Research Library

Powered by

All Research

  • Powering Transformation: The IT Revolution is Now

    Sponsored by: ServiceNow

    This white paper reveals why IT is undergoing a revolution, and why it is time to get ahead of the curve and embrace the shift.

  • Detect and Protect against Advanced Threats

    Sponsored by: Hewlett-Packard Limited

    This white paper examines the architecture of a strong, layered security system and suggests ways to partner with security services in order to achieve it.

  • Computer Weekly – 26 May 2015: Microservices and DevOps are changing software development

    Sponsored by:

    In this week's Computer Weekly, we talk to Hailo about its software development approach, which sees the taxi app use microservices and DevOps techniques. We hear from users of OpenStack, the open source cloud software, about how they are building digital businesses. And our buyer's guide looks at customer experience management. Read the issue now.

  • Uncover Advanced Attacks and Detect Hidden Breaches

    Sponsored by: Hewlett-Packard Limited

    In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.

  • The Cost of a Data Breach

    Sponsored by: IBM

    This report uses statistical analysis to determine how much a breach will cost you depending on attack size, location, and type.

  • ServiceNow ServiceWatch Economic Impact Study

    Sponsored by: ServiceNow

    This white paper features a study that evaluates the positive impact of ServiceNow ServiceWatch in four key areas. Click through now to examine the results and unquantified benefits.

  • PDF Security in Seconds

    Sponsored by: Nuance

    In today's business world, redacting information in sensitive documents can consume valuable time and money. This brief video explores how to make your documents, as well as entire folders, more secure in seconds with agile search capabilities. Tune in now and be well on your way to more compliant collaborations.

  • Special Report: Cyber Security in 2015

    Sponsored by: IBM

    This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.

  • Develop a Plan for Desktop DR

    Sponsored by: VMware

    Access this infographic to discover several staggering results of a disaster on organizations that can seriously affect the workforce.

  • PDF Protection: Features and Benefits

    Sponsored by: Nuance

    PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.