ComputerWeekly.com Research Library

Powered by Bitpipe.com

Microsoft Office Research

  • Solve Migration, Security, and Productivity Challenges Around Office 365

    Sponsored by: Citrix

    Listen to this webcast to uncover the security and productivity challenges associated with Office 365 migrations and how to overcome them.

  • Backup for Office 365: SharePoint Demo

    Sponsored by: Spanning Cloud Apps

    Data loss happens to everyone. It hurts the most when it happens to mission-critical data, but it isn't a big deal when you have appropriate backups in place. This 3 minute video demonstrates how you can quickly find and restore lost SharePoint data directly into Office 365, as well as automate backup and recovery.

  • Best Practices for Migrating to Exchange 2016 and Office 365

    Sponsored by: Quest

    To help you deliver a seamless, efficient transition to Exchange 2016 and Office 365, this paper illustrates eight critical steps you should follow. Access now to proceed with confidence and position your organization for success, with instruction on normalizing Azure Active Directory, and more.

  • Building Effective Azure Active Directory Practices

    Sponsored by: Quest

    In this white paper, you'll examine a four-phase plan for developing effective Azure Active Directory security, focusing in particular on the first phase—continual assessment. Read on to learn how to perform continual assessments of role membership, security verification methods, groups, and more.

  • Surviving Migration to Office 365

    Sponsored by: Quest

    You have decided to adopt Office 365 and need to transition to the cloud. This guide outlines the processes you will need to follow in order to prepare for and execute migration. It also covers key considerations to make sure your company makes the most out of its cloud deployment.

  • Case Study: Berry Bros. & Rudd

    Sponsored by: Centrality

    As today's workforce becomes more geographically-dispersed, you need to find a way to ensure that your employees are all working with the same tools. Access this case study to learn how to enable smooth collaboration and productivity no matter where your employees are located.

  • Computer Weekly – 12 September 2017: IT transformation takes the lead at Dogs Trust

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the head of IT at Dogs Trust discusses their use of cloud computing and data analytics. We also look at the societal challenges of AI and investigate how to get a good deal on Office 365. Plus our buyer's guide checks out DevOps tools. Read the issue now.

  • Code Red: You've Been Infected

    Sponsored by: Codero

    WannaCry ransomware targets Microsoft Windows operating systems. Check out this e-book to uncover steps you can take to mitigate WannaCry damage.

  • How to Stop your Microsoft Office 365 users from getting hooked by Credential Phishing

    Sponsored by: Proofpoint, Inc.

    Credential phishing is targeting Microsoft Office 365 users more than ever before. Check out this resource to discover how to protect your email account.

  • Computer Weekly – 22 August 2017: How banking technology has changed since the crash

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, 10 years after the financial crash, we examine how banking technology has changed. We look at how the EU's new data protection laws will affect storage strategies. And we ask if the cryptocurrency boom will remain a niche pursuit or can bring benefits for enterprise IT. Read the issue now.

  • Virtual Desktop-Centric IT Platform Overview

    Sponsored by: Nerdio

    Desktop virtualization guru Gabe Knuth sits down with Vadim Vladimirskiy, co-founder and head of Nerdio for a laid back chat that covers everything from virtual desktops and golden images to IT-as-a-Service. See what goes into planning a successful desktop-as-a-service offering and how to migrate to a virtual desktop-centric IT platform.

  • 4 Ways to Reduce the Risk of Ransomware

    Sponsored by: Citrix

    In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for 4 best practices to protect yourself from this costly threat.

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

  • Computer Weekly:Global Ransomware Attack Could Be a Security Wake-Up Call

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.

  • Migration to Exchange Online and Office 365: A Step-by-Step Guide

    Sponsored by: Quest

    Migrating to Office 365 and Exchange? If you haven't been part of a previous migration to Office 365, then you've got a steep learning curve ahead of you. Don't fret! Let this white paper be your guide as it takes you step-by-step and breaks down each step into its basic components to give you a smooth transition.

  • Computer Weekly – 21 February 2017: How to develop mobile apps for business

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide examines the emerging innovations and best practice in mobile app development. We find out how Microsoft and Amazon are opening up their artificial intelligence tools to developers. And GE's CIO discusses the digital transformation of one of the world's industrial giants. Read the issue now.

  • 5 Ways to Cut Spending on Microsoft Software

    Sponsored by: Snow Software

    Enact five cost-saving initiatives for Microsoft products using the Software Asset Management (SAM) processes and technologies outlined in this guide. Download now to avoid the pitfalls of overspending with a software license manager that automates the removal of unused applications, and more.

  • How Microsoft Aims to Tackle Information Overload

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

  • Artificial Intelligence Meets Enterprise Collaboration Systems

    Sponsored by: SearchContentManagement

    This expert handbook explores the different AI flavors in collaboration platforms and how they can help you optimize reporting and analytics. Learn more about how Microsoft, Salesforce, and Oracle are folding AI into collaboration and which platform fits your organization's needs best.

  • 5 Reasons for an Office 365 Hybrid Deployment

    Sponsored by: Zscaler

    If you are dealing with older versions of Exchange Servers, there are regulatory and technical obstacles making it harder to move to the cloud. This is where an Office 365 hybrid deployment comes in handy. This e-guide covers five key reasons to implement an Office 365 hybrid deployment.

  • VMware Workspace™ ONE™ and Microsoft Office 365: Enabling More Secure Collaboration

    Sponsored by: VMware

    Despite its promise of anytime-anywhere collaboration, Office 365 poses meaningful adoption and security concerns for the IT organization. In this white paper explore how you can address these concerns and enable the secure use of Office 365 across corporate-owned devices, personal devices, or unmanaged devices in 3 steps.

  • Leveraging Office 365 with VMware AirWatch®

    Sponsored by: vmware airwatch

    As enterprises embrace adoption of Microsoft Office 365,  achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how an enterprise mobility management tool easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data security.

  • Network Design Best Practices for Office 365: An Expert Report

    Sponsored by: Riverbed Technology, Inc.

    Unfortunately, many organizations transitioning from on-premises Microsoft apps to Office 365 will experience performance problems. Download this Gartner report to minimize network and app performance issues by optimizing the infrastructure to support O365, with the guidance outlined here.

  • Exchange 2016 Upgrade Outlined and Considerations for Your Recovery Plan

    Sponsored by: Riverbed Technology, Inc.

    This expert guide illustrates five migration issues that IT admins must tackle in order to upgrade to Exchange 2016 without adversely affecting end users. Additionally, read on to formulate a recovery plan for Office 365 outages by asking yourself the seven essential questions outlined here.

  • Infographic: 6 Companies Leverage Office 365

    Sponsored by: Microsoft

    This brief but informative impact gets to the heart of why six companies chose Office 365 to become more agile, productive, and scalable. Uncover impressive statistics that reveal how this suite of tools enables business growth.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.