Research Library

Powered by

All Research

  • Eight Steps to Building an HP BladeSystem

    Sponsored by: Hewlett-Packard Limited

    This whitepaper examines the eight steps required to properly build your ideal BladeSystem infrastructure solution.

  • HP StoreVirtual VSA Software

    Sponsored by: Hewlett-Packard Limited

    This white paper highlights a storage solution for virtual servers, that doesn't come with the cost or complexity that is associated with dedicated storage hardware.

  • Scale-out systems that put data to work

    Sponsored by: IBM

    This resource highlights a solution that is the first generation of systems with processors designed for Big Data.

  • Computer Weekly – 4 November 2014: Enterprises push for open standards

    Sponsored by:

    In this week's Computer Weekly, we find out about a new push led by Shell and BP to define IT interoperability standards for the digital age. We learn how one company is introducing bitcoin support into its IT systems. And we ask whether the cloud price wars mean lower service levels from suppliers. Read the issue now.

  • E-guide: Why BPM Fills Some App Modernization Needs, Not All

    Sponsored by: OpenText

    In this expert e-guide, learn from examples why some believe BPM has no place in legacy modernization efforts while others champion the approach. Additionally, discover how picking the right BPM certification program can build up critical skills and know-how for your IT team.

  • How to harness a complete workforce management platform in the cloud

    Sponsored by: Workforce Software

    Explore this resource that addresses a workforce management suite that automates labor policies, simplifies compliance with labor regulations and enables HR and payroll pros to play a more strategic role in your organization.

  • Encryption: Why It's Important

    Sponsored by: CipherCloud

    In this expert e-Guide take a look at how encryption is handled in some common cloud computing architectures. In addition Forrester analyst James Staten details the importance of the 'bring your own encryption' (BYOE) fad as a cloud security model.

  • Workforce Management Tool Designed for Utility Companies

    Sponsored by: Workforce Software

    Access this concise resource that highlights a tool that offers timekeeping, scheduling, leave management, labor analytics, and a way to prevent employee fatigue for utility companies.

  • How Often Should IT Security and Firewalls be Upgraded?

    Sponsored by: Icomm Technologies

    Download this exclusive video now to learn about important lifecycle consideration factors, like cost and firmware upgrades, and much more.

  • Types of Prefabricated Modular Data Centers

    Sponsored by: APC by Schneider Electric

    This white paper classifies the different types of prefabricated data centres to inform you what components are included in each. Download this informative guide to gain insight into which modular data centre may be right for your business.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.