Research Library

Powered by

Application Infrastructure White Papers

  • API Design Best Practices

    Sponsored by: Red Hat

    This white paper can help developers and application architects understand the differences between designing applications to use lightweight APIs versus more traditional methods. Uncover the advantages to both technologies.

  • Why Integration?

    Sponsored by: Red Hat

    IDC analyzed the business value that six surveyed organizations are realizing through their use of one integration product. Learn about the average monetary benefits experienced by these companies, and how to achieve interoperability between applications.

  • Flytoget Finds New Opportunities with a Modern Infrastructure

    Sponsored by: Red Hat

    Learn how to leverage a cloud-based, API management platform to facilitate IT and application infrastructure modernization. Access this case study to achieve more intelligent integration and promote collaborative innovation with this platform.

  • Why Integrating a Hybrid Environment is Now a CIO Core Competency

    Sponsored by: Attenda

    In this expert e-guide, we explore how various CIOs have successfully architected efficient hybrid IT environments. Discover how they leveraged APIs to integrate legacy apps and processes, used master data management to move data between systems, and more.

  • Migrate from Oracle Jcaps to Red Hat Jboss Fuse with Red Hat Consulting

    Sponsored by: Red Hat

    As Oracle Java Composite Application Platform Suite (CAPS) nears the end of its life cycle, healthcare organizations are switching to Red Hat JBoss Fuse. In this datasheet, learn how Red Hat Consulting can guide your business through the transition with a mentor-based approach that considers people, processes, and technology.

  • Mobility Fuels Productivity Gains for Energy and Utilities

    Sponsored by: Red Hat

    Download this e-book to mobilize your enterprise with strategic mobile asset and workforce management. By reading on, you will learn 6 core strategies for mobile app development, including instruction on how to make use of device-specific functionality and integrate with multiple existing systems and domains.

  • Level Up With LinuxOne

    Sponsored by: EOH IBM

    Is it time to take your apps to the next level? Find out the benefits of the new IBM LinuxONE Rockhopper and discover if this server is right for your organization.

  • The Hidden Costs of ERP Customizations

    Sponsored by: Infor

    Customizations for enterprise resource planning (ERP) and business applications are becoming less useful and threaten to widen the functional gaps they were supposed to help bridge. Access this white paper to discover the hidden costs of ERP customizations and learn how to transition into the next generation of app personalization.

  • Hosting Provider Elastx Transforms App Lifecycle Management with Scale-out Storage

    Sponsored by: NetApp SolidFire

    Avoid the performance variability challenges of legacy storage systems. Read this case study to discover how Elastx transformed their cloud hosting performance, eliminated I/O bottlenecks and the need for legacy SAN, and improved customer loyalty with the implementation of scale-out all-flash storage.

  • Journey to Agility: Why You Need a Cloud Management Platform

    Sponsored by: VMware

    Adopting a combination cloud solution might be the answer to your agility need. This white paper assess some of the challenges IT departments are facing, and more about how a cloud management platform can provide a unified approach to managing and monitoring your infrastructure and applications.

  • How To Build An Enterprise Application Security Program

    Sponsored by: Symantec + Blue Coat

    Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.

  • The Rise of Cloud-based Application Security Vulnerabilities

    Sponsored by: Symantec + Blue Coat

    While it can be beneficial to store app data in the cloud, it's causing many security concerns because of the sensitive nature of the information. Explore this e-guide to learn common vulnerabilities in cloud-based apps and best practices for properly protecting app data.

  • The CIO's Roadmap to The Cloud

    Sponsored by: Genesys

    Starting with a critical business application is the only way to truly prove the value and capabilities of doing business in the Cloud and silence the naysayers. This white paper will explore moving to the cloud by starting with a mission-critical application.

  • Best Practices For Architecting Monitorable Applications

    Sponsored by: VividCortex

    This e-book covers a variety of experiences from architects to help you find best practices to prevent app monitoring from becoming a bottleneck for your organization. Discover how to create a highly monitorable architecture for your application so you can get excellent visibility with minimal cost and effort.

  • 5 considerations when moving your appliance to the cloud

    Sponsored by: Dell, Inc.

    This informational article focus' on five things you need to consider before delivering your application via cloud. Before this transition, it is crucial to make your cloud strategy a success.

  • IDC Whitepaper: Integration is a core competency of digital transformation whitepaper

    Sponsored by: Red Hat

    This white paper produced by IDC analyses 3 focal points of digital transformation, and will help you transition existing systems, processes, organization structure, and relationships. Learn key recommendations for tackling a transformation initiative.

  • Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps

    Sponsored by: Proofpoint, Inc.

    Attackers have adapted to the mobile environment. Discover 18 examples of how curated app stores are failing to protect enterprises from malware and dangerous apps, and cannot provide compliance or privacy protection.

  • Containerization Is a Start, But Not a Solution to App Security

    Sponsored by: Proofpoint, Inc.

    In this white paper learn the myth about security containerization on personal and work devices in the era of BYOD. Discover several app-based security breach threats including: network profiling apps, VPN hijacking apps, data mining apps, and more.

  • The Packet Train Difference

    Sponsored by: AppNeta

    Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.

  • A New Approach to Network Monitoring

    Sponsored by: AppNeta

    End-user application experience monitoring has become more difficult due to cloud computing. This white paper details the challenges presented by cloud applications and an entirely new way to assess, monitor, troubleshoot and report on network performance from the perspective of applications that run on the network.

  • Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring

    Sponsored by: AppNeta

    "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.

  • Approaching Office 365 with Mobile Security

    Sponsored by: MobileIron

    Learn how your enterprise can approach securing Office 365 for mobile devices. Discover not only what needs to be done to distribute apps securely, but also protect app data-at-rest, data-in-motion, and more.

  • 7 Use Cases for Meeting Your Comprehensive Test Data Needs

    Sponsored by: CA Technologies

    Address quality and compliance challenges that arise from provisioning large copies of production data with a comprehensive test data management solution. Read on to learn 7 methods for the reduction of IT ops complexity in application delivery and in DevOps development.

  • Enterprise-grade Cloud Management for Openstack with Red Hat Cloudforms

    Sponsored by: Red Hat

    Discover how to supplement OpenStack with essential, enterprise-grade cloud management and automation, thereby accelerating implementation and improving private and hybrid cloud manageability. Read on to find out more about this migration framework that additionally enables bimodal IT.

  • How Etsy's DevOps Teams Fend off Fraudsters

    Sponsored by: BMC

    In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.