ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet White Papers

  • Aligning Strategy and Operations in the Face of Change

    Sponsored by: Progress

    The Internet and open communication standards have enabled us to automate the flow of information across distances and between systems. Many activities of low complexity or volatility have now been automated. However, the improvements made are incremental at best, due to an inability to streamline decision-intensive tasks.

  • La-Z-Boy Incorporated

    Sponsored by: Zscaler

    This case study describes how La-Z-Boy partnered with Zscaler to reduce bandwidth costs and complexity while increasing the visibility of web activity.

  • Web-Scale 101

    Sponsored by: Nutanix

    Cloud computing breaks down technology silos and removes most of the complexity of monolithic architectures. Despite the cloud's benefits, some consumer Internet vendors are taking a new approach to IT infrastructure, web-scale IT, which allows companies to achieve better business agility and predictable scale while lowering TCO.

  • Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options

    Sponsored by: Symantec Corporation

    This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.

  • The Internet of Things: A CISO and Network Security Perspective

    Sponsored by: Cisco

    This exclusive whitepaper dives head first into the realities of the Internet of Things, including the security considerations that go along with it.

  • The Time to Optimize ERP is Now

    Sponsored by: Automic

    Find out what new ways to meet demand CIOs and application and operations teams are considering in order to facilitate growth, agility and maintain compliance during a time of the Internet of Things.

  • Gartner: How CIOs should prepare for optimising IT in the digital economy

    Sponsored by: ComputerWeekly.com

    Gartner analyst Michael Smith argues that CIOs should adopt a dual approach to supporting the enterprise's transformation to the digital economy.

  • Why and How You Should Use a VPN

    Sponsored by: Global Knowledge

    This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.

  • NSA insiders reveal what went wrong

    Sponsored by: ComputerWeekly.com

    Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.

  • Air Transport Industry Insights 2014

    Sponsored by: ComputerWeekly.com

    This report from SITA looks at the impact of business intelligence on airlines and airports.

  • Secure internet routing

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.

  • Presentation: City & Guilds unified communication stragey

    Sponsored by: ComputerWeekly.com

    Ian Turfrey, IT director at City & Guilds, explains how unified communications technology has transformed the qualifications awarding body in this presentation .

  • The Digital Enterprise

    Sponsored by: ComputerWeekly.com

    Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.

  • Inspiring disruption: Tech Trends 2014

    Sponsored by: ComputerWeekly.com

    This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.

  • Apps Revolution

    Sponsored by: ComputerWeekly.com

    This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.

  • Computer Weekly Special Report: Fujitsu

    Sponsored by: ComputerWeekly.com

    This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.

  • Accenture Technology Vision 2014

    Sponsored by: ComputerWeekly.com

    The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.

  • Global Risks 2014

    Sponsored by: ComputerWeekly.com

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • CW500:Future Gazing 2020 (II)

    Sponsored by: ComputerWeekly.com

    Professor Victor Newman, author, advisory board member and mentor at Social Innovation Lab Kent (Silk), gives his take on the future of the IT department in 2020.

  • Applying the Four Standards of Security-Based CIA

    Sponsored by: Global Knowledge

    High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats.

  • Protecting Your Website With Always On SSL

    Sponsored by: Symantec Corporation

    This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.

  • Smart Grid and the Internet of Things

    Sponsored by: ComputerWeekly.com

    Rob McNamara, executive director of SmartGrid GB, tells the story behind the UK's Smart Meter project in this presentation.

  • Internet-Scale Identity Systems:An Overview and Comparison

    Sponsored by: Ping Identity Corporation

    This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.

  • The Great Firewall of China? How to address the specific challenges of reaching China with your website

    Sponsored by: CDNetworks

    This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.

  • IPv6 Addressing Plan Basics

    Sponsored by: Infoblox

    Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!

Browse by Report Type: Internet White Papers | Internet Multimedia | Internet IT Downloads

See more topics related to: Internet

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.