ComputerWeekly.com Research Library

Powered by Bitpipe.com

IT ManagementResearch

  • Converged and Hyper Converged Infrastructure

    Sponsored by: SimpliVity

    Access this expert e-guide to learn what defines hyper-converged systems versus converged infrastructures. You'll also learn what problems each solutions solves while getting a look into why these solutions are taking the IT industry by storm.

  • The Anatomy of a Top-Down Approach

    Sponsored by: Pangea Systems

    This white paper examines how you can take a new approach to service management in order to improve the implementation of critical services while also improving your ability to stay up to date with incidents before they become an issue. Read on to learn more.

  • Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage

    Sponsored by: IBM

    Access this resource to learn how to optimize operations, performance, analytics, automation and delivery of your IT services in today's complex on-premise, hybrid and cloud environments. You'll be able to select from a wide array of content in different media formats to help you make smarter decisions now and for your organization's future.

  • Best Practices for Selecting a Colocation Provider

    Sponsored by: Iron Mountain

    This e-guide delves into the finer points of choosing a co-location center that works for your requirements.

  • How HPA improved IT value and facilitated maximum growth

    Sponsored by: Cisco & Fujitsu

    Hutchison Ports Australia is developing new facilities at Brisbane and expects that when fully operational, these facilities will increase capacity by almost 100 per cent, providing importers, exporters and shipping lines with more choice and better service. View this video to see how Fujitsu is helping them achieve these goals.

  • Ten Vital Questions Every Business Owner Should be Asking IT

    Sponsored by: Pangea Systems

    Access this white paper to learn the top 10 questions you should be asking your IT. You'll get insight into how you can improve the communication with your IT organization in order to improve alignment between IT and the business.

  • The Top 5 Security Challenges of Higher Education

    Sponsored by: Tenable Network Security

    This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.

  • Manage IT like a Super Hero: Save time, Reduce cost and Innovate in the era of Cloud

    Sponsored by: IBM

    Register for this exclusive event to explore some IBM solutions that can help you operations, performance, analytics, automation and delivery of IT services in today's complex on-premise and cloud environments.

  • Enhanced Monitoring for VMware Infrastructure

    Sponsored by: Gigamon

    Access this white paper to learn how you can deliver enhanced monitoring for your VMware infrastructure. You'll learn how this solution delivers pervasive visibility for monitoring, analysis, and security tools into the virtual environment and private cloud.

  • Visibility Into Your Virtualized Data Center

    Sponsored by: Gigamon

    Access this white paper to learn about how you can deliver increased visibility into your virtualized data center with a new solution. You'll learn how a traffic visibility layer for the standard reference data center architecture that delivers: Informed decisions based on real-time visibility, reduced expenses, and more.

  • Scale your server to suit your needs

    Sponsored by: IBM

    IBM Power Systems do not let you pay for unused server capacity. The server runs to its full potential so your business can operate with agility.

  • Secure Remote Access to VPN with Mobile and Tokenless Authentication

    Sponsored by: HID

    This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.

  • Case Study: Improve Customer Experience with Managed Services

    Sponsored by: Cisco & Fujitsu

    Watch this brief video to learn about the managed services provider Mitchells & Butlers, a leading managed pub and pub restaurant operator, owning around 2,000 businesses offering food, drink and entertainment across the UK, partnered with to bring innovation to their business and help support a better guest experience.

  • C&J Energy: Going Public and Outgrowing Its Infrastructure

    Sponsored by: Alert Logic

    This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.

  • The Enemy Within: The Changing Face of Threats to Information Security

    Sponsored by: Clearswift

    This white paper discusses the danger that insider threats present to your enterprise, as well as strategies for protecting your company's critical information.

  • How to Get Started on the Path to Simple, Successful Cloud Solutions

    Sponsored by: Cisco & Fujitsu

    Access this white paper to learn the key steps for cutting through the complexity of the cloud to build a sustainable IT landscape. You'll also learn the top concerns and challenges that enterprises are facing as they develop and implement their cloud strategies as well as top criteria for overcoming these complexities.

  • The Definitive Guide to Cloud Adoption

    Sponsored by: Cisco & Fujitsu

    This white paper allows you to cut through the market hype, acronyms, and buzzwords to get a clearer understanding of what the various cloud models have to offer. Read on to get best practice and practical approaches to make cloud adoption as simple and beneficial as possible.

  • Secure Access to Sensitive Data on the Move

    Sponsored by: HID

    This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.

  • Time for a New Colocation Provider? 5 Ways to Know for Sure

    Sponsored by: Iron Mountain

    Your data center colocation choices are of the utmost importance. The wrong choice can put you at risk of downtime, exceeding capacity, unsuccessful disaster recovery, or regulatory noncompliance. Access this resource to learn the 5 ways to know if it's time to search for a new colocation provider.

  • Security in the Hybrid Cloud, Now and in 2016

    Sponsored by: F5 Networks

    The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.

  • CW Buyer's Guide to Enterprise Collaboration

    Sponsored by: ComputerWeekly.com

    In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's communications strategy.

  • Take Authentication Beyond Passwords with Secure Remote Access

    Sponsored by: HID

    This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.

  • Analytics in a Big Data World

    Sponsored by: ComputerWeekly.com

    This extract from Bart Baesen's book gives an overview of big data and analytics, its applications, analytic models, and job profiles in analytics, and includes a discount code for Computer Weekly readers.

  • Don't Let Legacy Infrastructure Be Your Legacy

    Sponsored by: Red Hat

    This whitepaper explains the advantages of using Linux to upgrade your legacy infrastructure, including more uptime and seamless app migration.

  • HP Financial Services in brief

    Sponsored by: Hewlett-Packard Limited

    This white paper explores the investment solutions that support the transition to the updated styles of IT. Learn how these solutions can provide the flexibility for change that new technology is bringing and how it can adapt to future requirements.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.