ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Secure, Sync and Share Enterprise Files Everywhere

    Sponsored by: Citrix

    This white paper shows how to regain control over employee file sharing with an enterprise-class, IT-managed, secure file sync and sharing strategy. Read on for insight on how to revamp your collaboration approach with six key benefits.

  • Enable Secure Remote Access to 3D Data without Sacrificing Visual Performance

    Sponsored by: Citrix

    This white paper discusses a technology strategy to enable secure, real-time remote collaboration on design data and model-based deliverables. Discover ways to meet time-to-market goals and keep intellectual property secure while lowering IT costs.

  • 10 Questions to Ask Your Data Centre

    Sponsored by: Volta Data Centres

    This exclusive white paper provides readers with 10 questions to ask any prospective colocation service provider.

  • Citrix Workspace Suite

    Sponsored by: Citrix

    Access this informative brochure to learn about a comprehensive mobile workspace solution that allows IT to securely deliver all apps (Windows, web, SaaS, mobile), data, and services from any device, over any network.

  • A Guide to REST and API Design

    Sponsored by: CA Technologies.

    Representational State Transfer (REST) is a web architecture style with universal constraints, enabling developers to build interfaces that can be used from nearly any device or operating system. This informative resource is packed with information on leveraging REST and API design to build applications that can last a long time.

  • Deployment Best Practices and Guidelines to Deliver Any App to Mobile User

    Sponsored by: Citrix

    Access this white paper to learn 6 ways to provide enterprise application access on mobile devices, including the advantages, disadvantages, and target use cases for each of these strategies.

  • Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

    Sponsored by: AlienVault

    This webcast explores watering hole attacks and how to detect them before vulnerabilities are exploited.

  • Securing the mobile workspace

    Sponsored by: Citrix

    Access this white paper to learn about a technology that adds a key layer of security and control to let you deliver a complete mobile workspace on any device. Find out how this ensures that all devices – corporate-owned or BYOD – are compliant before they access the enterprise network.

  • Secure application delivery for a mobile workforce

    Sponsored by: Citrix

    Access this white paper to discover two technologies that provide a complete, end-to-end-mobility solution by managing both application types. Find out how one makes it simple to mobilize Windows applications for use on any mobile device and how the other manages, secures and deploys native mobile apps.

  • Computer Weekly – 4 August 2015: Cyber risks hit the road

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.