;38b5a79d68f3601953dddd97f7e4c1a1&quot;</ETag><Size>416536</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Acquisition_Evolved.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;675bb1d0962911a6a471e42af0306a77&quot;</ETag><Size>288453</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Addressing_the_Threat_Within_Rethinking_Network_Security_Deployment.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;37d8057029ce0e3eddddc2fa4784425c&quot;</ETag><Size>1120425</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Addressing_the_Threat_Within_Rethinking_Network_Security_Deployment.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;04064961b1142b38ba7a411a8d1cf71f&quot;</ETag><Size>593944</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Addressing_the_Threat_Within_Rethinking_Network_Security_Deployment_WP_.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;37d8057029ce0e3eddddc2fa4784425c&quot;</ETag><Size>1120425</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Addressing_the_Threat_Within_Rethinking_Network_Security_Deployment_WP_.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;04064961b1142b38ba7a411a8d1cf71f&quot;</ETag><Size>593944</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Adobe_Creative_Cloud_Libraries_The_Productivity_Impact_of_Shares_Assets_and_Settings..jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;64da2dfd72f830d49c3bec846e2e23ea&quot;</ETag><Size>958797</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Adobe_Creative_Cloud_Libraries_The_Productivity_Impact_of_Shares_Assets_and_Settings..png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;6ea9b98ab356709de350a9e98c4d4946&quot;</ETag><Size>482166</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Adobe_Experience_Counts.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;ee2de5a539d18723279e6f6747e2e1c4&quot;</ETag><Size>781688</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Adobe_Experience_Counts.png</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;e0228ccc47616947af44f7ebab193ac5&quot;</ETag><Size>271093</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Adobe_Stock_for_Enterprise_Efficiency_Through_Integration.jpg</Key><LastModified>2022-05-12T16:01:37.000Z</LastModified><ETag>&quot;8004cd1cd4262a8cfff5c206b4d540a2&quot;</ETag><Size>977735</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Adobe_Stock_for_Enterprise_Efficiency_Through_Integration.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;4e424157fbd6d3ef67514b1a0e6021e2&quot;</ETag><Size>480291</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Advance_your_Career_with_Hyper-Converged_Infrastructure.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;527f7a7279a0dd3a845ca89abef3ef86&quot;</ETag><Size>586693</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Advance_your_Career_with_Hyper-Converged_Infrastructure.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;655a2cd7e2d8e842a8a83674052420cf&quot;</ETag><Size>335113</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Advanced_Analytics_and_Machine_Learning_A_Prescriptive_and_Proactive_Approach_to_Security.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;c18246bf659ff1f3d51691807c3fb1e2&quot;</ETag><Size>497696</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Advanced_Analytics_and_Machine_Learning_A_Prescriptive_and_Proactive_Approach_to_Security.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;2830cd280d2cea5861457bec9a4d3636&quot;</ETag><Size>111636</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/All_About_SSL_TLS_Learn_how_SSL_TLS_certificates_work_and_the_benefits_of_better_website_security.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;46016e21c9e55eb16011dcdbd4e2a2fc&quot;</ETag><Size>650576</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/All_About_SSL_TLS_Learn_how_SSL_TLS_certificates_work_and_the_benefits_of_better_website_security.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;8204d300f2afddd35890082f22084ca0&quot;</ETag><Size>213851</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Always_on_SSL.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;a2714eb35029e79a886fab7085d2baa7&quot;</ETag><Size>886406</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Always_on_SSL.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;72e9e72033096dd3ea34c4e00ad668f4&quot;</ETag><Size>336850</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Amazon_Web_Services_Risk_and_Compliance.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;6733acb750b83f12a3e893a2067539ce&quot;</ETag><Size>455297</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Amazon_Web_Services_Risk_and_Compliance.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;44877ec95d8a37fe3e66cb01ce0b8bd5&quot;</ETag><Size>83211</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/An_Engaging_Employee_Experience___The_Ultimate_Guide.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;ed855920077f2c24c8e4d7fa8a3cc8c2&quot;</ETag><Size>498666</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/An_Engaging_Employee_Experience___The_Ultimate_Guide.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;ad06c10e5ee8cddf089bd4b067d0af6d&quot;</ETag><Size>316658</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/An_Overview_of_Dell_EMC_Vblock_and_VxBlock.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;0a020a85d0bf542bedf53cc8a08cafb4&quot;</ETag><Size>839349</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/An_Overview_of_Dell_EMC_Vblock_and_VxBlock.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;97614f482538e0c7455329f39c213331&quot;</ETag><Size>355200</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Application_Management_Racing_Ahead_of_the_Competition.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;89ac09c091f0f641fec2b7ac78be5bb2&quot;</ETag><Size>920874</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Application_Management_Racing_Ahead_of_the_Competition.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;435c5b437c43de270ee30477a660f1f3&quot;</ETag><Size>369715</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Architecting_for_HIPAA_Security_and_Compliance_on_Amazon_Web_Services.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;1647374146260abdb7198abb23faa11a&quot;</ETag><Size>477032</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Architecting_for_HIPAA_Security_and_Compliance_on_Amazon_Web_Services.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;a030c7c19f6b0c508eac55b6ec957c76&quot;</ETag><Size>95088</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Are_You_GDPR_Ready.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;475462258195bee0a2032dfabb85094c&quot;</ETag><Size>316631</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Are_You_GDPR_Ready.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;648f312454d5a411739b4e5d710185af&quot;</ETag><Size>799668</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Are_You_Mobile-Minded_Enough_to_Keep_Your_Customers_Happy.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;0e8aa5a21d1148315d4e994187737a37&quot;</ETag><Size>760391</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Are_You_Mobile-Minded_Enough_to_Keep_Your_Customers_Happy.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;ab5a8cb52f0fb33052416156e0dbcf84&quot;</ETag><Size>243789</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Art_of_Integration.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;f855eae7b58243c9491e82f521f0ce28&quot;</ETag><Size>693878</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Art_of_Integration.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;4f641a2cdc83138af377ffe4bf6a97bb&quot;</ETag><Size>658221</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Artificial_Intelligence_for_an_Autonomous_Data_Center.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;b0b5976c5df1116378bacac85b0c187e&quot;</ETag><Size>619691</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Artificial_Intelligence_is_Here_Is_Your_Infrastructure_Ready.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;a5690ff8ddc2ba3497d5ff6081678098&quot;</ETag><Size>502422</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Artificial_Intelligence_is_Here_Is_Your_Infrastructure_Ready.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;6a9bd5399f2612c17ed7cf7155cf5edc&quot;</ETag><Size>265851</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Assessing_the_Business_Value_of_Flash_Storage_A_Practical_Guide_for_IT_Decision_Makers.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;a722bd556b51baa144879279b2998f84&quot;</ETag><Size>478020</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Assessing_the_Business_Value_of_Flash_Storage_A_Practical_Guide_for_IT_Decision_Makers.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;5d6e4bd64a2e03b05c37b8bc49148f45&quot;</ETag><Size>169410</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Automating_Top_20_CIS_Security_Controls.jpg</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;7c95b7536aa2f139443261f4847531d0&quot;</ETag><Size>735151</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Automating_Top_20_CIS_Security_Controls.png</Key><LastModified>2022-05-12T16:01:38.000Z</LastModified><ETag>&quot;bad567dc31938faa974e3422c49592e6&quot;</ETag><Size>512026</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Automation_in_a_Multi-Cloud_World_The_Key_to_Agility.jpg</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;e2a2822edfb9c52a7e41cb29a519b246&quot;</ETag><Size>832016</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Automation_in_a_Multi-Cloud_World_The_Key_to_Agility.png</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;68f7889f070fee98fb8053f292ee687d&quot;</ETag><Size>269529</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Axcient_Fusion_Technical_White_Paper.jpg</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;c4c137248d59791363197af6dc5fde53&quot;</ETag><Size>773129</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Axcient_Fusion_Technical_White_Paper.png</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;b09caa1090906eabf5b2d77ee64e1d2c&quot;</ETag><Size>353959</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Backup_To_The_Future_Spiceworks_Report.jpg</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;21dc53cec6578c6325d660be3b570e1d&quot;</ETag><Size>658043</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Backup_To_The_Future_Spiceworks_Report.png</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;b39ecb2271b08b6221790d28e47bfadc&quot;</ETag><Size>486132</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Backup_to_the_Future_Infographic.jpg</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;157726f802f2d82e074786d6294a3fc9&quot;</ETag><Size>348676</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Backup_to_the_Future_Infographic.png</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;ec34f51d18ef520d5f4d16fff0979571&quot;</ETag><Size>599132</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Best_Practices_for_Mobile_Marketing_How_to_Acquire,_Engage,_and_Retain_Users.jpg</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;1039dd309987bd2be3ec56d55af34d1f&quot;</ETag><Size>473767</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Best_Practices_for_Mobile_Marketing_How_to_Acquire,_Engage,_and_Retain_Users.png</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;70df1f48a8f8d146911aed22db6f5c96&quot;</ETag><Size>290113</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Best_Practices_for_Selecting_a_Vulnerability_Management_VM_Solution.jpg</Key><LastModified>2022-05-12T16:01:39.000Z</LastModified><ETag>&quot;e8394ffe612151fd2fe97c9780e30e25&quot;</ETag><Size>456042</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Best_Practices_for_Selecting_a_Vulnerability_Management_VM_Solution.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;edd2701ea7a02c3f3eb954b3157859d5&quot;</ETag><Size>80320</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Best_Practices_for_Selecting_a_Web_Application_Scanning_WAS_Solution_v3.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;9a4951c99e1b928e2755dd05ab867051&quot;</ETag><Size>687409</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Best_Practices_for_Selecting_a_Web_Application_Scanning_WAS_Solution_v3.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;2e78a8e52a11d06c69b18c0aa21d34e1&quot;</ETag><Size>219129</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Better_Security_in_The_Cloud.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;5d27f557b39ef64a05388c06de6c15fb&quot;</ETag><Size>1027805</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Better_Security_in_The_Cloud.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;78c0dbd8d5de90536a1899d37ad9cc04&quot;</ETag><Size>443754</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Beyond_CRM_Thinking_Customer_Service_in_a_Connected,_Digital_Age.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;534b0c6053c9b264c30d04a93f8b3ee4&quot;</ETag><Size>521155</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Beyond_CRM_Thinking_Customer_Service_in_a_Connected,_Digital_Age.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;571d655ef8aa33966aa36adddb33eacd&quot;</ETag><Size>113764</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Big_Data_Management_Guide_Eight_Essential_Checklists_for_Managing_the_Analytic_Data_Pipeline.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;c3f0277c202fc60893e5e52f2ff7986e&quot;</ETag><Size>498562</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Big_Data_Management_Guide_Eight_Essential_Checklists_for_Managing_the_Analytic_Data_Pipeline.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;f9845c34fe7d3adcbbffd104278d6477&quot;</ETag><Size>113112</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Big_Data_in_the_Cloud_How_to_Overcome_the_Top_Five_Big_Data_Challenges_Its_All_About_the_Cloud.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;4b84efe6be9134575b18b7ca49fff6bf&quot;</ETag><Size>943198</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Big_Data_in_the_Cloud_How_to_Overcome_the_Top_Five_Big_Data_Challenges_Its_All_About_the_Cloud.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;e2b8ed4148fb651df8896fa7c68b255e&quot;</ETag><Size>413856</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Boost_Customer_Trust_with_Validation_How_to_Select_the_Right_SSL_TLS_Certificate_Validation_for_Your_Business.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;c3f10c130a889c4e97f0c297699b0b92&quot;</ETag><Size>661011</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Boost_Customer_Trust_with_Validation_How_to_Select_the_Right_SSL_TLS_Certificate_Validation_for_Your_Business.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;36ed91ea7dc02c912d71bb3de2bb4488&quot;</ETag><Size>222402</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Bot_Manager_Advanced_strategies_to_flexibly_manage_the_long-term_business_and_IT_impact_of_bots.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;3549721c4220991487941a45c5f272d0&quot;</ETag><Size>960737</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Bot_Manager_Advanced_strategies_to_flexibly_manage_the_long-term_business_and_IT_impact_of_bots.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;086d972a914159c3118400e4079fb46b&quot;</ETag><Size>404119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Branch_redefined_Enabling_the_distributed_enterprise_with_SD_WAN_Five_Citrix_customers_tell_their_stories_on_how_they_build_better_branch_operations.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;7090698087fdd3b3477ad51fc473e347&quot;</ETag><Size>561327</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Branch_redefined_Enabling_the_distributed_enterprise_with_SD_WAN_Five_Citrix_customers_tell_their_stories_on_how_they_build_better_branch_operations.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;2176baef566b8816de77f154d159e9b3&quot;</ETag><Size>349439</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Breach_Predictions_eBook.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;9855913cd0bc5f3c17ab615340122383&quot;</ETag><Size>769123</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Breach_Predictions_eBook.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;43f0a802ef7a5d64f7de7e046cf19134&quot;</ETag><Size>489001</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Breaking_the_DAM.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;a59d3dbf24f764d08644e5fa29a4d6e4&quot;</ETag><Size>623512</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Breaking_the_DAM.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;60bb5d37fc60f52992bb5355ec52e0fa&quot;</ETag><Size>601766</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Brilliant_Advertising.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;abd41c459681849c59310db8288874d1&quot;</ETag><Size>638901</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Brilliant_Advertising.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;9f610fa8edb00e7fa64731d23aacadb9&quot;</ETag><Size>555293</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Brother_Printers_Fast_Efficient_Brother_Laser_Inkjet_and_All_in_One_Printers.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;d33c090e1e60318ec2aec388afa382be&quot;</ETag><Size>503122</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Brother_Printers_Fast_Efficient_Brother_Laser_Inkjet_and_All_in_One_Printers.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;57313d6b0e9d1b02dfa857187082b181&quot;</ETag><Size>128222</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Build_Customer_Trust_with_Better_Security_Learn_the_Benefits_of_a_Proactive_Approach_to_Website_Security.jpg</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;e061afb07072ecc8be4001725b3d33b0&quot;</ETag><Size>755118</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Build_Customer_Trust_with_Better_Security_Learn_the_Benefits_of_a_Proactive_Approach_to_Website_Security.png</Key><LastModified>2022-05-12T16:01:40.000Z</LastModified><ETag>&quot;24a425d951e5ba89fddf5dc2ef5c4844&quot;</ETag><Size>269617</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_Big_Data_Storage_Solutions_Data_Lakes_for_Maximum_Flexibility.jpg</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;1ccf9bbe857293f79836f437460e352b&quot;</ETag><Size>456087</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_Big_Data_Storage_Solutions_Data_Lakes_for_Maximum_Flexibility.png</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;55306a95005994582f4b286cc6a71058&quot;</ETag><Size>76809</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_Big_Data_Storage_Solutions_Data_Lakes_for_Maximum_Flexibility_2018.jpg</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;1ccf9bbe857293f79836f437460e352b&quot;</ETag><Size>456087</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_Big_Data_Storage_Solutions_Data_Lakes_for_Maximum_Flexibility_2018.png</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;55306a95005994582f4b286cc6a71058&quot;</ETag><Size>76809</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_Trust_in_a_Cloudy_Sky.jpg</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;88c8debe86227a444572d84625c8fb10&quot;</ETag><Size>798066</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_Trust_in_a_Cloudy_Sky.png</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;38ae7cf467ebdb65477601fbcbaae52e&quot;</ETag><Size>323665</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_a_Software-defined_WAN_with_NetScaler_SD-WAN.jpg</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;cb1542b867a0734363bec964e666165e&quot;</ETag><Size>817409</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_a_Software-defined_WAN_with_NetScaler_SD-WAN.png</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;10c72ef4026a4d9a37cc849fdc1a43c2&quot;</ETag><Size>326940</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_the_Learning_Business_Case_The_ROI_of_a_Next-Generation_Learning_Management_System_(LMS).jpg</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;6694b613a437b23f4bedbdb6bf43e8d2&quot;</ETag><Size>736605</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Building_the_Learning_Business_Case_The_ROI_of_a_Next-Generation_Learning_Management_System_(LMS).png</Key><LastModified>2022-05-12T16:01:41.000Z</LastModified><ETag>&quot;e2b286106de398f0377b559837dd7efa&quot;</ETag><Size>275318</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Built_on_Trust_A_Guide_to_Creating_a_Secure_and_Successful_E-Commerce_Business.jpg</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;44d6cdc704a02e1cbd88c3dc94fd0c0c&quot;</ETag><Size>797189</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Built_on_Trust_A_Guide_to_Creating_a_Secure_and_Successful_E-Commerce_Business.png</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;64114fb78e35bdf8db82487ac1da73b3&quot;</ETag><Size>283096</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Business_Case_of_Marketing_Automation.jpg</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;bd9e269aa8134d44170771a3b185e7a7&quot;</ETag><Size>376854</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Business_Case_of_Marketing_Automation.png</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;926cacbc12d2f3c4efbf7e9365b5b81a&quot;</ETag><Size>216784</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Business_Driven_Risk_Management_Closes_the_Gap_of_Grief.jpg</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;4b517070b76d9021ac6d8c21f11fd9ea&quot;</ETag><Size>1039541</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Business_Driven_Risk_Management_Closes_the_Gap_of_Grief.png</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;3d191bffb6f03fcf633510b670cc8e7b&quot;</ETag><Size>417296</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Business_Transformation_Through_Smarter_Document_Workflows.jpg</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;3fe0a7429710cf54fb41d1b2ed2304d7&quot;</ETag><Size>464099</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Business_Transformation_Through_Smarter_Document_Workflows.png</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;4cf2129156256d701af53c475a5823fb&quot;</ETag><Size>334045</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Busting_the_Myth_of_the_Malware_Silver_Bullet.jpg</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;8c8ee36a6dcd7605eeacf7fa5e3a4ee6&quot;</ETag><Size>232183</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Busting_the_Myth_of_the_Malware_Silver_Bullet.png</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;8db7df049d7c88d585e5b4dc1ae45ed0&quot;</ETag><Size>127382</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Buyers_Guide_Guide_to_Selecting_the_Right_Remote_Support_Tool.jpg</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;e60c9d22f7e5c9bc380b1b210f330799&quot;</ETag><Size>633352</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Buyers_Guide_Guide_to_Selecting_the_Right_Remote_Support_Tool.png</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;9ddc56921837e2250d7163188bb5330c&quot;</ETag><Size>198128</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/CIO_Marketing_Services_Optimizing_Your_Hybrid_Cloud_.jpg</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;2a3f8f1e15e723b8dc92a2e51dd62af4&quot;</ETag><Size>825142</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/CIO_Marketing_Services_Optimizing_Your_Hybrid_Cloud_.png</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;ab76ed0f974d21943190d9adfb8b54ad&quot;</ETag><Size>327252</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/CIOs_Guide_to_Data_Analytics_and_Machine_Learning.jpg</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;2d47c360eb4740c7f64fe646c836fc00&quot;</ETag><Size>431853</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/CIOs_Guide_to_Data_Analytics_and_Machine_Learning.png</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;f2289207b7db6848b7811f5fd134d55a&quot;</ETag><Size>69991</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Calculate_how_Flash_makes_operational_sense.jpg</Key><LastModified>2022-05-12T16:01:42.000Z</LastModified><ETag>&quot;fb2bc68d1f301e56ae95c02b3afec1a5&quot;</ETag><Size>901523</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Calculate_how_Flash_makes_operational_sense.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;e3487ea1f24a2f71c6041e2f3288ff3c&quot;</ETag><Size>430636</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Capitalizing_on_Viewers_Hunger_for_Virtual_and_Augmented_Reality.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;5746d2d5a073279f5094acc62a33cb36&quot;</ETag><Size>782596</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Capitalizing_on_Viewers_Hunger_for_Virtual_and_Augmented_Reality.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;ef6e2bce1a5930ba0b626cc58b674cea&quot;</ETag><Size>311630</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Capitol_One_Case_Study.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Capitol_One_Case_Study.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Case_Study_Phishing_Site_Detected_and_Taken_Down.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;c07d97c3e1843e6c49960a597ae8e26f&quot;</ETag><Size>810416</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Case_Study_Phishing_Site_Detected_and_Taken_Down.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;886d85b452d4030418a6eaabee09afc7&quot;</ETag><Size>330778</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Case_study_Using_Pluralsight_for_ongoing_learning_and_effectively_onboarding_new_hires.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;dcb682db994634dc12fda1639458f5ac&quot;</ETag><Size>716459</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Case_study_Using_Pluralsight_for_ongoing_learning_and_effectively_onboarding_new_hires.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;ddf7d647ceeea2bc1372ef28a82172a6&quot;</ETag><Size>260036</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Checklist_for_Implementing_Governed_Self-Service_Whitepaper_.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;5a59d572b25b4230e17cb23aac5f5e17&quot;</ETag><Size>427424</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Checklist_for_Implementing_Governed_Self-Service_Whitepaper_.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;87c0087b23cf4aaed546d98a2e877c60&quot;</ETag><Size>65246</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Choosing_the_right_e_learning_partner_and_getting_buy_in_throughout_the_organization.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;c785dd87ee9fd6155957ba74dda341eb&quot;</ETag><Size>373806</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Choosing_the_right_e_learning_partner_and_getting_buy_in_throughout_the_organization.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;217011319210f767439c01921453003e&quot;</ETag><Size>234042</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Chrome_Enterprise_Feature_Overview.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;3f9acf5ae0d3e65038486ebaad798f5d&quot;</ETag><Size>906303</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Chrome_Enterprise_Feature_Overview.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;75f46dcffd4bdf0531ac3b5bf5de88d6&quot;</ETag><Size>311176</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Chrome_OS_Management_for_the_Enterprise.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Chrome_OS_Management_for_the_Enterprise.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Chrome_OS_Secure_from_Bootup_to_Shutdown_.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Chrome_OS_Secure_from_Bootup_to_Shutdown_.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cisco_Edge_White_Paper.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;c0ec3d7f4390ea6e4a573869bcd7e124&quot;</ETag><Size>798017</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cisco_Edge_White_Paper.png</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;8c1d33e883745221f8b67786257308d7&quot;</ETag><Size>282712</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cisco_Enterprise_Mobility_Landscape_Survey_2015_-_Enterprise_and_Mid-Market_Results.jpg</Key><LastModified>2022-05-12T16:01:43.000Z</LastModified><ETag>&quot;94ee1c4805485cfd899e4fd1a51b3fa3&quot;</ETag><Size>286413</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cisco_Enterprise_Mobility_Landscape_Survey_2015_-_Enterprise_and_Mid-Market_Results.png</Key><LastModified>2022-05-12T16:01:44.000Z</LastModified><ETag>&quot;e5779482af4a890832f2d9796cc7e215&quot;</ETag><Size>187708</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cisco_Unified_Computing_Services_at_a_Glance.jpg</Key><LastModified>2022-05-12T16:01:44.000Z</LastModified><ETag>&quot;8dc9b07bf5fd5b72c1c4f63018ac976c&quot;</ETag><Size>596404</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cisco_Unified_Computing_Services_at_a_Glance.png</Key><LastModified>2022-05-12T16:01:44.000Z</LastModified><ETag>&quot;a3ddba0af329fab2cb592d2be501e734&quot;</ETag><Size>578455</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Citrix_NetScaler_Unified_Gateway_Product_Overview_brochure.jpg</Key><LastModified>2022-05-12T16:01:44.000Z</LastModified><ETag>&quot;74a43975f60a948f5da82368cf20780d&quot;</ETag><Size>696315</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Citrix_NetScaler_Unified_Gateway_Product_Overview_brochure.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;3b6d1b87bc877063ef96b44ce60c6963&quot;</ETag><Size>249451</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Classrom_vs_Online_Learning.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;e808d0616f50871942ab488d1df1ce7b&quot;</ETag><Size>360286</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Classrom_vs_Online_Learning.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;24e921316d6c58b350d36f2f20ccadbb&quot;</ETag><Size>225781</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Classroom_vs_Online_Learning_How_to_Navigate_Training_Your_Team.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;e808d0616f50871942ab488d1df1ce7b&quot;</ETag><Size>360286</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Classroom_vs_Online_Learning_How_to_Navigate_Training_Your_Team.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;24e921316d6c58b350d36f2f20ccadbb&quot;</ETag><Size>225781</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud-converged_IT_Resilience_from_Axcient_Fusion.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;6408c599281f6c8fee7093caaf6e8409&quot;</ETag><Size>783661</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud-converged_IT_Resilience_from_Axcient_Fusion.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;e0074d50517807e15de693e4a20e792f&quot;</ETag><Size>353244</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_ERP&apos;s_Integral_Role_in_Business_Agility.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;a3156975b405164010970f394e29b92f&quot;</ETag><Size>563428</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_ERP&apos;s_Integral_Role_in_Business_Agility.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;1af3096476a103fbb82d1f63b03158f9&quot;</ETag><Size>193812</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_Management_Why_Adoption_is_Growing.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;1047c282cb772f9d4b3758e6942731c7&quot;</ETag><Size>839895</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_Management_Why_Adoption_is_Growing.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;2bbfa153e298f4b5c2afc5c7fcc1726a&quot;</ETag><Size>378275</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_Spectator_Ranks_Google_Compute_Engine_1_in_Price_Performance.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;88a957a247a69f402ee73e50836c683a&quot;</ETag><Size>719810</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_Spectator_Ranks_Google_Compute_Engine_1_in_Price_Performance.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;ac3a8081beede63537b181399c6eb819&quot;</ETag><Size>255536</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_Workspace_Services_Adoption_Made_Simple.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;4076b31d666a0c02845f7f1d3bfd867f&quot;</ETag><Size>712349</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_Workspace_Services_Adoption_Made_Simple.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;b2e7bd76f2eeecddd0fb9912c68cb2f0&quot;</ETag><Size>272880</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_usage_is_now_over_90%_but_IT_is_struggling_to_keep_up._Are_you.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;8ee4d595a1c98089eaa7c4d84d14e98f&quot;</ETag><Size>202611</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_usage_is_now_over_90%_but_IT_is_struggling_to_keep_up._Are_you.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;68b63026f4a72893a85391505c84a089&quot;</ETag><Size>1003391</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cloud_usage_is_now_over_90_but_IT_is_struggling_to_keep_up.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;edc66739b3c24708e689c4a9c8b3156c&quot;</ETag><Size>183691</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Conducting_the_cross_channel_orchestra.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;c64e2b06705412fcf7fcc746ef414a60&quot;</ETag><Size>533772</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Conducting_the_cross_channel_orchestra.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;0a0d74c6ea010862e6b97a7540b1ddd7&quot;</ETag><Size>539282</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Consolidate__Get_Control_of_your_Service_Desk.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;e4eb5cae9649a16dfa2f994b51909ee1&quot;</ETag><Size>364889</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Consolidate__Get_Control_of_your_Service_Desk.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;93a4b7026217b71fc7c212383fbfc3de&quot;</ETag><Size>384407</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Consolidate_your_Secure_Remote_Access_Delivery_Infrastructure_with_one_URL.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;650bd68ca1552784a0caf07ae334549c&quot;</ETag><Size>763032</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Consolidate_your_Secure_Remote_Access_Delivery_Infrastructure_with_one_URL.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;3e45cd1e721cdf549a0f0553b3469967&quot;</ETag><Size>297422</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Construction_Productivity_101_A_Practical_Guide_to_Increase_Productivity_in_7_Easy_Steps.jpg</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;6ff4ba4db7a4e29bc467325067616a02&quot;</ETag><Size>609173</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Construction_Productivity_101_A_Practical_Guide_to_Increase_Productivity_in_7_Easy_Steps.png</Key><LastModified>2022-05-12T16:01:45.000Z</LastModified><ETag>&quot;f4fd0eb89c206fb2961f38d0011954d4&quot;</ETag><Size>367835</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Create_the_Change_Building_a_Creative_Process_for_the_Modern_World.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;ca85e278f0b56f0676e581e898f1c123&quot;</ETag><Size>550466</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Create_the_Change_Building_a_Creative_Process_for_the_Modern_World.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;a3fae6a7a8e190df55f8ce3f27b7361d&quot;</ETag><Size>408051</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Create_the_Change_Building_a_Creative_Process_for_the_Modern_World_to_Learn.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;ca85e278f0b56f0676e581e898f1c123&quot;</ETag><Size>550466</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Create_the_Change_Building_a_Creative_Process_for_the_Modern_World_to_Learn.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;a3fae6a7a8e190df55f8ce3f27b7361d&quot;</ETag><Size>408051</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Credential_Stuffing_101_The_Risk_of_Bots_to_Your_Business.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;9811bf2c0559fdd2d5b7c512157a7c13&quot;</ETag><Size>236772</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Credential_Stuffing_101_The_Risk_of_Bots_to_Your_Business.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;8798ca9f4aeeb358ecdbf3140de25d7d&quot;</ETag><Size>389632</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Crossing_the_Legacy_ITSM_Chasm.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;249f6c274d272f357333bb7aad17011c&quot;</ETag><Size>550665</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Crossing_the_Legacy_ITSM_Chasm.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;1e1eb0d2250ebfe733844378c7768ad7&quot;</ETag><Size>141460</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Customer_Case_Study_Rabobank_Uniting_the_workforce_for_unified_risk_management_with_RSA_Archer.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;7e4e93863703daa073df7a7333cf07a8&quot;</ETag><Size>708714</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Customer_Case_Study_Rabobank_Uniting_the_workforce_for_unified_risk_management_with_RSA_Archer.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;885373c278019e6dcfcac805ebb72ba9&quot;</ETag><Size>243170</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Customer_Marketing_How_to_Keep_Your_Customers_Coming_Back_For_More.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;614608788d739b583026ed1e730bc3d2&quot;</ETag><Size>424725</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Customer_Marketing_How_to_Keep_Your_Customers_Coming_Back_For_More.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;3be527bb87a514940462377c2dad55f5&quot;</ETag><Size>264055</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cyber_Risk_Appetite_Defining_and_Understanding_Risk_in_the_Modern_Enterprise.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;f9e314e28795c8eb57c4f262c0084d88&quot;</ETag><Size>1005499</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cyber_Risk_Appetite_Defining_and_Understanding_Risk_in_the_Modern_Enterprise.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;4e0e4c93cf1202d09c0d7c3e8103b372&quot;</ETag><Size>503176</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cybercrime_Survival_Guide.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;0272b4ee92031876bc2fb7cb8664c613&quot;</ETag><Size>1080474</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cybercrime_Survival_Guide.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;76b507eded099038afe08fc613082177&quot;</ETag><Size>464009</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cybersecurity_For_Defenders_Its_about_Time.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;92328a17da2f22452be75722aacc328b&quot;</ETag><Size>814138</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cybersecurity_For_Defenders_Its_about_Time.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;5742b95f2cb87aa0b52a573a6aef4d1c&quot;</ETag><Size>333988</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cybersecurity_as_a_Growth_Advantage.jpg</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;c5fdc50e1ed887e59dc3f975c5751739&quot;</ETag><Size>784810</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Cybersecurity_as_a_Growth_Advantage.png</Key><LastModified>2022-05-12T16:01:46.000Z</LastModified><ETag>&quot;a54fd6d312e0437065b41a09af45f11e&quot;</ETag><Size>295885</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/DG2ABM.jpg</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;6801ea73e039ddb9af9bd94ea9500c5e&quot;</ETag><Size>593838</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/DG2ABM.png</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;463e324395e7aaa73f1a7f5fcc81e814&quot;</ETag><Size>422035</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Data_Protection_Solutions_Customer_Success.jpg</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;223cb78dfcc6436cf7c36db4040b30c4&quot;</ETag><Size>418368</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Data_Protection_Solutions_Customer_Success.png</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;f0229bc189d4c904aa83ed6aa5945ce8&quot;</ETag><Size>236453</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Data_Security_Platform.jpg</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;44b946120accf73ac1f6cd990e5fec2b&quot;</ETag><Size>818071</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Data_Security_Platform.png</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;273b17e870203c4546a34828c3347133&quot;</ETag><Size>281034</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Define_Your_Services_for_Fast_and_Accurate_Service_Delivery.jpg</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;05451b06e082239d965df7bd477f088f&quot;</ETag><Size>401677</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Define_Your_Services_for_Fast_and_Accurate_Service_Delivery.png</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;fa04b82d22d4136ab5a3ece2e342d2df&quot;</ETag><Size>442441</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Definitive_Guide_to_Digital_Advertising.jpg</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;dcf1f87bc94291906f632757eb4f038c&quot;</ETag><Size>613364</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Definitive_Guide_to_Digital_Advertising.png</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;f8050ad47882f6ddd6dffcfcaa2d4c9d&quot;</ETag><Size>427906</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Definitive_Guide_to_Mobile.jpg</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;3cad7f0c16880246e54cc636d00d1fad&quot;</ETag><Size>435787</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Definitive_Guide_to_Mobile.png</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;b93843a6f65900a33ed3d13eb8520326&quot;</ETag><Size>259041</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Definitive_Guide_to_Social_Media_Marketing.jpg</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;f47b30022050ebb8ee597938c408e3ec&quot;</ETag><Size>522239</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Definitive_Guide_to_Social_Media_Marketing.png</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;feef1d0ecf1b9e4fd1988247a9640682&quot;</ETag><Size>333493</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dell_EMC_HPC_Innovation_Lab.jpg</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;8027408a89d753fc616923c2d19ca61f&quot;</ETag><Size>700938</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dell_EMC_HPC_Innovation_Lab.png</Key><LastModified>2022-05-12T16:01:47.000Z</LastModified><ETag>&quot;b5e440afeaca2c0d7559c3a3d6be8bb7&quot;</ETag><Size>257072</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dell_EMC_Machine_Learning_Solution_Overview.jpg</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;29ccfea78133d2f19e9c41e47b23eea8&quot;</ETag><Size>1067090</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dell_EMC_Machine_Learning_Solution_Overview.png</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;119d5fb5f8eccd104d5ba0bddd206126&quot;</ETag><Size>501069</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dell_EMC_Performance_Computing_Portfolio.jpg</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;53d741caa8576a32715b5f28e8ce1400&quot;</ETag><Size>616643</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dell_EMC_Performance_Computing_Portfolio.png</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;b781d5c0253bb1b45800f3e0cf9c91c5&quot;</ETag><Size>199415</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dell_HPC_Solution_for_Digital_Manufacturing.jpg</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;f0f61f792b54ba38d6acb2b7d2bfa218&quot;</ETag><Size>480493</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dell_HPC_Solution_for_Digital_Manufacturing.png</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;27efa1e8e5b2b0c98a8acee76696ff1b&quot;</ETag><Size>102709</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Deploying_a_Data_Lake_in_AWS.jpg</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;48f3d9313c698b587c36783fb3147907&quot;</ETag><Size>206186</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Deploying_a_Data_Lake_in_AWS.png</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;49d9ec75907c5dc2b698894346cbb024&quot;</ETag><Size>94700</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/DevOps-Ready_IT_Accelerate_Software_Delivery_for_Success_in_the_Digital_Economy.jpg</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;164d54db71b33aaa4e0eba7a363b6ffa&quot;</ETag><Size>359207</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/DevOps-Ready_IT_Accelerate_Software_Delivery_for_Success_in_the_Digital_Economy.png</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;e7fef0fda412392bd53e5ca30c55206f&quot;</ETag><Size>77814</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Businesses_Need_to_Rethink_Their_Network_Strategies_ZK_Research_White_Paper.jpg</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;d70269aa0d6343e8c276d2e70ce87810&quot;</ETag><Size>533103</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Businesses_Need_to_Rethink_Their_Network_Strategies_ZK_Research_White_Paper.png</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;49890c86b4d048181ed6ce804b0292a0&quot;</ETag><Size>140549</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Experience_Changes_Everything.jpg</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;baf69a17f9294cb0ac7e64a7aeb0948d&quot;</ETag><Size>331531</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Experience_Changes_Everything.png</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;7f067045f701b7f84a8f1f5c21225695&quot;</ETag><Size>99282</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Identity_Credentials_Deliver_an_Omnichannel_Customer_Experience.jpg</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;4f83d42866c36412e33b648ef95acd89&quot;</ETag><Size>887114</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Identity_Credentials_Deliver_an_Omnichannel_Customer_Experience.png</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;2c534dd62f52cd9b8f59ef38daa23a2a&quot;</ETag><Size>420085</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Marketing_in_the_High-Tech_Industry.jpg</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;3b8382e40627c735b5aaba3673df8ee1&quot;</ETag><Size>496493</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Marketing_in_the_High-Tech_Industry.png</Key><LastModified>2022-05-12T16:01:48.000Z</LastModified><ETag>&quot;64a10f63014f176ae3de602b1edc9cec&quot;</ETag><Size>92516</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Transformation_At_the_Intersection_of_Strategy_and_Technology.jpg</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;b34c36f73c203de7b7de772743c4767e&quot;</ETag><Size>678678</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Transformation_At_the_Intersection_of_Strategy_and_Technology.png</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;ef6d851e6291f0a0fdf7964816f7a0d5&quot;</ETag><Size>219043</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Transformation_At_the_Intersection_of_Strategy_and_Technology_.jpg</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;b34c36f73c203de7b7de772743c4767e&quot;</ETag><Size>678678</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Transformation_At_the_Intersection_of_Strategy_and_Technology_.png</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;ef6d851e6291f0a0fdf7964816f7a0d5&quot;</ETag><Size>219043</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Transformation_in_the_Public_Sector.jpg</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;7227a7bd345ddf72f5300e241c51c7a0&quot;</ETag><Size>450360</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Transformation_in_the_Public_Sector.png</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;3a4c41c133027b4e24478461ead7b4ef&quot;</ETag><Size>416595</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Workspace_Basics_for_Dummies.jpg</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;cb11680487bd2f6cd62ad7d1a36973e8&quot;</ETag><Size>652852</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_Workspace_Basics_for_Dummies.png</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;e7021e8589b310fffdf9de17c3ac9f80&quot;</ETag><Size>278544</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_transformation_is_key_to_IT_innovation.jpg</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;41f1f6bb76700b54d622fa3b320bd0ef&quot;</ETag><Size>543368</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Digital_transformation_is_key_to_IT_innovation.png</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;c16d15b6962541ae8e8dd7082b7f4ccd&quot;</ETag><Size>121466</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Disaster_Recovery_Maturity_Framework.jpg</Key><LastModified>2022-05-12T16:01:49.000Z</LastModified><ETag>&quot;316fa33efb1adaea6c0160f53ec20096&quot;</ETag><Size>118667</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Disaster_Recovery_Maturity_Framework.png</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;370718bff907901cefe23378e6cb64b7&quot;</ETag><Size>101800</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Disrupt_the_market_not_your_IT_team_7_Steps_to_getting_your_API_architecture_right_the_first_time.jpg</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;405540b3c6667be646e24925554af155&quot;</ETag><Size>1067514</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Disrupt_the_market_not_your_IT_team_7_Steps_to_getting_your_API_architecture_right_the_first_time.png</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;441e944e73634c8d0992aeedd6220ec7&quot;</ETag><Size>492474</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Divestitures_Growth_Redirected_-_Can_Cloud_ERP_Help.jpg</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;85cc5c8d412c555dab55dc4a4d40c5b3&quot;</ETag><Size>341715</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Divestitures_Growth_Redirected_-_Can_Cloud_ERP_Help.png</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;087bc632fe032d4c9638c511e62976bc&quot;</ETag><Size>51959</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Does_My_Enterprise_Need_Web_Application_Security.jpg</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;980e78941a32eaceccf4085da9a3fb1a&quot;</ETag><Size>158902</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Does_My_Enterprise_Need_Web_Application_Security.png</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;f6fd7a06455e753cdc16b9878bf6320c&quot;</ETag><Size>824520</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dont_Get_Left_Behind_The_Rise_of_Digital_Marketing_in_Financial_Services.jpg</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;fede34d165e89eb64b0e674710a20647&quot;</ETag><Size>202714</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dont_Get_Left_Behind_The_Rise_of_Digital_Marketing_in_Financial_Services.png</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;48e0028d8de016e5fecf520eff108b0d&quot;</ETag><Size>160558</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dramatically_Improve_Service_Availability_(eBook).jpg</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;b9ecfe820d51e58d8c8a655c8a5ebd9e&quot;</ETag><Size>450957</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Dramatically_Improve_Service_Availability_(eBook).png</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;fb944dc64080d449f50b98bc0abe73ad&quot;</ETag><Size>264544</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Hyper-converged_Infrastructure_Shrinks_Complexity_and_Cost_for_VDI.jpg</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;c35b846992e866f448901f4c01a49cb5&quot;</ETag><Size>554698</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Hyper-converged_Infrastructure_Shrinks_Complexity_and_Cost_for_VDI.png</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;c3e2fcff4e4a9bee5cd2149f670da9b3&quot;</ETag><Size>171163</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Report_Status_Quo_Creates_Security_Risk.jpg</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;fe52b5b12e8793ca362cb16e6e92a5b0&quot;</ETag><Size>483659</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Report_Status_Quo_Creates_Security_Risk.png</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;662175020c7aa742cf108a748aa19a34&quot;</ETag><Size>137335</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Research_Insights_Paper_Network_Security_Trends.jpg</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;c977be1dd059c820796258ae92ef56ef&quot;</ETag><Size>545397</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Research_Insights_Paper_Network_Security_Trends.png</Key><LastModified>2022-05-12T16:01:50.000Z</LastModified><ETag>&quot;d66891a567838449702071beb5db927a&quot;</ETag><Size>154145</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Research_Report.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;5aef4b0988f79b08c3c750e5846ec8c7&quot;</ETag><Size>545477</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Research_Report.png</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;61969dc8f3a984e0a4736da28274445b&quot;</ETag><Size>154046</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Research_Report_Network_Security_Trends.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;5aef4b0988f79b08c3c750e5846ec8c7&quot;</ETag><Size>545477</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Research_Report_Network_Security_Trends.png</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;61969dc8f3a984e0a4736da28274445b&quot;</ETag><Size>154046</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Top_5_Reasons_Businesses_Should_Embrace_Chrome_OS.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;514dae000fbeecbfd026223203fb5c67&quot;</ETag><Size>891860</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Top_5_Reasons_Businesses_Should_Embrace_Chrome_OS.png</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;8ae3aa49ae7387a3225a190013da1865&quot;</ETag><Size>425200</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Validation_Report_Workspace_ONE_Integrated_Workspace_Provides_Simplicity_Security_and_a_Seamless_User_Experience.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;a2ba7b45c2e9e1f0b63b2ac06aa72848&quot;</ETag><Size>537358</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ESG_Validation_Report_Workspace_ONE_Integrated_Workspace_Provides_Simplicity_Security_and_a_Seamless_User_Experience.png</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;232cd532f8e1e09cc66cdef9b7131667&quot;</ETag><Size>152145</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ebook_ A_buying_guide_for_next-gen_remote_access.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;58a2b2643803c2f48845a65317d6251b&quot;</ETag><Size>434921</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ebook_ A_buying_guide_for_next-gen_remote_access.png</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;cd739eeb323f27f2ac081539550e16c6&quot;</ETag><Size>211552</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Econsultancy_2017_Digital_Trends_in_Healthcare_and_Pharma_US.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;7ea622a1c0eccef44676c49049d32874&quot;</ETag><Size>598843</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Econsultancy_2017_Digital_Trends_in_Healthcare_and_Pharma_US.png</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;f1be38ee23e9902f34b71165927c5bbe&quot;</ETag><Size>144096</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Econsultancy_2017_Digital_Trends_in_IT.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;41f1f6bb76700b54d622fa3b320bd0ef&quot;</ETag><Size>543368</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Econsultancy_2017_Digital_Trends_in_IT.png</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;c16d15b6962541ae8e8dd7082b7f4ccd&quot;</ETag><Size>121466</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Econsultancy_Adobe_2017_Retail_Digital_Trends_US.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;ce7dfa4206f6b2784eee9c41df11e2be&quot;</ETag><Size>577971</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Econsultancy_Adobe_2017_Retail_Digital_Trends_US.png</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;d83ed7208652bf54723c7dc75cdca9f6&quot;</ETag><Size>127382</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Econsultancy_Trends_Tech_and_the_Impact_of_Data_in_Media_and_Entertainment.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;725b2811aea3a9bf4319b06f7ebe77cc&quot;</ETag><Size>617371</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Econsultancy_Trends_Tech_and_the_Impact_of_Data_in_Media_and_Entertainment.png</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;25b4a393310718819875e5ab81550093&quot;</ETag><Size>150524</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Effectively_Manage_Application_Security_Risk_in_the_Cloud.jpg</Key><LastModified>2022-05-12T16:01:51.000Z</LastModified><ETag>&quot;64d9370c568d256b49d96cd07e63569c&quot;</ETag><Size>306678</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Effectively_Manage_Application_Security_Risk_in_the_Cloud.png</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;b97a92b8ebb9d427e58ccddc8f94dc74&quot;</ETag><Size>295272</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Eight_Tips_for_Winning_the_IT_Asset_Management_Challenge.jpg</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;78b62e2944e5300ca7211abf51c94301&quot;</ETag><Size>275438</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Eight_Tips_for_Winning_the_IT_Asset_Management_Challenge.png</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;512bcb869870594de073c036ae20b427&quot;</ETag><Size>182306</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Electronic_Signatures__Removing_the_last_bottleneck_to_productive_digital_transactions.jpg</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;2ee776efd40ca4f5063aa28e4aee8052&quot;</ETag><Size>592596</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Electronic_Signatures__Removing_the_last_bottleneck_to_productive_digital_transactions.png</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;32f9b09b8f63a28fd9bcff1e045239a9&quot;</ETag><Size>175004</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Eliminate_Service_Outages.jpg</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;9b4588274add3e2d2b097dec10975465&quot;</ETag><Size>459150</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Eliminate_Service_Outages.png</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;f8f7826295ea268cee964db7627b0adf&quot;</ETag><Size>83916</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Email_comes_of_age.jpg</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;e3222d01cd20f7277071f10c11ae7e62&quot;</ETag><Size>607983</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Email_comes_of_age.png</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;7cc42bc0fcac25a21f526cbb31b88cda&quot;</ETag><Size>480383</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Embedded_Analytics_Vendor_Selection_Guide_ A_holistic_evaluation_criteria_for_your_OEM_analytics_project.jpg</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;617e7bd0698226e1ef050bd8b3263a7e&quot;</ETag><Size>478870</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Embedded_Analytics_Vendor_Selection_Guide_ A_holistic_evaluation_criteria_for_your_OEM_analytics_project.png</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;8a7091b49bea14f2197090dda5bde580&quot;</ETag><Size>93124</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Embracing_Digital_Healthcare_to_Revolutionize_Personal_Care.jpg</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;5c8fea0c7a46fdc9bed29dbfa30c47d3&quot;</ETag><Size>428994</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Embracing_Digital_Healthcare_to_Revolutionize_Personal_Care.png</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;f2c8a537bf85f6010acc1fb75c2c59ae&quot;</ETag><Size>146364</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Employee_Engagement_Its_actually_all_about_your_leaders.jpg</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;a977d2fd4ca9ceaaae9693e53ee74955&quot;</ETag><Size>345054</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Employee_Engagement_Its_actually_all_about_your_leaders.png</Key><LastModified>2022-05-12T16:01:52.000Z</LastModified><ETag>&quot;16a6fd81000426a53c6e855562d4037e&quot;</ETag><Size>145514</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Employing_machine_learning_in_a_security_environment_A_data_science_driven_approach.jpg</Key><LastModified>2022-05-12T16:01:53.000Z</LastModified><ETag>&quot;bf46030918eca25e1aa143fd8528d0e0&quot;</ETag><Size>1099851</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Enabling_Business_Transformation_with_Cloud_Computing.jpg</Key><LastModified>2022-05-12T16:01:53.000Z</LastModified><ETag>&quot;82eb4d4184fff34991eda4f129c407b2&quot;</ETag><Size>451851</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Enabling_Business_Transformation_with_Cloud_Computing.png</Key><LastModified>2022-05-12T16:01:53.000Z</LastModified><ETag>&quot;ed29255d19024921ee07d419a855fdf8&quot;</ETag><Size>74966</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Enabling_the_Modern_Business_through_IT.jpg</Key><LastModified>2022-05-12T16:01:53.000Z</LastModified><ETag>&quot;e1e76bdb9b770b0d9bf2216ef25e58cd&quot;</ETag><Size>1074172</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Enabling_the_Modern_Business_through_IT.png</Key><LastModified>2022-05-12T16:01:53.000Z</LastModified><ETag>&quot;62c29a32c680b01b338069c06d35c337&quot;</ETag><Size>444573</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Encrypting_Data_at_Rest.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;6788a48c5e1846a960adda2a36dfe274&quot;</ETag><Size>427223</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Encrypting_Data_at_Rest.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;0c7380a95ae9e6c217bd4f01a79939af&quot;</ETag><Size>66817</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/End-To-End_Visibility_The_Foundation_of_Business-Driven_Security.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;3605e805209ee427347f79654413559b&quot;</ETag><Size>846653</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/End-To-End_Visibility_The_Foundation_of_Business-Driven_Security.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;9b3e7ce08b34f168b2afa7e1947008be&quot;</ETag><Size>374123</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ensuring_SSL_Compliance_in_APAC.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;e725becc91737b90dbab622d4cc3b795&quot;</ETag><Size>495990</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ensuring_SSL_Compliance_in_APAC.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;083e8069dbe09a694331f14506f970a3&quot;</ETag><Size>113437</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Enterprise_Apps_and_Mobile_Strategy.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;1cec124522c874f95ed748c3cd34dfe1&quot;</ETag><Size>814217</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Enterprise_Apps_and_Mobile_Strategy.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;157e8bf76d3c5e0831932cf9e7499852&quot;</ETag><Size>886786</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Enterprise_modular_data_center_Increasing_flexibility_while_reducing_costs_.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;4e51c77b981db5594eb68328e3d201cb&quot;</ETag><Size>655938</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Enterprise_modular_data_center_Increasing_flexibility_while_reducing_costs_.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;8ffd734b54a08560b44a65c513f8becc&quot;</ETag><Size>219638</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Essential_Guide_Understanding_the_Differences_Between_Network_Virtualization_and_SDN.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;1e9e80da6d9d51c3aac6ffdea4c7fb7e&quot;</ETag><Size>204801</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Essential_Guide_Understanding_the_Differences_Between_Network_Virtualization_and_SDN.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;410768f60d8652318bc71dc885da5c2a&quot;</ETag><Size>160093</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Evaluation_of_the_Vormetric_Token_Server.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;a33fa097036009f57fb74619a14ad9c4&quot;</ETag><Size>493505</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Evaluation_of_the_Vormetric_Token_Server.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;8b5fb113286590f46642682e22020f07&quot;</ETag><Size>118482</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Executive_ViewPoint___Remote_IT_Support_Services_The_Panacea_for_ITs_Support_Desk_Headaches.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;b1d8525f41048ad45e2e8eaeff920241&quot;</ETag><Size>971151</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Executive_ViewPoint___Remote_IT_Support_Services_The_Panacea_for_ITs_Support_Desk_Headaches.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;2493b7a5410a17563b61d2f6bf175a24&quot;</ETag><Size>437167</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Exposing_the_Real_Cost_of_Data_Discovery.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;0dcb2e848c2ce4136670ea48ecbd2539&quot;</ETag><Size>330447</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Exposing_the_Real_Cost_of_Data_Discovery.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;a7fd0c5190d1fae1c98191836c127951&quot;</ETag><Size>177272</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Extending_Security_Technology_to_the_Cloud_Threat_Detection_and_Response___White_Paper.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;6c63f41ee554c578cf02adaa11ca63d6&quot;</ETag><Size>1000321</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Extending_Security_Technology_to_the_Cloud_Threat_Detection_and_Response___White_Paper.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;721367e5204f6ed2daa5cdde77ee921b&quot;</ETag><Size>390059</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/FBI_Cyber_Division_and_Digital_Shadows_Emerging_Ransomware_Threats.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/FBI_Cyber_Division_and_Digital_Shadows_Emerging_Ransomware_Threats.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Fighting_the_Gap_of_Grief_with_Business-Driven_Security.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;03f636d44d9b67611a745c247424c375&quot;</ETag><Size>926490</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Fighting_the_Gap_of_Grief_with_Business-Driven_Security.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;1ef32d4402103c82027518dae2d855f4&quot;</ETag><Size>426373</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Finding_Eureka.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;d76fb8025171a1b0b6af4b050bd2c6f1&quot;</ETag><Size>509131</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Finding_Eureka.png</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;8b61ea9caacf1c532014b3516e72156b&quot;</ETag><Size>456744</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Finding_the_Best_SD_WAN_Product_for_Your_Enterprise_Criteria_for_Evaluating_Software_Defined_WAN_Products.jpg</Key><LastModified>2022-05-12T16:01:54.000Z</LastModified><ETag>&quot;ecb983df20488645adcac56d1b4b5521&quot;</ETag><Size>468941</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Finding_the_Best_SD_WAN_Product_for_Your_Enterprise_Criteria_for_Evaluating_Software_Defined_WAN_Products.png</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;31c4341847b535e8dfe57edb282b2e73&quot;</ETag><Size>87646</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Finding_the_Perfect_Image.jpg</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;f688028c5bbc574aabf2623b31bda419&quot;</ETag><Size>570302</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Finding_the_Perfect_Image.png</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;1021e00aabafca778448a0837ca7d0e3&quot;</ETag><Size>554828</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Fitbit___Protecting_Brands_from_Digital_Risks_and_the_Dark_Web.jpg</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Fitbit___Protecting_Brands_from_Digital_Risks_and_the_Dark_Web.png</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Five_Common_Hadoopable_Problems.jpg</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;21514010fa3a26e85e654e50ae5a49ca&quot;</ETag><Size>520371</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Five_Common_Hadoopable_Problems.png</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;7c8fac8bdccf91c5a073d88bd2f179b4&quot;</ETag><Size>120966</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Five_Key_Initiatives_to_Wow_Your_workforce_with_your_Service_Desk.jpg</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;03fbbe76c1cb64b9aea743c67ab9557f&quot;</ETag><Size>726157</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Five_Key_Initiatives_to_Wow_Your_workforce_with_your_Service_Desk.png</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;6f626b170b5f30612396ca2cbef20254&quot;</ETag><Size>282741</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Five_Keys_to_Big_Data_Audit_and_Protection.jpg</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;a6cdd734d56e27321548e8040d4e00af&quot;</ETag><Size>671321</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Five_Keys_to_Big_Data_Audit_and_Protection.png</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;3291d0a5e2c0fddaa1bf31794450b31f&quot;</ETag><Size>209011</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Five_keys_to_successful_organizational_design.jpg</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;8b4a61ea913d091747abc45e74fa717a&quot;</ETag><Size>427027</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Five_keys_to_successful_organizational_design.png</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;8a48d92f98a5500218866a275ba655b8&quot;</ETag><Size>281127</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forbes_Insights_8_Advantages_of_Video_Conferencing-NEW_MORGAN_PAGE.jpg</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;bf52ca087cbabf7302980696235c344f&quot;</ETag><Size>673165</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forbes_Insights_8_Advantages_of_Video_Conferencing-NEW_MORGAN_PAGE.png</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;868dc4640bfd6a3f4aa0d6762c3abc63&quot;</ETag><Size>271830</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forbes_Insights_Machine_Learning_in_Action.jpg</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;62bb25d98ff584823060b98392808aff&quot;</ETag><Size>985933</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forbes_Insights_Machine_Learning_in_Action.png</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;2367911114dc545ff7f2027f07b05a69&quot;</ETag><Size>503052</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forbes_Insights_Planning_Paradise_across_the_IT_Landscape.jpg</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;bf110c056575d8eb7620c6e20ed8e7ac&quot;</ETag><Size>1225563</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forbes_Insights_Planning_Paradise_across_the_IT_Landscape.png</Key><LastModified>2022-05-12T16:01:55.000Z</LastModified><ETag>&quot;12ce99a98d2c0e6a8e86be1c47192987&quot;</ETag><Size>660244</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ford_Bacon_&amp;_Davis_Chooses_Axcient_to_Protect_Their_Business.jpg</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;53397ec1ab9e35aa0002232fa90e5e0d&quot;</ETag><Size>508949</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ford_Bacon_&amp;_Davis_Chooses_Axcient_to_Protect_Their_Business.png</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;cffd79a0f8c1cd5622151ff58e9d77eb&quot;</ETag><Size>363406</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Consulting_The_Value_of_Dell_EMC_for_Modernization.jpg</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;66e132665750b833d63e35a4ed2cccf1&quot;</ETag><Size>475241</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Consulting_The_Value_of_Dell_EMC_for_Modernization.png</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;7fbe7da48990d292a6c0540762883a2b&quot;</ETag><Size>103100</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Digital_Experience_Changes_Everything.jpg</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;baf69a17f9294cb0ac7e64a7aeb0948d&quot;</ETag><Size>331531</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Digital_Experience_Changes_Everything.png</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;7f067045f701b7f84a8f1f5c21225695&quot;</ETag><Size>99282</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Diversity_of_Deployment.jpg</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;a9d7696236f1be039f4219dfd586a3b0&quot;</ETag><Size>507510</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Diversity_of_Deployment.png</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;ceca806d884e819f03a54d90d0531efa&quot;</ETag><Size>121398</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_How_To_Become_A_Superstar_Security_Leader.jpg</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;fc641753b2dfc7b387d9122bde45190a&quot;</ETag><Size>650191</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_How_To_Become_A_Superstar_Security_Leader.png</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;45654aafc9eab1e72af6135b8a163ca9&quot;</ETag><Size>226347</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_SD-WAN_TAP_Paper_The_Future_of_the_WAN_is_Software-Defined.jpg</Key><LastModified>2022-05-12T16:01:56.000Z</LastModified><ETag>&quot;75d6f9d056dd9d045e2f9ad7e0a8e0e7&quot;</ETag><Size>359157</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_SD-WAN_TAP_Paper_The_Future_of_the_WAN_is_Software-Defined.png</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;75ada29c31d9664f750dce231f439561&quot;</ETag><Size>121367</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_TEI_Report.jpg</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;0724e792c12963505cc12ff94a77c4bd&quot;</ETag><Size>481516</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_TEI_Report.png</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;db316a37964cced81e39ba18ee4efcdc&quot;</ETag><Size>107840</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_TEI_Study_for_Customer_Service_Management.jpg</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;5a2d4616196f6b8bb334022840b46883&quot;</ETag><Size>544602</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_TEI_Study_for_Customer_Service_Management.png</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;080f726e5c687a53a14126f13c465133&quot;</ETag><Size>177021</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_The_Total_Economic_Impact_of_the_Genesys_Omnichannel_Engagement_Center_Solution.jpg</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;f5d0c4485de9b6909e4ec86cdd6097f0&quot;</ETag><Size>519136</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_The_Total_Economic_Impact_of_the_Genesys_Omnichannel_Engagement_Center_Solution.png</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;c5f5b40f559246b98f117a4702f78363&quot;</ETag><Size>128326</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Wave_Private_Cloud_Software_Suites.jpg</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;e666d07dca931bbfa49d5539aa6e2a0f&quot;</ETag><Size>721804</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Wave_Private_Cloud_Software_Suites.png</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;73f335b16b398fa33da83d65b130b688&quot;</ETag><Size>279772</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Wave_Security_Analytics.jpg</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;992a781c03213182dfb62af72b852869&quot;</ETag><Size>676625</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Wave_Security_Analytics.png</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;7b95bdb3285755bd42f5c60f36717552&quot;</ETag><Size>243440</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Wave_for_Lead-to-Revenue_Management.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;c5cf6f95e9ac93e744fe0ccae5a113c8&quot;</ETag><Size>722220</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_Wave_for_Lead-to-Revenue_Management.png</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;a4410bc283f4fd34270d409147a4344c&quot;</ETag><Size>274818</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_report_The_Future_Of_Data_Security_And_Privacy_Growth_And_Competitive_Differentiation_.jpg</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;50c07a4a22d836316d24f43f861d66f5&quot;</ETag><Size>749434</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Forrester_report_The_Future_Of_Data_Security_And_Privacy_Growth_And_Competitive_Differentiation_.png</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;0ec6a3d191ca3fc1a5e9e6d57975f183&quot;</ETag><Size>296495</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Four_Case_Studies___Mobilize_Protect_Scale_How_VMware_is_Transforming_Healthcare_IT.jpg</Key><LastModified>2022-05-12T16:01:57.000Z</LastModified><ETag>&quot;d8e18b21fdc389a4a521bc31d02880de&quot;</ETag><Size>404970</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Four_Case_Studies___Mobilize_Protect_Scale_How_VMware_is_Transforming_Healthcare_IT.png</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;bbcbeac3d3cb6bc61f10afc415cf8688&quot;</ETag><Size>226029</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Four_Essential_Elements_for_Digital_Maturity.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;8ad0c76f55f0e933f7eb692833cbe737&quot;</ETag><Size>634253</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Four_Essential_Elements_for_Digital_Maturity.png</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;bb0dc7ecd5f1f662b45d2b37b6a5e3a1&quot;</ETag><Size>574827</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Four_Fundamentals_to_Maximize_Site_Performance.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;269156fddaef1c687c32ffb44d8586aa&quot;</ETag><Size>361121</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Four_Ways_to_Customize_Learning_to_the_Needs_of_Todays_Workforce.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;a00ec6aa8e571d3573cec357d6515a47&quot;</ETag><Size>843697</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Four_Ways_to_Customize_Learning_to_the_Needs_of_Todays_Workforce.png</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;09794a8149181b2e77222099aed87dea&quot;</ETag><Size>338130</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/From_Cliché_to_Mission_Critical_.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;afa84f2fa199d9d4e221023a11612b68&quot;</ETag><Size>661447</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/From_Cliché_to_Mission_Critical_.png</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;3fb861d22f7ffbfb5e8d7cc161da93ed&quot;</ETag><Size>744006</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/From_Endpoint_to_Network_to_Cloud_Optimized_Data_Lifecycle_Security_in_an_era_of_Pervasive_Threats.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;b7df4c8489e39c48d932b2b35fe536f9&quot;</ETag><Size>172961</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/From_Endpoint_to_Network_to_Cloud_Optimized_Data_Lifecycle_Security_in_an_era_of_Pervasive_Threats.png</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;6b978b8144cb21ed7ac85c2db55383f0&quot;</ETag><Size>92910</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/From_Managing_Desktops_to_Managing_a_Workspace.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;5bb35c9ebb5e97128d5d429a17e57bed&quot;</ETag><Size>469982</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/From_Managing_Desktops_to_Managing_a_Workspace.png</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;e79fc64b0a62d253695c23f7eb61a203&quot;</ETag><Size>88308</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Frost_&amp;_Sullivan_A_Case_for_Building_Better_Customer_Engagement.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;d1fa8223a9da90af56167fbbafca93b5&quot;</ETag><Size>443407</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Frost_&amp;_Sullivan_A_Case_for_Building_Better_Customer_Engagement.png</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;8b8b78d8289233f6284081b7ee72ad19&quot;</ETag><Size>157625</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Frost_&amp;_Sullivan_Best_Practices_Research_Network_Security_Forensics.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;86de0d0ff13c97a0ba7f26f9f99d0dca&quot;</ETag><Size>560358</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Frost_&amp;_Sullivan_Best_Practices_Research_Network_Security_Forensics.png</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;74f1f214b5fbfceecd54cd404f6348b9&quot;</ETag><Size>231480</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Frost_and_Sullivan_2016_North_American_Hosted_IP_Telephony_and_UCaaS_Company_of_the_Year_Award.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;3cb24a888b892a448601b5d0873e0702&quot;</ETag><Size>785584</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Frost_and_Sullivan_2016_North_American_Hosted_IP_Telephony_and_UCaaS_Company_of_the_Year_Award.png</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;d14901bb9b9d13e39577eb375ca5ee15&quot;</ETag><Size>287204</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Fusion_Overview_The_worlds_first_cloud-converged_solution_for_IT_resilience.jpg</Key><LastModified>2022-05-12T16:01:58.000Z</LastModified><ETag>&quot;797551f4ea1e1c5aa7494abe5d3d87a7&quot;</ETag><Size>749782</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Fusion_Overview_The_worlds_first_cloud-converged_solution_for_IT_resilience.png</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;0c8f119b8c9d524a23e232f9b42c465e&quot;</ETag><Size>309070</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/GDPR_Ebook.jpg</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;f4c5823cc8d9a2f58e5c640dd811b646&quot;</ETag><Size>1041928</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/GDPR_Ebook.png</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;33a7f7c8059fa8d32a9c26461e85b9bb&quot;</ETag><Size>414676</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/GDPR_New_Data_Protection_Rules_in_the_EU.jpg</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;55123eadd029041058e3d923f75744f1&quot;</ETag><Size>567330</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/GDPR_New_Data_Protection_Rules_in_the_EU.png</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;caae567b7276577a9b04604fe0dac17c&quot;</ETag><Size>191534</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/GDPR_Survival_Basics_5_Ways_to_Help_Prepare.jpg</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;72c0293e21569d5c54ef427cfa0724f1&quot;</ETag><Size>961253</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/GDPR_Survival_Basics_5_Ways_to_Help_Prepare.png</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;dfc399f7bdd0a48c196fb0d18da9da5a&quot;</ETag><Size>367643</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/GDPR_What_it_Means_to_Your_Cybersecurity_Strategy.jpg</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;dd96395c9a8d7913a138e25d2a31629d&quot;</ETag><Size>976723</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/GDPR_What_it_Means_to_Your_Cybersecurity_Strategy.png</Key><LastModified>2022-05-12T16:01:59.000Z</LastModified><ETag>&quot;4729cbeccd849d485b3df05c455b444b&quot;</ETag><Size>374249</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gartner_Magic_Quadrant_for_CRM_Lead_Management.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;b1a680774a15bd271068051ce4eb9e93&quot;</ETag><Size>867308</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gartner_Magic_Quadrant_for_CRM_Lead_Management.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;7f6d3268aff63ea019b9ba943b8aedae&quot;</ETag><Size>389340</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gartner_Magic_Quadrant_for_Enterprise_Mobility_Management.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;67ca939898fe2597fe823518b247e93d&quot;</ETag><Size>657317</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gartner_Magic_Quadrant_for_Enterprise_Mobility_Management.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;db16d6167f05a1df9df62853c82a366a&quot;</ETag><Size>243843</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gigamon_Improves_Security_Visibility_With_Splunk_Enterprise.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;2624204237605f93f71e03518ac1ee3e&quot;</ETag><Size>1143481</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gigamon_Improves_Security_Visibility_With_Splunk_Enterprise.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;775957ef867dbaf7a50f9afb7dad980b&quot;</ETag><Size>569832</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gigamon_Splunk___Accelerate_Threat_Detection_and_Response.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;91d062d342b8daae907e9d10c5f7f264&quot;</ETag><Size>1046340</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gigamon_Splunk___Accelerate_Threat_Detection_and_Response.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;ed1f2dbf2d5108f3ebe9bb13337d1bd1&quot;</ETag><Size>501076</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gigamon_Splunk___Improve_Security_Visibility.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;2624204237605f93f71e03518ac1ee3e&quot;</ETag><Size>1143481</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Gigamon_Splunk___Improve_Security_Visibility.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;775957ef867dbaf7a50f9afb7dad980b&quot;</ETag><Size>569832</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Global_DDoS_Threat_Landscape_Report.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;18da05336eb99c4e7b2d3da1141db454&quot;</ETag><Size>556135</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Global_DDoS_Threat_Landscape_Report.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;b971a637772529c63d503b78fe21c0aa&quot;</ETag><Size>127799</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Global_Interconnection_Index.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;4d31d83e9e4649fac0924a66d9803a7c&quot;</ETag><Size>327662</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Global_Interconnection_Index.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;d86a5c8dedc388e05b9865f09c06fb67&quot;</ETag><Size>2272470</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Google_How_Enterprises_are_Streamlining_with_Chromebooks.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;487f8fd5ac04917f020f77ed7a5518c1&quot;</ETag><Size>593975</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Google_How_Enterprises_are_Streamlining_with_Chromebooks.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;74f219d926764c951a45823fec522ba5&quot;</ETag><Size>156681</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Governance_Risk_&amp;_Compliance_From_Naysayers_to_Believers.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;c339514b04e4336ef78caea980d70c31&quot;</ETag><Size>1006487</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Governance_Risk_&amp;_Compliance_From_Naysayers_to_Believers.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;f2e0f4333376506cf6fc16b7d84c83eb&quot;</ETag><Size>395306</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HBR_White_Paper__Beyond_CRM.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;534b0c6053c9b264c30d04a93f8b3ee4&quot;</ETag><Size>521155</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HBR_White_Paper__Beyond_CRM.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;571d655ef8aa33966aa36adddb33eacd&quot;</ETag><Size>113764</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HII_Insider_Threat_Report_The_Threat_is_Already_Within.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;faf12f32601ea3e15faaadb2d19f0294&quot;</ETag><Size>912181</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HII_Insider_Threat_Report_The_Threat_is_Already_Within.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;d12c9bf86174192e0d5d2309db564c50&quot;</ETag><Size>336010</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HPC_Leading_Edge_Magazine.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;5d6c1c1f7ab97cc75dee4a636c4c8238&quot;</ETag><Size>692208</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HPC_Leading_Edge_Magazine.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;66a53e1684b9c64067a0add52eaf9994&quot;</ETag><Size>270967</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HPC_Special_Report_Launch_a_Machine_Learning_Startup.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;dfa8a6f096fe9bb6e4c394d6f010aefd&quot;</ETag><Size>641961</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HPC_Special_Report_Launch_a_Machine_Learning_Startup.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;56309b83ff80bdb6d96f80e82f435c43&quot;</ETag><Size>192179</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HPC_System_for_Manufacturing.jpg</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;14c2ef8bc9fb6c8fc22010663d6ce1e9&quot;</ETag><Size>876912</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HPC_System_for_Manufacturing.png</Key><LastModified>2022-05-12T16:02:00.000Z</LastModified><ETag>&quot;97e4dba9191f11df8d45bba9c2c9e2ba&quot;</ETag><Size>354530</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HR_Leading_Business_Transformation.jpg</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;337327342568660fb2716e4106f4b20c&quot;</ETag><Size>591715</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/HR_Leading_Business_Transformation.png</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;887fa0a37f17cf7d8eb046e0a12a2910&quot;</ETag><Size>195604</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Hadoop_Infographic_Hadoop_and_the_Analytic_Data_Pipeline__Sponsored_by_Pentaho.jpg</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;548e9bcdac94758ece112a68de2329b1&quot;</ETag><Size>190452</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Hadoop_Infographic_Hadoop_and_the_Analytic_Data_Pipeline__Sponsored_by_Pentaho.png</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;cbd348fa6225dddb957170a207940879&quot;</ETag><Size>136948</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Hadoop_and_the_Analytic_Data_Pipeline.jpg</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;19378008f42e430d0eb8dac3f19802fd&quot;</ETag><Size>540137</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Hadoop_and_the_Analytic_Data_Pipeline.png</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;c696e44e295813b7d54df8f6807b3562&quot;</ETag><Size>131310</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Harnessing_the_Power_of_Metadata_for_Security.jpg</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;ed97a46904b65b4a222da7070fc894a5&quot;</ETag><Size>792421</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Harnessing_the_Power_of_Metadata_for_Security.png</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;459acc7224cabb38f04228e4eb5e96a1&quot;</ETag><Size>343679</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Harvard_Business_Review_Report.jpg</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;4eeb5c035078624922704375969ba434&quot;</ETag><Size>455227</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Harvard_Business_Review_Report.png</Key><LastModified>2022-05-12T16:02:01.000Z</LastModified><ETag>&quot;10607a26ec40fb5b71b660f065b367e3&quot;</ETag><Size>114796</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Highly_Effective_Email_Marketing_A_2015-2016_Lookbook.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;33d4dcb53c4bc9d408841bfe9fd46064&quot;</ETag><Size>331375</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Highly_Effective_Email_Marketing_A_2015-2016_Lookbook.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;da13bfb7594ab0d4ca36fcc250e49bbf&quot;</ETag><Size>220923</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Holistic_Learning_Experience.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;a876f1678861c83af64e28d184939915&quot;</ETag><Size>201670</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Holistic_Learning_Experience.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;ea37dea23e1dcf2d939c9040f3ddccba&quot;</ETag><Size>150555</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Holistic_Learning_Experience___Manager.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;208c5456649495db47e4f76ed6b7c068&quot;</ETag><Size>176212</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Holistic_Learning_Experience___Manager.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;7e79a50468f229cb68f89ad1d2bcf9d8&quot;</ETag><Size>136459</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_Can_Analytics_Help_Organizations_Recruit_Top_Talent.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;98a4e6af475c16a2c39314f795cfe273&quot;</ETag><Size>791138</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_Can_Analytics_Help_Organizations_Recruit_Top_Talent.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;7012eaaac415bdbf3291dace2a9443a3&quot;</ETag><Size>293190</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_Digital_Transformation_Elevates_Human_Capital_Management.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;16cffd3bfb28bce0427c139b0169b9ba&quot;</ETag><Size>923201</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_Digital_Transformation_Elevates_Human_Capital_Management.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;c1cdca7e68f715e31a03539dfd8211bd&quot;</ETag><Size>382982</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_GDPR_Could_Impact_Your_Business_Operations.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;f4c5823cc8d9a2f58e5c640dd811b646&quot;</ETag><Size>1041928</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_GDPR_Could_Impact_Your_Business_Operations.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;33a7f7c8059fa8d32a9c26461e85b9bb&quot;</ETag><Size>414676</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_Marketing_Automation_Can_Help_Small_Teams_Succeed.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;54f93ada3975a26e25fea56f50bd8af7&quot;</ETag><Size>656634</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_Marketing_Automation_Can_Help_Small_Teams_Succeed.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;76b254a4a87b9764078a29d81be6e407&quot;</ETag><Size>424592</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_Trustworthy_is_your_Certificate_Authority.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;d1e4372ef2fd7fc36d1742302e7887cb&quot;</ETag><Size>618340</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_Trustworthy_is_your_Certificate_Authority.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;4f4a3b7f2cfbbfe59cdf4b622685b4d7&quot;</ETag><Size>218436</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Accelerate_IT_Resilience_Through_Virtualization.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;fc7ffa9e8574b8b82416f948c8a3728c&quot;</ETag><Size>470759</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Accelerate_IT_Resilience_Through_Virtualization.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;da150b2babd54172113f0cb2d5cd1071&quot;</ETag><Size>124350</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Adopt_Marketo_After_Using_a_Different_MAP.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;581e8462f23187f4f38b1d9fb343afc6&quot;</ETag><Size>548804</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Adopt_Marketo_After_Using_a_Different_MAP.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;e1386bb8df4335d8e7de1ab7247b7b51&quot;</ETag><Size>324666</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Bridge_the_Divide_Between_Online_and_Offline_Marketing.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;2ffe5fb67222a488acdde8ae8a6454af&quot;</ETag><Size>511835</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Bridge_the_Divide_Between_Online_and_Offline_Marketing.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;4afa0183bc2e470b9959bde001b4d8e3&quot;</ETag><Size>295804</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Calculate_the_ROI_of_Customer_Nurturing.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;dec357a8749379bbb55a9b0e5e6fc3af&quot;</ETag><Size>397873</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Calculate_the_ROI_of_Customer_Nurturing.png</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;41553e01d8d93603c002a1b00cb8d91c&quot;</ETag><Size>211017</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Conquer_Your_First_Talent_Management_Purchase.jpg</Key><LastModified>2022-05-12T16:02:02.000Z</LastModified><ETag>&quot;f85d22ecd98714eeb079c42e96ea44f9&quot;</ETag><Size>399497</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Conquer_Your_First_Talent_Management_Purchase.png</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;22a8d7bab516f706dae9ed29278a8e29&quot;</ETag><Size>166906</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Define_Your_Customer_Nurturing_Strategy.jpg</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;dec357a8749379bbb55a9b0e5e6fc3af&quot;</ETag><Size>397873</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Define_Your_Customer_Nurturing_Strategy.png</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;41553e01d8d93603c002a1b00cb8d91c&quot;</ETag><Size>211017</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Gain_Visibility_Across_Your_Multi-Cloud_Environment.jpg</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;29f4dd51b6ee76538fb35051a499c262&quot;</ETag><Size>829122</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Gain_Visibility_Across_Your_Multi-Cloud_Environment.png</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;ae020bf97a8b2474918c0560cbfb98ff&quot;</ETag><Size>548919</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Overcome_the_Top_Five_Big_Data_Challenges__Its_All_About_the_Cloud.jpg</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;f5f5bf50b2cf1ad6fadcd345bad21a73&quot;</ETag><Size>908904</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Overcome_the_Top_Five_Big_Data_Challenges__Its_All_About_the_Cloud.png</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;fc8a72f5f61a8c8d8bb6dfd54dd39563&quot;</ETag><Size>397600</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Overcome_the_Top_Five_Big_Data_Challenges___Its_All_About_the_Cloud_2018.jpg</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;f5f5bf50b2cf1ad6fadcd345bad21a73&quot;</ETag><Size>908904</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Overcome_the_Top_Five_Big_Data_Challenges___Its_All_About_the_Cloud_2018.png</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;fc8a72f5f61a8c8d8bb6dfd54dd39563&quot;</ETag><Size>397600</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Prevent_a_Compliance_Disaster.jpg</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;3e04b5774221966b9581c0dd710b2baf&quot;</ETag><Size>950848</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Prevent_a_Compliance_Disaster.png</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;4e6abbee00183bd0ff581d1857d7dc5e&quot;</ETag><Size>362597</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Segment_Your_Customers_for_Nurturing.jpg</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;29964ae1f84bb0cfe3d0f146bb8defab&quot;</ETag><Size>401874</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Segment_Your_Customers_for_Nurturing.png</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;a2181d082c3de14f8327bfb3e14cb7b7&quot;</ETag><Size>215951</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Select_the_Right_Remote_Support_Tool.jpg</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;e60c9d22f7e5c9bc380b1b210f330799&quot;</ETag><Size>633352</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Select_the_Right_Remote_Support_Tool.png</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;9ddc56921837e2250d7163188bb5330c&quot;</ETag><Size>198128</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Select_the_Right_Web_Application_Firewall_10_Key_Requirements_to_Consider.jpg</Key><LastModified>2022-05-12T16:02:03.000Z</LastModified><ETag>&quot;502545f893e2782e113568108eb20836&quot;</ETag><Size>710677</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Select_the_Right_Web_Application_Firewall_10_Key_Requirements_to_Consider.png</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;1ae012e4dec8b64c50fe7e166e4c1ac8&quot;</ETag><Size>263324</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Transition_to_a_Paperless_Construction_Company.jpg</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;76e3aaf6cc4d293ca3b7d41021dbd643&quot;</ETag><Size>587602</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_Transition_to_a_Paperless_Construction_Company.png</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;a4777723b0b20e4bf5d6444910d2525a&quot;</ETag><Size>334709</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_choose_the_right_e-learning_partner.jpg</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;c785dd87ee9fd6155957ba74dda341eb&quot;</ETag><Size>373806</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_choose_the_right_e-learning_partner.png</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;217011319210f767439c01921453003e&quot;</ETag><Size>234042</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_overcome_Todays_ITSM_Challenges.jpg</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;6667bf908ac926a8a84b27e6e434fb3a&quot;</ETag><Size>328766</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/How_to_overcome_Todays_ITSM_Challenges.png</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;252a158504e9ce1747b8a45425aba2f3&quot;</ETag><Size>222313</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Hyper-Converged_Infrastructure_101_How_to_Get_Started.jpg</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;01f76bb9338fd0a570b35da4f3e6d5fa&quot;</ETag><Size>487361</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Hyper-Converged_Infrastructure_101_How_to_Get_Started.png</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;2205e194fb4376acfecf8258a3d48de5&quot;</ETag><Size>251107</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Hyper-Converged_Infrastructure_Buyers_Checklist_AAG.jpg</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;bd2028f75150a983566cb57b8c654dd1&quot;</ETag><Size>783291</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Hyper-Converged_Infrastructure_Buyers_Checklist_AAG.png</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;c96753f611ca485bc87b0305b2896914&quot;</ETag><Size>297416</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IBM_Watson_Content_Hub_eBook.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;a48b2522c28e134a23c139d165a1570b&quot;</ETag><Size>213596</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IBM_Watson_Content_Hub_eBook.png</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;09373589bb4f9fea8ff22f42aaba9f73&quot;</ETag><Size>158489</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ICMI_Is_Your_Contact_Center_Ready_for_the_Peak_Season_MarketPulse_report.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;785c404fa63a92c80f252386adb37e2e&quot;</ETag><Size>433148</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ICMI_Is_Your_Contact_Center_Ready_for_the_Peak_Season_MarketPulse_report.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;a607b772ab5caba9d4db558a5d072339&quot;</ETag><Size>85776</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_4_Key_Metrics_Say_its_Time_for_a_Server_Refresh.jpg</Key><LastModified>2022-05-12T16:02:04.000Z</LastModified><ETag>&quot;fe19530bd797f0f3ceef43f1a89ce120&quot;</ETag><Size>618005</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_4_Key_Metrics_Say_its_Time_for_a_Server_Refresh.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;ed18d0efd8a6924a474462170ee85673&quot;</ETag><Size>327839</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_58%_Faster_Deployment_of_VDI_with_Dell_EMC.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;5a0567c9fe813db123855c0e9c49a0d0&quot;</ETag><Size>746159</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_58%_Faster_Deployment_of_VDI_with_Dell_EMC.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;60b303b04caa548cb0cc75542d129bb7&quot;</ETag><Size>309717</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Cloud_and_Drive_for_WAN_Efficiencies_Power_Move_to_SD-WAN_.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;a5578d82de765031d7353207fcb7d233&quot;</ETag><Size>971624</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Cloud_and_Drive_for_WAN_Efficiencies_Power_Move_to_SD-WAN_.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;e1635a1c237994c33eb6d17e7c0140e1&quot;</ETag><Size>450897</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Delivering_Enterprise_Value_with_Service_Management.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;e173e1b608d24324a90aa70ef4663006&quot;</ETag><Size>697287</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Delivering_Enterprise_Value_with_Service_Management.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;f6bc67e8b9c6e168a20f4c76056e75af&quot;</ETag><Size>266257</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Executive_Brief_The_Business_Value_of_Cloud-Based_Application_Development_Solutions.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;42cebc595c65b67209dd3a20180d7bfb&quot;</ETag><Size>901286</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Executive_Brief_The_Business_Value_of_Cloud-Based_Application_Development_Solutions.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;6dc905186a93facee613a1a344275ec1&quot;</ETag><Size>400588</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_FutureScape_Worldwide_Big_Data_and_Analytics_2016_Predictions.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;a51c55568f20eb69dcb61cba2c2e349c&quot;</ETag><Size>637143</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_FutureScape_Worldwide_Big_Data_and_Analytics_2016_Predictions.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;c29c458c3ec03350f3f33af4974908d1&quot;</ETag><Size>196927</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Market_Spotlight___Maturity_Model.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;d9b1f1d559280d8e14aebd0998f7fb56&quot;</ETag><Size>948496</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Market_Spotlight___Maturity_Model.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;f0f60fd973c86ab226fea8174c317d48&quot;</ETag><Size>442364</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_MaturityScape_Benchmark_Big_Data_and_Analytics_in_the_United_States.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;f10158cb2ca65f9d055d7248cd0d1bce&quot;</ETag><Size>642315</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_MaturityScape_Benchmark_Big_Data_and_Analytics_in_the_United_States.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;a42cbe5e92faffa858f88e488cb134f6&quot;</ETag><Size>207942</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Powering_Digital_Transformation_Through_the_Cloud-Ready_Enterprise.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;54c5b7eb8689fac40ac61bd981ce6152&quot;</ETag><Size>939456</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Powering_Digital_Transformation_Through_the_Cloud-Ready_Enterprise.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;d3b0806aad2180e95772e42569cf54c4&quot;</ETag><Size>427784</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Report.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;3ad15f700976177f1bd49a112451c98b&quot;</ETag><Size>978497</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Report.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;d5cbb3e04123d3f193ab0663410f3214&quot;</ETag><Size>458572</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Report_A_Maturity_Model_for_Delivering_Proactive_Customer_Service.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;d9b1f1d559280d8e14aebd0998f7fb56&quot;</ETag><Size>948496</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Report_A_Maturity_Model_for_Delivering_Proactive_Customer_Service.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;f0f60fd973c86ab226fea8174c317d48&quot;</ETag><Size>442364</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Report_The_Benefits_of_Network_Visibility_in_Optimizing_Security.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;25688d182472ae033897e565ec14c669&quot;</ETag><Size>855064</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Report_The_Benefits_of_Network_Visibility_in_Optimizing_Security.png</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;d6e54c70a4c7adb69066dce47b94e4cf&quot;</ETag><Size>356245</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Rethinking_the_Network_as_a_Network_Enforcer.jpg</Key><LastModified>2022-05-12T16:02:05.000Z</LastModified><ETag>&quot;db98af2be49e0b3cb3f8221f82d8652e&quot;</ETag><Size>694553</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Rethinking_the_Network_as_a_Network_Enforcer.png</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;dced8fd39726b8402a03fb90d7726682&quot;</ETag><Size>441813</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_SD-WAN_Guidance_on_WAN_Transformation.jpg</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;a5578d82de765031d7353207fcb7d233&quot;</ETag><Size>971624</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_SD-WAN_Guidance_on_WAN_Transformation.png</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;e1635a1c237994c33eb6d17e7c0140e1&quot;</ETag><Size>450897</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Spotlight_on_Mercy_Innovative_Mobile_Applications_to_Enhance_Patient_Care.jpg</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;764a53cb824211091d4357a249b32e45&quot;</ETag><Size>947299</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Spotlight_on_Mercy_Innovative_Mobile_Applications_to_Enhance_Patient_Care.png</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;800021174d1ba4bdf50314c79e21b836&quot;</ETag><Size>444378</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Tech_Spotlight_Blog.jpg</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;c8bde61433ac445a0d3fba6b8add431c&quot;</ETag><Size>1000440</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Tech_Spotlight_Blog.png</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;14b7bea0f02652d40fa0d7517bee3c17&quot;</ETag><Size>485987</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Tech_Spotlight_Infographic.jpg</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;516dd5cfa32925f7b3638e2012056fa2&quot;</ETag><Size>236861</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Tech_Spotlight_Infographic.png</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;a4d994cd38f584224ddd30946faf2b66&quot;</ETag><Size>942862</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Technology_Spotlight_The_Increasing_Need_for_Real_Time_Datacenter_Analytics.jpg</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;ea1aa69ae7d92335ebf53a155f325009&quot;</ETag><Size>939403</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Technology_Spotlight_The_Increasing_Need_for_Real_Time_Datacenter_Analytics.png</Key><LastModified>2022-05-12T16:02:06.000Z</LastModified><ETag>&quot;ac7d4ebd642c8e2784a44dc02497fdd0&quot;</ETag><Size>437412</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Technology_Spotlight___Empower_Your_Techs_with_VideoAided_Remote_Support_Tools.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;16353e2c95854138e0da5372f2ad9e65&quot;</ETag><Size>881353</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Technology_Spotlight___Empower_Your_Techs_with_VideoAided_Remote_Support_Tools.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;b5c5b8015f55c0640823ea1fd1ee6aab&quot;</ETag><Size>383392</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_The_Business_Value_of_Cisco_UCS_Integrated_Infrastructure_Solutions_for_Running_SAP_Workloads.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;c9749f0bb45f00e869fd435ad1c81449&quot;</ETag><Size>764153</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_The_Business_Value_of_Cisco_UCS_Integrated_Infrastructure_Solutions_for_Running_SAP_Workloads.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;477b3a16534eb0be444baaf40d1ef1c3&quot;</ETag><Size>321705</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_The_Business_Value_of_Cloud_Management_Platforms.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;1c28a2fe18d6ef5f64a75b6fd51b7bf3&quot;</ETag><Size>928307</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_The_Business_Value_of_Cloud_Management_Platforms.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;e975f42d8106db1d6d020f41b7eebd88&quot;</ETag><Size>423637</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_The_Business_Value_of_Dell_EMC_Vblock_Systems.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;6c5b7508a17053cff421d33038f20f29&quot;</ETag><Size>794011</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_The_Business_Value_of_Dell_EMC_Vblock_Systems.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;e63602c8ddee5740e6b5ef44527d6331&quot;</ETag><Size>345039</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_The_Business_Value_of_Riverbed_SteelHead.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;8b393c50b08538ad94f6dac62a1f0d7d&quot;</ETag><Size>699480</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_The_Business_Value_of_Riverbed_SteelHead.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;fb430eb940fe6b9acea7dfabc51c9d39&quot;</ETag><Size>274038</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Vendor_Spotlight__Leveraging_the_Public_Cloud_for_Datacenter_Replacement_&amp;_Extension.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;30f90f6f6ecd9d9c06d0d2a76ed84c2a&quot;</ETag><Size>934550</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Vendor_Spotlight__Leveraging_the_Public_Cloud_for_Datacenter_Replacement_&amp;_Extension.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;641976ff14ace26c1450f9867d6dd035&quot;</ETag><Size>431188</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Veritas_Helps_Organizations_Become_GDPR-Ready_and_Data-_Driven_with_an_Expanded_Information_Management_Portfolio.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;e4df50d8d2185ee9576f0b146e3d7da2&quot;</ETag><Size>1020867</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Veritas_Helps_Organizations_Become_GDPR-Ready_and_Data-_Driven_with_an_Expanded_Information_Management_Portfolio.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;3d3ac4d123776d2d9d5df4ad58011fbc&quot;</ETag><Size>457857</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Veritas_Helps_Organizations_Become_GDPR_Ready_and_Data_Driven_with_an_Expanded_Information_Management_Portfolio.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;e4df50d8d2185ee9576f0b146e3d7da2&quot;</ETag><Size>1020867</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Veritas_Helps_Organizations_Become_GDPR_Ready_and_Data_Driven_with_an_Expanded_Information_Management_Portfolio.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;3d3ac4d123776d2d9d5df4ad58011fbc&quot;</ETag><Size>457857</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Whitepaper_IBM_Optimizes_Multicloud_Strategies_for_Enterprise_Digital_Transformation.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;18984d33a605c7dde08a89a30324b04a&quot;</ETag><Size>790184</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Whitepaper_IBM_Optimizes_Multicloud_Strategies_for_Enterprise_Digital_Transformation.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;e1ef5d02a99058f1b2c94235480fa708&quot;</ETag><Size>323101</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Whitepaper_The_Role_of_Unified_Communications_as_a_Service_in_Digital_Transformation_of_Global_Financial_Services.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;7459f0745d969a6bf4334768f7e00149&quot;</ETag><Size>944243</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDC_Whitepaper_The_Role_of_Unified_Communications_as_a_Service_in_Digital_Transformation_of_Global_Financial_Services.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;cb8164caa913dd228754906d69a51f76&quot;</ETag><Size>435688</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDG_A_Shift_to_Remote_IT_Services_Alleviates_Support_and_Help_Desk_Headaches.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;44256ecc91679f44801b8ab701ec82a7&quot;</ETag><Size>574888</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDG_A_Shift_to_Remote_IT_Services_Alleviates_Support_and_Help_Desk_Headaches.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;17fcb05a8ac13dbd11648686e8263135&quot;</ETag><Size>151656</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDG_Tech_Dossier.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;cb61e05701b4c0af688c669f2f50d3cc&quot;</ETag><Size>420767</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDG_Tech_Dossier.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;354f76aa85de12304b549a426eb201dc&quot;</ETag><Size>285323</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDG_Tech_Dossier_A_Security_Delivery_Platform_Benefits_Your_Entire_Organization.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;cb61e05701b4c0af688c669f2f50d3cc&quot;</ETag><Size>420767</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDG_Tech_Dossier_A_Security_Delivery_Platform_Benefits_Your_Entire_Organization.png</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;354f76aa85de12304b549a426eb201dc&quot;</ETag><Size>285323</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDG_Tech_Dossier_A_Security_Delivery_Platform_Benefits_the_Entire_Organization.jpg</Key><LastModified>2022-05-12T16:02:07.000Z</LastModified><ETag>&quot;cb61e05701b4c0af688c669f2f50d3cc&quot;</ETag><Size>420767</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IDG_Tech_Dossier_A_Security_Delivery_Platform_Benefits_the_Entire_Organization.png</Key><LastModified>2022-05-12T16:02:08.000Z</LastModified><ETag>&quot;354f76aa85de12304b549a426eb201dc&quot;</ETag><Size>285323</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IEEE_White_Paper_Application_Performance_Management_for_App-Driven_Businesses.jpg</Key><LastModified>2022-05-12T16:02:08.000Z</LastModified><ETag>&quot;d0464c85f46b900cc6047bd9c90d3d94&quot;</ETag><Size>246949</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IEEE_White_Paper_Application_Performance_Management_for_App-Driven_Businesses.png</Key><LastModified>2022-05-12T16:02:08.000Z</LastModified><ETag>&quot;d73966d32fa3e53bdf3c08482837aec9&quot;</ETag><Size>200317</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IHS_Whitepaper_Delivering_a_Modern_Communications_Experience_on_a_Global_Scale.jpg</Key><LastModified>2022-05-12T16:02:08.000Z</LastModified><ETag>&quot;7d85b6d8bf34b7a12cf86c4b72aa4d07&quot;</ETag><Size>497520</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IHS_Whitepaper_Delivering_a_Modern_Communications_Experience_on_a_Global_Scale.png</Key><LastModified>2022-05-12T16:02:08.000Z</LastModified><ETag>&quot;13097fa7b7253c5773de5e31e49cf0ec&quot;</ETag><Size>100006</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IT_Guide_for_Mobility_Making_the_Case_to_Business_Leaders.jpg</Key><LastModified>2022-05-12T16:02:08.000Z</LastModified><ETag>&quot;db98af2be49e0b3cb3f8221f82d8652e&quot;</ETag><Size>694553</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IT_Guide_for_Mobility_Making_the_Case_to_Business_Leaders.png</Key><LastModified>2022-05-12T16:02:08.000Z</LastModified><ETag>&quot;dced8fd39726b8402a03fb90d7726682&quot;</ETag><Size>441813</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IT_PROFESSIONALS_and_LIFELONG_LEARNING_The_challenges_and_opportunities_impacting_your_team.jpg</Key><LastModified>2022-05-12T16:02:08.000Z</LastModified><ETag>&quot;a894019e70d9856866311df92f6decf3&quot;</ETag><Size>81037</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IT_PROFESSIONALS_and_LIFELONG_LEARNING_The_challenges_and_opportunities_impacting_your_team.png</Key><LastModified>2022-05-12T16:02:08.000Z</LastModified><ETag>&quot;54da3dfb2b6788ee07798e2b77e6fec3&quot;</ETag><Size>88086</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IT_Resilience_Building_Fault-Tolerant_Architectures.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;c5e39506fa5a096da5a77ef7dae6d200&quot;</ETag><Size>729052</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/IT_Resilience_Building_Fault-Tolerant_Architectures.png</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;9e075957fd57f34b3f7d364f531e6057&quot;</ETag><Size>320563</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Identify_and_Respond_to_Threats_Faster_infographic.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;a6634ff372c283666a69481725f09434&quot;</ETag><Size>145714</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Identify_and_Respond_to_Threats_Faster_infographic.png</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;2d505d46c93d7c6a280fd4393e9a3aed&quot;</ETag><Size>1009252</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Implementing_GRC_Lines_of_Defense_to_Improve_Your_Business_Processes_Infographic.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;e756ad087a9f250832f8c840692f2055&quot;</ETag><Size>506770</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Implementing_GRC_Lines_of_Defense_to_Improve_Your_Business_Processes_Infographic.png</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;7a32430c8fa87071217aeb6384d6b4fb&quot;</ETag><Size>705090</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Improving_Recovery_Time_Objectives_for_Healthcare_Organizations.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;1ccaa7f79a66087e0d3996fc00753204&quot;</ETag><Size>822923</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Improving_Recovery_Time_Objectives_for_Healthcare_Organizations.png</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;04ab006bba0d8736bfe3a13647f78828&quot;</ETag><Size>334651</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Infographic_12_Reasons_you_dont_need_to_monitor_your_apps.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;476d73c2002ed854e08b4148212209df&quot;</ETag><Size>397302</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Infographic_12_Reasons_you_dont_need_to_monitor_your_apps.png</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;20b0999836130217363e9463354b1cf6&quot;</ETag><Size>299108</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Insiders_Guide_to_Ransomware.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;f5fe8c350be9d68dc69f37c4fb1896ba&quot;</ETag><Size>345420</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Insiders_Guide_to_Ransomware.png</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;469b90b2be9a4d6b1aff8c5882f2bde4&quot;</ETag><Size>269319</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Insiders_Guide_to_defeating_Ransomware_Protect_Your_Data_at_its_Source.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;f5fe8c350be9d68dc69f37c4fb1896ba&quot;</ETag><Size>345420</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Insiders_Guide_to_defeating_Ransomware_Protect_Your_Data_at_its_Source.png</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;469b90b2be9a4d6b1aff8c5882f2bde4&quot;</ETag><Size>269319</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Integrated_Business_Planning_Connecting_Demand_Supply_and_Operations_on_the_Road_to_Profitability.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;131ebe1574007c8db2c7aa6ed7556552&quot;</ETag><Size>621922</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Integrated_Business_Planning_Connecting_Demand_Supply_and_Operations_on_the_Road_to_Profitability.png</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;dff1038c944b53c0c23de744368fed76&quot;</ETag><Size>212877</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Intel_Co-Branded_7_Reasons_Why_Micro-Segmentation_is_Powerful_to_Have_and_Painless_to_Add.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;fbb2427d81a4450e4df32f96ad0fe799&quot;</ETag><Size>1042072</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Intel_Co-Branded_7_Reasons_Why_Micro-Segmentation_is_Powerful_to_Have_and_Painless_to_Add.png</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;849502f657836b4301fc5f35e3febdb9&quot;</ETag><Size>467739</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Intel_Co-Branded_Solution_Overview_An_Introduction_to_the_Security_Advantages_of_Micro-Segmentation.jpg</Key><LastModified>2022-05-12T16:02:09.000Z</LastModified><ETag>&quot;e44e890b7d3cdf829fa66955ff14edf2&quot;</ETag><Size>851031</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Intel_Co-Branded_Solution_Overview_An_Introduction_to_the_Security_Advantages_of_Micro-Segmentation.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;0eee337ac95ae03a1dd9d67cb22b43ea&quot;</ETag><Size>393799</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Intel_Co-Branded_Why_Micro-Segmentation_Matters_Now.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;be77ff547d91598c95c114db1bc41ecb&quot;</ETag><Size>890746</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Intel_Co-Branded_Why_Micro-Segmentation_Matters_Now.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;3292129d69798734eded5543ca67216b&quot;</ETag><Size>399311</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Interconnection_Fueling_the_Explosion_of_the_Digital_Economy.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;b1fd6706081ea9dfb090132ead2a2fc1&quot;</ETag><Size>46031</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Interconnection_Fueling_the_Explosion_of_the_Digital_Economy.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;1a255bf06d48ec4fc7b0fb6f19071a56&quot;</ETag><Size>522313</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Interfaith_Medical_Case_Study.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;e105340f69384440e3c7be2a0a7feece&quot;</ETag><Size>995753</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Interfaith_Medical_Case_Study.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;4aadc3cc959a5245e3b75d9144e4c0aa&quot;</ETag><Size>494308</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Introduction_to_AWS_Security.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;1746ee5848e98d595a308850baa3425f&quot;</ETag><Size>452603</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Introduction_to_AWS_Security.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;6184dd175c1d8c7e87147abf2637f7cd&quot;</ETag><Size>90089</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Introduction_to_AWS_Security_Processes.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;1746ee5848e98d595a308850baa3425f&quot;</ETag><Size>452603</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Introduction_to_AWS_Security_Processes.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;6184dd175c1d8c7e87147abf2637f7cd&quot;</ETag><Size>90089</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Is_Your_Organization_Capable_of_Creating_the_Next_Generation_Data_Center.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;d6428947be29ec6377c743f768e419ec&quot;</ETag><Size>735683</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Is_Your_Organization_Capable_of_Creating_the_Next_Generation_Data_Center.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;749b2c9a510242a67b8a47882f1e9d56&quot;</ETag><Size>459755</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Joining_Performance_&amp;_Learning.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;83fcf285ec25b994cda8e336a6990182&quot;</ETag><Size>788093</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Joining_Performance_&amp;_Learning.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;6e8f12bf9454207da182c21a930d0b51&quot;</ETag><Size>298465</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Journey_to_the_Cloud_Get_There_Faster_with_Hyper-Converged_Infrastructure.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;93981fb8f4131bc135811d5b1cc9d9b1&quot;</ETag><Size>354161</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Journey_to_the_Cloud_Get_There_Faster_with_Hyper-Converged_Infrastructure.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;7b94ab1911902c123b2719482d93976d&quot;</ETag><Size>246235</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Journey_to_the_Hybrid_Cloud.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;80530bc6e2692eb5bc5f0c1ea18c1708&quot;</ETag><Size>939986</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Journey_to_the_Hybrid_Cloud.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;a9d0018b10d3342a0ba0880b3b886bd9&quot;</ETag><Size>444084</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Jumpstart_Revenue_Growth_with_Sales_and_Marketing_Alignment.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;c82ddc62fa8214e851562e305e2da118&quot;</ETag><Size>448415</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Jumpstart_Revenue_Growth_with_Sales_and_Marketing_Alignment.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;db932dae064ad250d8d6feddd7b9208c&quot;</ETag><Size>294502</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Jumpstart_Your_ABM.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;d24d33d4008e7f75ddc07df8d32db3a8&quot;</ETag><Size>599098</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Jumpstart_Your_ABM.png</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;70336b7b1bb9fcafc7320cf640863e9e&quot;</ETag><Size>336227</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Key_to__Smarter_Enterprise_Security.jpg</Key><LastModified>2022-05-12T16:02:10.000Z</LastModified><ETag>&quot;13a756be22837d07f455d711fe53ba7f&quot;</ETag><Size>529156</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Key_to__Smarter_Enterprise_Security.png</Key><LastModified>2022-05-12T16:02:11.000Z</LastModified><ETag>&quot;94fba9f4170344182836fc8fa8d8ce40&quot;</ETag><Size>196136</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Keys_to_Business_Success_with_All-Flash_Storage.jpg</Key><LastModified>2022-05-12T16:02:11.000Z</LastModified><ETag>&quot;6f88c7f4154b849c325908c4ce866ad3&quot;</ETag><Size>619378</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Keys_to_Business_Success_with_All-Flash_Storage.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;1091ebb2000bb263ffab2e7ef36be14d&quot;</ETag><Size>193669</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Kingslayer___A_Supply_Chain_Attack.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;8fac1ac2e54626a99fccfb9500ad6625&quot;</ETag><Size>967538</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Kingslayer___A_Supply_Chain_Attack.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;f524f724162f8f745fa43aee9e7b2f96&quot;</ETag><Size>369370</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Knowledge_is_Power.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;a7b829699ca392b7f67220d6ffdee6e3&quot;</ETag><Size>444161</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Knowledge_is_Power.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;4e81c97ad31e2351ecee27a89841bf3f&quot;</ETag><Size>486790</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/KuppingerCole_Leadership_Compass_Identity_as_a_Service_Single_Sign_On_to_the_Cloud_IDaaS_SSO.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;026bc3a64cf98eecbd225a015bf0c645&quot;</ETag><Size>657269</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/KuppingerCole_Leadership_Compass_Identity_as_a_Service_Single_Sign_On_to_the_Cloud_IDaaS_SSO.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;d045124236a22241b829603b12986ca3&quot;</ETag><Size>220527</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Leadership_The_Missing_Ingredient_in_Effective_Risk_Management.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;14322ac5801fe9b26c20dead52e8f0c5&quot;</ETag><Size>999806</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Leadership_The_Missing_Ingredient_in_Effective_Risk_Management.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;a8b579ffce66b4f3d1284657965a72cb&quot;</ETag><Size>390923</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Lessons_in_Machine_Learning_Early_Adopters_Share_their_Strategies.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;b4e57d25eef45e9b55ea98ad0192a272&quot;</ETag><Size>697907</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Lessons_in_Machine_Learning_Early_Adopters_Share_their_Strategies.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;aaa1beb2e67f2e2be64be6e072a2abd3&quot;</ETag><Size>446092</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Leveraging_Psychology_in_Digital_Marketing.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;e9ee00e635436364d55025ef07406127&quot;</ETag><Size>415431</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Leveraging_Psychology_in_Digital_Marketing.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;288d60b470e4159a30fd4a0b80e9a6f4&quot;</ETag><Size>203551</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Live_Chat_Comparison_A_Goal-driven_Approach_to_Chat_Vendor_Selection.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;b9da35ea5e9803804fa0d10acef86535&quot;</ETag><Size>687996</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Live_Chat_Comparison_A_Goal-driven_Approach_to_Chat_Vendor_Selection.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;98c2c9960496c09ffd6f462d1994146c&quot;</ETag><Size>209849</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Live_Chat_Performance_Benchmarking_Report.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;2b7bdabc3ba3eab86fe4393f54508fcb&quot;</ETag><Size>731153</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Live_Chat_Performance_Benchmarking_Report.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;f559bffb3874c48dfeaa14d6ac58ced8&quot;</ETag><Size>233315</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Location_Services_Bridging_the_Physical_and_Digital_Divide.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;7b0d29356a9dc5b8361ea19a5d6b882b&quot;</ETag><Size>963857</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Location_Services_Bridging_the_Physical_and_Digital_Divide.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;8399105c85ad7bedbba3cbace64d2e39&quot;</ETag><Size>456531</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Lockheed_Martin_Case_Study.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;72c165d7b7ebd6fb90ce4eeed0af43f0&quot;</ETag><Size>967120</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Lockheed_Martin_Case_Study.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;b00f1ed656b1b0c46f4551a04d8cb32c&quot;</ETag><Size>451089</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Data_eBook_(Security).jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;c69d68f1d7dd9310e50a041b04f9f886&quot;</ETag><Size>1130726</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Data_eBook_(Security).png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;2df23cc0b4f223279ba3ae6afa8533fc&quot;</ETag><Size>239689</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Learning_Delivers_Better_Insights.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;ba3c4aa6376df38492b909236602d5aa&quot;</ETag><Size>946956</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Learning_Delivers_Better_Insights.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;6fb8317384422845bf18cc47897810df&quot;</ETag><Size>467970</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Learning_Raises_Security_Teams_to_the_Next_Level.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;b9bcfc5a78911241f1afb585578b3a48&quot;</ETag><Size>542999</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Learning_Raises_Security_Teams_to_the_Next_Level.png</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;a0ae4ca7a65431e37bf6bd4dca165529&quot;</ETag><Size>147250</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Learning_The_New_Proving_Ground_for_Competitive_Advantage.jpg</Key><LastModified>2022-05-12T16:02:12.000Z</LastModified><ETag>&quot;9b05d79d86c9cf196824ee1da0943288&quot;</ETag><Size>1081620</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Learning_The_New_Proving_Ground_for_Competitive_Advantage.png</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;01371c69ad759b4be46b8f3a04b2ec40&quot;</ETag><Size>511436</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Learning_on_AWS_Bringing_the_Power_of_ML_to_Todays_Businesses.jpg</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;92711f6286f59331914f98ddd89575e7&quot;</ETag><Size>745864</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Machine_Learning_on_AWS_Bringing_the_Power_of_ML_to_Todays_Businesses.png</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;6a8fcdac718bc4220db1e9b46f2fcdf2&quot;</ETag><Size>268837</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Making_Performance_Management_a_Positive_Part_of_Your_Company_Culture.jpg</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;92c63b0b5a1988036647d85fcda37c17&quot;</ETag><Size>516296</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Making_Performance_Management_a_Positive_Part_of_Your_Company_Culture.png</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;116ee3f17784ed7af554efe821426ec3&quot;</ETag><Size>118098</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Making_Product_Portfolio_Reviews_Part_of_Your_SandOP_Process.jpg</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;896148bdb128babbc0fc66ae5fbcdb86&quot;</ETag><Size>365079</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Making_Product_Portfolio_Reviews_Part_of_Your_SandOP_Process.png</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;ecdf2a4be0851b38cce724fc3ef46bfe&quot;</ETag><Size>183836</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Making_the_Case_for_Network_Automation.jpg</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;905712fa9b0dfd9ea4e01625bfdf067e&quot;</ETag><Size>255220</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Making_the_Case_for_Network_Automation.png</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;39bb5dc151672e6997cc979b0530cc69&quot;</ETag><Size>232004</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Managing_Data_is_Key_to_a_Successful_Multi_Cloud_Strategy.jpg</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;84eff26038bdc76ef6d3f3a13d388275&quot;</ETag><Size>336949</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Managing_Data_is_Key_to_a_Successful_Multi_Cloud_Strategy.png</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;5eaa1af005c5a2ce9bc050c014a3f4d9&quot;</ETag><Size>770769</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Manual_vs_Automated_Performance_Management_for_Mid-Market.jpg</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;8ef81b8f70b3cc7664330a9eaa64ea45&quot;</ETag><Size>288377</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Manual_vs_Automated_Performance_Management_for_Mid-Market.png</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;8dec442381bf26e9a018323c5ba779a0&quot;</ETag><Size>460940</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Marketpulse_report_Rising_IT_Complexity_Makes_Remote_Support_Essential_in_Europe.jpg</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;ca1d9bb51c73c443dbb8b792719d8abb&quot;</ETag><Size>953380</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Marketpulse_report_Rising_IT_Complexity_Makes_Remote_Support_Essential_in_Europe.png</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;27e93228b057b46c942b170d34293373&quot;</ETag><Size>430518</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Measure_the_ROI_of_your_learning_solutions.jpg</Key><LastModified>2022-05-12T16:02:13.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Measure_the_ROI_of_your_learning_solutions.png</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Metric_or_Log_Analytics_A_Quick_Guide_to_Cloud_Applications_Monitoring.jpg</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;9cdd0cf7f265ceea593f98362d00eb45&quot;</ETag><Size>616815</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Metric_or_Log_Analytics_A_Quick_Guide_to_Cloud_Applications_Monitoring.png</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;ad06b1e14feaf02ff872f7b2d4f50bfc&quot;</ETag><Size>186105</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Micro-Segmentation_Builds_Security_Into_Your_Agency_Data_Centers_DNA.jpg</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;9a86e65476d651e2c265f029353441ae&quot;</ETag><Size>536168</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Micro-Segmentation_Builds_Security_Into_Your_Agency_Data_Centers_DNA.png</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;8c393f8affef846abfe5b2535d38bb5c&quot;</ETag><Size>110026</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Micro-Segmentation_Builds_Security_Into_Your_Data_Center&apos;s_DNA.jpg</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;9a86e65476d651e2c265f029353441ae&quot;</ETag><Size>536168</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Micro-Segmentation_Builds_Security_Into_Your_Data_Center&apos;s_DNA.png</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;8c393f8affef846abfe5b2535d38bb5c&quot;</ETag><Size>110026</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Micro-Segmentation_Builds_Security_into_your_K-12_Data_Center&apos;s_DNA.jpg</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;aa180df0ed3600a9841d7183e72df132&quot;</ETag><Size>533945</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Micro-Segmentation_Builds_Security_into_your_K-12_Data_Center&apos;s_DNA.png</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;58be1a208794a8447a24e95551eaa878&quot;</ETag><Size>107699</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/MicroStrategy_Secure_Cloud_Whitepaper_.jpg</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;77a4544c2de4bd51249e68b54a9f0408&quot;</ETag><Size>246341</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/MicroStrategy_Secure_Cloud_Whitepaper_.png</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;4051cab7ef5dfc545138b96254b9077b&quot;</ETag><Size>197776</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Minimizing_the_Identity_Attack_Vector_with_Continuous_Authentication.jpg</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;085383830af8fb7d2cacb6324baabd8b&quot;</ETag><Size>512313</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Minimizing_the_Identity_Attack_Vector_with_Continuous_Authentication.png</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;6dda71fe988e58c52354e13db7c00ae0&quot;</ETag><Size>128190</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Mobile_Maturity_Study_2017.jpg</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;7732ddc7fbae4a9baa54d12d1fb9e11e&quot;</ETag><Size>488654</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Mobile_Maturity_Study_2017.png</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;411584082441684f9bf8e0010198f66d&quot;</ETag><Size>378522</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modern_Data_Strategy.jpg</Key><LastModified>2022-05-12T16:02:14.000Z</LastModified><ETag>&quot;83db9b4a827100f597e4253732e35491&quot;</ETag><Size>580785</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modern_Data_Strategy.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;55450b751b2372e3f56ddb35a2c70cd1&quot;</ETag><Size>142940</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modern_Data_Strategy_Whitepaper.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;83db9b4a827100f597e4253732e35491&quot;</ETag><Size>580785</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modern_Data_Strategy_Whitepaper.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;55450b751b2372e3f56ddb35a2c70cd1&quot;</ETag><Size>142940</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernize_Your_Data_Centers_DNA_-_Trend_Brief.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;3bd3d373fa0c036a6a12cd221ccc9894&quot;</ETag><Size>1611564</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernize_Your_Data_Centers_DNA_-_Trend_Brief.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;1c7b553120169a3556369745c519850d&quot;</ETag><Size>768723</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernize_Your_Network_to_Digitize_Your_Business.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;7d298b58f944f76b0bbc22d1838bbde9&quot;</ETag><Size>798047</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernize_Your_Network_to_Digitize_Your_Business.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;71a21f716c10710193021b45c2befa9c&quot;</ETag><Size>316160</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernize_Your_VMware_Data_Center_with_the_Public_Cloud.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;9763626bc5470165a1a307c7eaeee27c&quot;</ETag><Size>806083</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernize_Your_VMware_Data_Center_with_the_Public_Cloud.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;88338591890389f01977294bf912387c&quot;</ETag><Size>253510</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernizing_Customer_Service_Quick_Guide.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;cbb9f58e35db60e9f82cb2fd4d602128&quot;</ETag><Size>830513</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernizing_Customer_Service_Quick_Guide.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;717daab915b7fd31bf8080dc30d855d7&quot;</ETag><Size>302130</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernizing_HCM_Why_the_Digital_Employment_Experience_Matters.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;6603c239024ce466d2e0ef92168f824e&quot;</ETag><Size>250210</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Modernizing_HCM_Why_the_Digital_Employment_Experience_Matters.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;603a545eb481a82591cd45228a84a812&quot;</ETag><Size>13528</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Moving_Business_Beyond_Bias_Three_Key_Considerations_for_Compensating_Your_Diverse_Workforce.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;cac0c375f9aea82792714fb1e1b636ea&quot;</ETag><Size>1018818</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Moving_Business_Beyond_Bias_Three_Key_Considerations_for_Compensating_Your_Diverse_Workforce.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;98a1d84d641f8a5caeb217c83428f469&quot;</ETag><Size>352877</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NASDAQ_+_PLURALSIGHT_Moving_at_warp_speed_to_out_innovate_the_competition.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;59b7c9480fb0b447f8875e8f1ce9a908&quot;</ETag><Size>725502</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NASDAQ_+_PLURALSIGHT_Moving_at_warp_speed_to_out_innovate_the_competition.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;dc215059c00ddd9ab4e0f5138efd0f0f&quot;</ETag><Size>226683</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NSS_Labs_Advanced_Endpoint_Protection_Test_Report.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;9965abc808d144ce4cb6658cab7f52d3&quot;</ETag><Size>465106</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NSS_Labs_Advanced_Endpoint_Protection_Test_Report.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;41b58c92c5dfa916cf48297e3e32161b&quot;</ETag><Size>91766</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Navigating_the_Digital_Journey_with_SAP_and_the_Cloud.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;f2727b0ad1c0d8757177263a1572f026&quot;</ETag><Size>1031569</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Navigating_the_Digital_Journey_with_SAP_and_the_Cloud.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;5af77fe0dcd9be449e7d08a7c9262100&quot;</ETag><Size>475465</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetApp_All_Flash_FAS_Flash-Optimized_Storage_for_Mixed_Workload_Consolidation_.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;8e53e60a29cdbe974be1c70e06ab016b&quot;</ETag><Size>797617</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetApp_All_Flash_FAS_Flash-Optimized_Storage_for_Mixed_Workload_Consolidation_.png</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;1d4f0a4d22a24c529933b4cd764c933c&quot;</ETag><Size>323886</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_App_Security_eBook___The_Top_6_WAF_Essentials_to_Achieve_Application_Security_Efficacy.jpg</Key><LastModified>2022-05-12T16:02:15.000Z</LastModified><ETag>&quot;5203a33a2ed3f8887be117b15cf0132a&quot;</ETag><Size>519351</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_App_Security_eBook___The_Top_6_WAF_Essentials_to_Achieve_Application_Security_Efficacy.png</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;ee73b3805052ff35bd80d718eaf4d584&quot;</ETag><Size>189950</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_DevOps_eBook___The_ADC_Guide_to_Managing_Hybrid_IT_and_DevOps_Application_Delivery.jpg</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;78c598dbdce36864ac3c8c3594bb7100&quot;</ETag><Size>655002</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_DevOps_eBook___The_ADC_Guide_to_Managing_Hybrid_IT_and_DevOps_Application_Delivery.png</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;b12989d1276bd193bb7e6ad951e39dd7&quot;</ETag><Size>266710</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_Hybrid_Cloud_eBook___The_6_Essential_Requirements_for_Managing_ADCs_in_Hybrid_Cloud_Environments.jpg</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;89c0607f5116a204eda7b27abab74ee6&quot;</ETag><Size>566737</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_Hybrid_Cloud_eBook___The_6_Essential_Requirements_for_Managing_ADCs_in_Hybrid_Cloud_Environments.png</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;55b5f31b53ef77fcb65474984d3f6af6&quot;</ETag><Size>215625</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_Pooled_Capacity_eBook__The_Guide_to_Multi_Dimensional_ADC_Scaling_for_Digital_Transformation.jpg</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;a26b33257b55c792c1d5046fa6c35513&quot;</ETag><Size>527623</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_Pooled_Capacity_eBook__The_Guide_to_Multi_Dimensional_ADC_Scaling_for_Digital_Transformation.png</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;5ccd496180517e11e37155ac9f5e5375&quot;</ETag><Size>195433</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_Software_First_eBook___The_Definitive_Guide_to_Selecting_the_Right_ADC_for_the_Digital_Transformation_Era.jpg</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;b033682ad3f187bdf20529dd14d75bc9&quot;</ETag><Size>739583</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_Software_First_eBook___The_Definitive_Guide_to_Selecting_the_Right_ADC_for_the_Digital_Transformation_Era.png</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;6e1e6619583649090ac09e62877aafdc&quot;</ETag><Size>327259</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_TCO_Comparison_eBook_Offer.jpg</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;bc39d1a9c1b2314b04f0ce4374a35d4a&quot;</ETag><Size>517329</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_TCO_Comparison_eBook_Offer.png</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;aa8e6b69c6f2055dc8a207861730fc6c&quot;</ETag><Size>192091</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_TriScale_Pooled_Licensing_eBook_Offer.jpg</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;a26b33257b55c792c1d5046fa6c35513&quot;</ETag><Size>527623</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/NetScaler_ADC_TriScale_Pooled_Licensing_eBook_Offer.png</Key><LastModified>2022-05-12T16:02:16.000Z</LastModified><ETag>&quot;5ccd496180517e11e37155ac9f5e5375&quot;</ETag><Size>195433</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Netflix_&amp;_Amazon_Kinesis_Streams_Case_Study.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Netflix_&amp;_Amazon_Kinesis_Streams_Case_Study.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Network_Automation_Makes_Your_Life_Easier.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;9db9d985089d2569ccb64e9f9a26cecf&quot;</ETag><Size>807713</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Network_Automation_Makes_Your_Life_Easier.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;264bb7dc574d9a06e68e80028565dac7&quot;</ETag><Size>348984</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/New_School_is_a_philosophy_that_the_right_digital_tools_can_transform_your_institution.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;8310344d140454d224b079b51a7fd726&quot;</ETag><Size>585906</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/New_School_is_a_philosophy_that_the_right_digital_tools_can_transform_your_institution.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;c937016eddff1f2db440c8d2a0f8d79a&quot;</ETag><Size>307284</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Nine_Common_A_B_Testing_Pitfalls_and_How_to_Avoid_Them.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;3e42782c38caf73d34af1624b180eb05&quot;</ETag><Size>772736</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Nine_Common_A_B_Testing_Pitfalls_and_How_to_Avoid_Them.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;26f74fd05eb8c3d9f151d1bd6d21666b&quot;</ETag><Size>328581</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Not_Today_Zero-Day.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;489fac4324bd21ca54dce9cb9c031706&quot;</ETag><Size>454757</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Not_Today_Zero-Day.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;c9f8d6c3874200acf7db8b5b0ccbda36&quot;</ETag><Size>88297</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Odyssey_Exposing_Cyberthreats_with_Predictive_Analytics_and_Machine_Learning.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;bbe682b468c06cc645d998fca953a5e5&quot;</ETag><Size>993698</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Odyssey_Exposing_Cyberthreats_with_Predictive_Analytics_and_Machine_Learning.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;b568abfe5f92b75b518fdb8b1108f475&quot;</ETag><Size>417647</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Optimizing_the_Quote-to-Close_Process.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;0c1ac00753c569e33efe524feca68fc9&quot;</ETag><Size>750896</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Optimizing_the_Quote-to-Close_Process.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;1fdfc12b8382bcfb1d2b7eab835981e7&quot;</ETag><Size>357901</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Oracle_Linux_Minimize_Operating_Expensesand_Maximize_Value.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;b74777aaaaf974ea4839e5a0a58bc1c4&quot;</ETag><Size>375504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Oracle_Linux_Minimize_Operating_Expensesand_Maximize_Value.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;62cb87af71faadee99f27d9e356adbbd&quot;</ETag><Size>31119</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Analytics_Mobile_and_Application_Services.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;0a325dbbfdb91bcbc99a78399d9ecc59&quot;</ETag><Size>490682</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Analytics_Mobile_and_Application_Services.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;bfbf05542276dd817704dd2a7e761d10&quot;</ETag><Size>106547</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Application_Services.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;f64975d74e05e9fdc6c4a587aeb72388&quot;</ETag><Size>458743</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Application_Services.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;9e72f3020cbd37121e32e487282fe1d0&quot;</ETag><Size>85804</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Compute_Services.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;3f8ecce9163341c43cac0579a75dcddb&quot;</ETag><Size>458629</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Compute_Services.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;b8cdcf0b25807707e2645eaee617504d&quot;</ETag><Size>83015</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Database_Services.jpg</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;1de986b2a05afe637a47d0fafe577d44&quot;</ETag><Size>457669</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Database_Services.png</Key><LastModified>2022-05-12T16:02:17.000Z</LastModified><ETag>&quot;771cf04d939d6bf798ed8e3e5b2d9548&quot;</ETag><Size>85036</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Network_Security.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;cf52914ba17e0dd4151113d7d32c65df&quot;</ETag><Size>455564</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Network_Security.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;c45fa497c547d5a6a9c0009ded18d77f&quot;</ETag><Size>80191</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Storage_Services.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;49dd45fdf68c8d5a2184e2369fa8537c&quot;</ETag><Size>456938</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Overview_of_AWS_Security___Storage_Services.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;239f852e04d0424a531eb0f29182784b&quot;</ETag><Size>84270</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ovum_Differentiate_Your_Business_with_a_Cloud_Contact_Center.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;f187bba09e4e17dd4bdcab94cc2dd338&quot;</ETag><Size>726409</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ovum_Differentiate_Your_Business_with_a_Cloud_Contact_Center.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;241be2b5d5a0e9bc2a4c92b8d360cdfa&quot;</ETag><Size>273944</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ovum_Where_Contact_Centers_Are_Missing_the_Mark_with_Customer_Care_Infographic.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;2c985aea4acc62485492a07af2e6f2c5&quot;</ETag><Size>288966</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ovum_Where_Contact_Centers_Are_Missing_the_Mark_with_Customer_Care_Infographic.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;89b27daf64b50b11d7ba9bb76896c316&quot;</ETag><Size>715507</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ovum_Where_Contact_Centers_Are_Missing_the_Mark_with_Customer_Care_Report.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;35cc0b90a4fc591ae5ff47e867e904a8&quot;</ETag><Size>550087</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ovum_Where_Contact_Centers_Are_Missing_the_Mark_with_Customer_Care_Report.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;b611850a79edbd3f23d3f5c2484d1143&quot;</ETag><Size>150392</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/POV_Blockchain.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;ac0c01bf311b2389f17e9fdd34dbef5f&quot;</ETag><Size>557120</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/POV_Blockchain.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;9a07fa4d359e67983f83681c67b801e4&quot;</ETag><Size>118274</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Path_to_Operational_Intelligence.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;223fbb3c8483d615f8fa81262d1ab523&quot;</ETag><Size>886759</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Path_to_Operational_Intelligence.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;91954f7791449b73164725d1f80c5170&quot;</ETag><Size>296426</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Performance_Analytics_Best_Practices_eBook.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;0f95ec99657c29db58802e5de3e53dd4&quot;</ETag><Size>402923</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Performance_Analytics_Best_Practices_eBook.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;11ed2f06013dab5d1bd3f83f495add4a&quot;</ETag><Size>487873</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Performance_Matters_Getting_The_Most_Out_Of_Office_365.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;cfbe1bbe1a9dbd325c8a79788cecb979&quot;</ETag><Size>457298</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Performance_Matters_Getting_The_Most_Out_Of_Office_365.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;a60a88c9d35d8d414aca3d15d880afc6&quot;</ETag><Size>262500</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Planning_Strategic_Seating_to_Maximize_Employee_Performance.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;1412c8763337320b5218bd88a0f0e874&quot;</ETag><Size>572637</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Planning_Strategic_Seating_to_Maximize_Employee_Performance.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;d59931a8b558b0125afc8ba2dd4ea250&quot;</ETag><Size>143090</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Platform_Approach_to_Securing_Enterprise_Identities.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;51c4d437224548f49fc8292bc9f83a6c&quot;</ETag><Size>1022251</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Platform_Approach_to_Securing_Enterprise_Identities.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;56f0e69e30a188a24110aa9a6ea6da0a&quot;</ETag><Size>419213</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Plugging_the_Security_Gaps_of_Cloud_File_Sharing_Services.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;7aab6b8bf991401e82b9c2d8af849190&quot;</ETag><Size>616206</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Plugging_the_Security_Gaps_of_Cloud_File_Sharing_Services.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;6e393f01759b0afaf9521a6a87e3b392&quot;</ETag><Size>179857</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ponemon_Institutes_2017_State_of_Mobile_&amp;_IoT_Application_Security_Study.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;e99260d2e99cff488e02de912003a682&quot;</ETag><Size>713001</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ponemon_Institutes_2017_State_of_Mobile_&amp;_IoT_Application_Security_Study.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;f2975cc67523d75bb3f666b5c981ac5f&quot;</ETag><Size>250029</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ponemon_Report_Big_Data_Cybersecurity_Analytics.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;de058c5e1998d143e6fa889221825b2a&quot;</ETag><Size>762211</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ponemon_Report_Big_Data_Cybersecurity_Analytics.png</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;d4ea1c4219ae56d7a57ae1d2469e374a&quot;</ETag><Size>297432</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ponemon_Study_The_Impact_of_Data_Breaches_on_Reputation_and_Share_Value.jpg</Key><LastModified>2022-05-12T16:02:18.000Z</LastModified><ETag>&quot;d64a20caef5ee575500c01e201d20201&quot;</ETag><Size>839563</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Ponemon_Study_The_Impact_of_Data_Breaches_on_Reputation_and_Share_Value.png</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;b84ba0360879837be351c7f98a858676&quot;</ETag><Size>353633</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Practical_Guide_to_Efficient_Security_Response_Checklist.jpg</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;fd4c5951f8038801fac901a5f71b6ba3&quot;</ETag><Size>631137</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Practical_Guide_to_Efficient_Security_Response_Checklist.png</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;b8ef1579f22d966157ba1d9d79abb996&quot;</ETag><Size>503970</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Preparing_for_the_Workspace_of_the_Future_A_guide_to_unifying_simplifying_and_securing_cloud_services.jpg</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;5e30f8becb5017767cf1abf87984d60c&quot;</ETag><Size>448384</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Preparing_for_the_Workspace_of_the_Future_A_guide_to_unifying_simplifying_and_securing_cloud_services.png</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;7c763caa1802a1e2d4e7335748ba1744&quot;</ETag><Size>223074</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Principled_Performance_Playbook_Business_Impact_Analysis.jpg</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;dde48d17ff53f7b13bd5c86b02a98add&quot;</ETag><Size>524334</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Principled_Performance_Playbook_Business_Impact_Analysis.png</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;9e407a92dabf1e240aa8ba65a537c4bb&quot;</ETag><Size>123982</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Principled_Performance_Playbook_Plan_of_Action_&amp;_Milestones_Management.jpg</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;4e0af2e091b1cb822ddfd54fa05ec351&quot;</ETag><Size>548901</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Principled_Performance_Playbook_Plan_of_Action_&amp;_Milestones_Management.png</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;6cefc411c99702192874ddddec8757b8&quot;</ETag><Size>138582</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Product_Comparison_Enterprise_Flash_Array_Storage_.jpg</Key><LastModified>2022-05-12T16:02:19.000Z</LastModified><ETag>&quot;7fd9b1a3f6ab57b5d69742f4b5439239&quot;</ETag><Size>186511</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Product_Comparison_Enterprise_Flash_Array_Storage_.png</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;2caa5864a6c8d6e4418da14d3d144fc4&quot;</ETag><Size>1009614</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Professional_Services_Small_and_Midsize_Firms_Are_Turning_to_Technology_to_Advance_their_Business_Goals.jpg</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;70af420822a13618d5236e69f479ddca&quot;</ETag><Size>699560</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Professional_Services_Small_and_Midsize_Firms_Are_Turning_to_Technology_to_Advance_their_Business_Goals.png</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;129c3a72d14868956f6d1264f7bbe46f&quot;</ETag><Size>269526</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Programmatic_Revolution.jpg</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;818cc0d96d51ce75b8844dec7835cd0b&quot;</ETag><Size>631769</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Programmatic_Revolution.png</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;4ab47edbeb2c81cb3f94d92ccc93ae08&quot;</ETag><Size>599141</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Protect_Your_Business_in_the_Cloud_with_Axcient_Fusion.jpg</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;26b257558e2e6b2f6cacb1208589ed1a&quot;</ETag><Size>828067</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Protect_Your_Business_in_the_Cloud_with_Axcient_Fusion.png</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;cc7f265428616eac1db0cb8554944d3e&quot;</ETag><Size>382150</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Protecting_Modern_IT_With_Business-Driven_Security.jpg</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;5725d836467c009cc6e6aab98b689cc0&quot;</ETag><Size>841913</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Protecting_Modern_IT_With_Business-Driven_Security.png</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;a1fd9e319d5f2b5a5b71cab07f6ad70b&quot;</ETag><Size>388032</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Prove_Yourself_Identity_in_a_Mobile_Cloud_World.jpg</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;6cf1f9203aafc24d7f81e450b75f2a94&quot;</ETag><Size>807215</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Prove_Yourself_Identity_in_a_Mobile_Cloud_World.png</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;e03692c0ddce3c7351bf23edd855d434&quot;</ETag><Size>526307</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Put_Time_Back_on_Your_Side_How_Adobe_Stock_Can_Jumpstart_Your_Creative_Process.jpg</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;c53788834c12a7bf1e0910557d066b56&quot;</ETag><Size>486261</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Put_Time_Back_on_Your_Side_How_Adobe_Stock_Can_Jumpstart_Your_Creative_Process.png</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;83b0f43f9bd43540c1e6150546eb989e&quot;</ETag><Size>455985</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Putting_the_Secure_in_Secure_Remote.jpg</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;d509bf1587c986ae16df50cd3943b129&quot;</ETag><Size>793867</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Putting_the_Secure_in_Secure_Remote.png</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;b1af406675798d8405bef37fbabfe8e7&quot;</ETag><Size>324082</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Putting_the_Secure_in_Secure_Remote_Access.jpg</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;d509bf1587c986ae16df50cd3943b129&quot;</ETag><Size>793867</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Putting_the_Secure_in_Secure_Remote_Access.png</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;b1af406675798d8405bef37fbabfe8e7&quot;</ETag><Size>324082</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Qualys_Guide_to_Automating_CIS_20_Critical_Controls.jpg</Key><LastModified>2022-05-12T16:02:20.000Z</LastModified><ETag>&quot;997df858e8848a7d2c03ff7ed8198550&quot;</ETag><Size>717945</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Qualys_Guide_to_Automating_CIS_20_Critical_Controls.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;fc3b205b220053cb487f03fdb818b690&quot;</ETag><Size>233952</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Quantifying_the_Risk_of_a_Data_Breach_Top_Six_Industries.jpg</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;29036275c0c34ccd3b4ba9dd784ef687&quot;</ETag><Size>309340</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Quantifying_the_Risk_of_a_Data_Breach_Top_Six_Industries.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;213e2186e7d3e8561f6600a1c0aa45fa&quot;</ETag><Size>16014</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Questions_You_Should_be_Asking_Your_Cloud_Service_Provider.jpg</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;d5d1d50d7de45b1a27560348faa6c887&quot;</ETag><Size>472071</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/Questions_You_Should_be_Asking_Your_Cloud_Service_Provider.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;7ebc82a7f4910250905cbabcde52d601&quot;</ETag><Size>95581</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/R20_Strengthening_Self-Service_Analytics_with_Data_Preparation_and_Data_Virtualization.jpg</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;1dc74b3237a704e981af89a401ef7937&quot;</ETag><Size>502167</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/R20_Strengthening_Self-Service_Analytics_with_Data_Preparation_and_Data_Virtualization.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;1d3c10203b1f8391d6071a27dc694c91&quot;</ETag><Size>121853</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ROI_of_Talent_Management.jpg</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;95b8879276fc3fdb4bb9a8d90c747d9c&quot;</ETag><Size>694021</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/ROI_of_Talent_Management.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;c21c51053ba84916d6e0fb8d83787506&quot;</ETag><Size>216949</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer-_Business-Driven_Security.jpg</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;a70ec7fb245280f2eb3feb4518bc228f&quot;</ETag><Size>929110</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer-_Business-Driven_Security.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;2c7c044594a8ce7c0bc34bc0278a0fbb&quot;</ETag><Size>677166</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Maturity_Model_Snapshot_Assessment_&amp;_Authorizaton_&amp;_Continuous_Monitoring.jpg</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;3a1df8fb39a5a7945af1e04d1ae06fe6&quot;</ETag><Size>803691</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Maturity_Model_Snapshot_Assessment_&amp;_Authorizaton_&amp;_Continuous_Monitoring.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;9728070d8ef5270ce621c6dfb55dfedb&quot;</ETag><Size>257401</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Maturity_Model_Snapshot_Audit_Management.jpg</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;372a43adf3b1cc8de98619a4e47080ed&quot;</ETag><Size>736257</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Maturity_Model_Snapshot_Audit_Management.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;0936185f80819ae818f95eb18d2658dc&quot;</ETag><Size>215295</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Maturity_Model_Snapshot_Operational_Risk_Management.jpg</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;46f0c086f2861db92bbff48498cbdfcb&quot;</ETag><Size>757750</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Maturity_Model_Snapshot_Operational_Risk_Management.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;847b9f44598b53452e529af9418f8026&quot;</ETag><Size>229339</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Maturity_Model_Snapshot_Regulatory_&amp;_Corporate_Compliance_Management.jpg</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;7b1538b4da6150603371ff4d90d18479&quot;</ETag><Size>795281</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Maturity_Model_Snapshot_Regulatory_&amp;_Corporate_Compliance_Management.png</Key><LastModified>2022-05-12T16:02:21.000Z</LastModified><ETag>&quot;1f05c15c548d59be279c6fb83039b11c&quot;</ETag><Size>251418</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Operational_Risk_Management.jpg</Key><LastModified>2022-05-12T16:02:22.000Z</LastModified><ETag>&quot;80104b5a42d2fdab5f1a1d807e6a0fe6&quot;</ETag><Size>1078144</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/main/RSA_Archer_Operational_Risk_Management.png</Key><LastModified>2022-05-12T16:02:22.000Z</LastModified><ETag>&quot;0dd80db9423a145c17447d9556c3ceae&quot;</ETag><Size>565632</Size><StorageClass>STANDARD</StorageClass></Contents></ListBucketResult>