ComputerWeekly.com Research Library

Powered by Bitpipe.com

IT ManagementWhite Papers

  • Cloud Dedicated Tearsheet

    Sponsored by: CenturyLink Technology Solutions

    Gain an understanding of the advantages and features of CenturyLink Technology Solutions' Cloud Dedicated service.

  • Ten Vital Questions Every Business Owner Should be Asking IT

    Sponsored by: Pangea Systems

    Access this white paper to learn the top 10 questions you should be asking your IT. You'll get insight into how you can improve the communication with your IT organization in order to improve alignment between IT and the business.

  • The Top 5 Security Challenges of Higher Education

    Sponsored by: Tenable Network Security

    This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.

  • Enhanced Monitoring for VMware Infrastructure

    Sponsored by: Gigamon

    Access this white paper to learn how you can deliver enhanced monitoring for your VMware infrastructure. You'll learn how this solution delivers pervasive visibility for monitoring, analysis, and security tools into the virtual environment and private cloud.

  • Visibility Into Your Virtualized Data Center

    Sponsored by: Gigamon

    Access this white paper to learn about how you can deliver increased visibility into your virtualized data center with a new solution. You'll learn how a traffic visibility layer for the standard reference data center architecture that delivers: Informed decisions based on real-time visibility, reduced expenses, and more.

  • Scale your server to suit your needs

    Sponsored by: IBM

    IBM Power Systems do not let you pay for unused server capacity. The server runs to its full potential so your business can operate with agility.

  • C&J Energy: Going Public and Outgrowing Its Infrastructure

    Sponsored by: Alert Logic

    This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.

  • The Enemy Within: The Changing Face of Threats to Information Security

    Sponsored by: Clearswift

    This white paper discusses the danger that insider threats present to your enterprise, as well as strategies for protecting your company's critical information.

  • How to Get Started on the Path to Simple, Successful Cloud Solutions

    Sponsored by: Cisco & Fujitsu

    Access this white paper to learn the key steps for cutting through the complexity of the cloud to build a sustainable IT landscape. You'll also learn the top concerns and challenges that enterprises are facing as they develop and implement their cloud strategies as well as top criteria for overcoming these complexities.

  • The Definitive Guide to Cloud Adoption

    Sponsored by: Cisco & Fujitsu

    This white paper allows you to cut through the market hype, acronyms, and buzzwords to get a clearer understanding of what the various cloud models have to offer. Read on to get best practice and practical approaches to make cloud adoption as simple and beneficial as possible.

  • HP Financial Services in brief

    Sponsored by: Hewlett-Packard Limited

    This white paper explores the investment solutions that support the transition to the updated styles of IT. Learn how these solutions can provide the flexibility for change that new technology is bringing and how it can adapt to future requirements.

  • Time for a New Colocation Provider? 5 Ways to Know for Sure

    Sponsored by: Iron Mountain

    Your data center colocation choices are of the utmost importance. The wrong choice can put you at risk of downtime, exceeding capacity, unsuccessful disaster recovery, or regulatory noncompliance. Access this resource to learn the 5 ways to know if it's time to search for a new colocation provider.

  • Security in the Hybrid Cloud, Now and in 2016

    Sponsored by: F5 Networks

    The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.

  • Cisco UCS and Intel Xeon Processors: 100 World-Record Performance Results

    Sponsored by: CISCO & INTEL® XEON® PROCESSOR

    If you are looking to get the optimal performance out of your data center processers than you should look no further than Cisco's architecture offerings, which have set performance with their first-to-market results.

  • CW Buyer's Guide to Enterprise Collaboration

    Sponsored by: ComputerWeekly.com

    In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's communications strategy.

  • Analytics in a Big Data World

    Sponsored by: ComputerWeekly.com

    This extract from Bart Baesen's book gives an overview of big data and analytics, its applications, analytic models, and job profiles in analytics, and includes a discount code for Computer Weekly readers.

  • OpenStack: The Platform of Choice for Cloud

    Sponsored by: Red Hat

    This infographic is the outcome of an IDG Connect survey of 200 US enterprise decision makers that includes adoption plans for OpenStack, the platform of choice for private cloud development and deployment.

  • The Definitive Guide to Managing Cloud Security

    Sponsored by: Cisco & Fujitsu

    This helpful book serves as a clear and unbiased guide to navigating the complexities of cloud security.

  • A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services

    Sponsored by: Fortinet, Inc.

    This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.

  • 10 Things Every IT Manager Must Know About the Enemy Within

    Sponsored by: Clearswift

    This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.

  • Cloud Migration: A Security Architect Case Study

    Sponsored by: CenturyLink Technology Solutions

    This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.

  • Rethinking People Costs in Enterprise IT

    Sponsored by: Rackspace

    In this white paper, learn how to assess your IT people spend and position IT as a central driver of business growth. Discover how to cut costs while increasing efficiency with an effective outsourcing strategy that includes a hybrid cloud environment with server virtualization.

  • Outsourcing IT Projects to Managed Hosting or the Cloud

    Sponsored by: Rackspace

    View this white paper to discover 12 critical success factors when outsourcing IT to managed hosting or the cloud.

  • Implementing Cloud Solutions Within Your Existing IT Environment

    Sponsored by: VMware, Inc.

    This paper demonstrates the extensibility capabilities of vCloud Automation Center and the skill set needed to allow IT personnel to enable, adapt, and extend their cloud to work within existing IT infrastructure and processes.

  • The MPS opportunity for SMBs

    Sponsored by: ComputerWeekly.com

    Analysts Louella Fernandes and Clive Longbottom examine the need for Managed Print Services (MPS) and how SMBs are faring as they embark on their MPS journey.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.