ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet Research

  • Unified Automation Enables Digital Business Agility and Innovation

    Sponsored by: Automic

    A unified approach to automation can accelerate business performance while reducing human error and improving IT staff and developers' productivity.Read this IDC technology spotlight for all of the benefits of IT operations, DevOps, and business process automation.

  • Internet Quality Report

    Sponsored by: VeloCloud

    In this white paper, you'll learn about the reliability of the internet in 2014 and beyond, in terms of using internet links to take advantage of the scale, flexibility and agility of cloud services.

  • Data Management Designed for the Web, Mobile and Internet of Things Era

    Sponsored by: IBM

    Database-as-a-Service (DBaaS) helps enable you to buy into a data management Service Level Agreement (SLA) instead of buying into a database technology, simplifying app development and delivery.Read this white paper to find out all the ways DBaaS can benefit your organization.

  • Data Management for the Internet of Things

    Sponsored by: Pentaho Corporation

    This report examines data management's current state, and the details and capabilities needed to manage IoT data and maximise value. Uncover results from one expert's survey, which revealed the areas organisations in which struggle and hope to improve upon regarding their data management capabilities.

  • The Finer Points of Embedded Software and IoT

    Sponsored by: SearchSOA.com

    IoT development projects must have fewer mistakes than other projects, and developers working with embedded systems and the cloud need to be educated on security.

  • A Practical Guide to the Internet of Things

    Sponsored by: SearchManufacturingERP

    Networked devices and the Internet of Things (IoT) offer a plethora of information for manufacturers, and this information can lead to improvements in the maintenance of machines and many other aspects of an organization.

  • Computer Weekly – 10 March 2015: A world of mobile possibilities

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we report from Mobile World Congress, the world's biggest mobility event, on the latest innovations in mobile technology. Is the outsourcing industry set to cut thousands of jobs because of increasing IT automation? And we take an in-depth look at Google Container Engine. Read the issue now.

  • Enable the Internet of Things Through Efficient API Management

    Sponsored by: Axway

    The Internet of Things can be very beneficial, but security and privacy are crucial. Since the devices in the Internet of Things rely on APIs to communicate, the management of these APIs is also crucial. Access this white paper key to learn how to enable the Internet of Things through efficient API management implemented with speed and security.

  • Case Study: Storebrand Choose API Software to Secure Communications

    Sponsored by: Axway

    Storebrand, a leader in Nordic long-term savings and insurance, needed a platform that was flexible, easy to use, and that would enable a rapid time-to-market for new integrations.Access this case study to find out how deploying API software secured communications with partners and governed the flow of data.

  • The Internet of Things Supply Chain: Data-driven, Agile, Real-time

    Sponsored by: GT Nexus

    Learn more about the new technology driving the IoT. Read on to find out how you can provide immediate substantial benefits and create a strong foundation for your business in an environment where all parties, goods, assets, and sensors connect and communicate through the internet of things.

  • Financial Companies Can Align Strategy and Operations with Agile Business Rules Solutions

    Sponsored by: Progress

    The Internet and open communication standards have enabled us to automate the flow of information across distances and between systems. Many activities of low complexity or volatility have now been automated. However, the improvements made are incremental at best, due to an inability to streamline decision-intensive tasks.

  • Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options

    Sponsored by: Symantec Corporation

    This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.

  • Gartner: How CIOs should prepare for optimising IT in the digital economy

    Sponsored by: ComputerWeekly.com

    Gartner analyst Michael Smith argues that CIOs should adopt a dual approach to supporting the enterprise's transformation to the digital economy.

  • Why and How You Should Use a VPN

    Sponsored by: Global Knowledge

    This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.

  • NSA insiders reveal what went wrong

    Sponsored by: ComputerWeekly.com

    Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.

  • Air Transport Industry Insights 2014

    Sponsored by: ComputerWeekly.com

    This report from SITA looks at the impact of business intelligence on airlines and airports.

  • Secure internet routing

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.

  • Presentation: City & Guilds unified communication stragey

    Sponsored by: ComputerWeekly.com

    Ian Turfrey, IT director at City & Guilds, explains how unified communications technology has transformed the qualifications awarding body in this presentation .

  • The Digital Enterprise

    Sponsored by: ComputerWeekly.com

    Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.

  • Inspiring disruption: Tech Trends 2014

    Sponsored by: ComputerWeekly.com

    This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.

  • Apps Revolution

    Sponsored by: ComputerWeekly.com

    This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.

  • Computer Weekly Special Report: Fujitsu

    Sponsored by: ComputerWeekly.com

    This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.

  • Accenture Technology Vision 2014

    Sponsored by: ComputerWeekly.com

    The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.

  • Global Risks 2014

    Sponsored by: ComputerWeekly.com

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • Internet-Scale Identity Systems:An Overview and Comparison

    Sponsored by: Ping Identity Corporation

    This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.

Browse by Report Type: Internet White Papers | Internet Multimedia | Internet IT Downloads

See more topics related to: Internet

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.