Research Library

Powered by

All Research

  • Why Lendlease is embracing digital twin technology

    Sponsored by:

    Find out how Australia-based property developer Lendlease is using digital twins and other technologies to break the bulwark of rising costs and declining productivity in the construction sector.

  • DoorDash: Remote Vendor Access Security Goes Out the Window

    Sponsored by: CyberArk Software, Inc

    In the wake of a massive data breach that affected nearly 5 million stakeholders, DoorDash, a food delivery service, was in need to a remediation plan. Read this case study to discover what led to the breach, and the 4 actionable steps DoorDash implemented for reducing the risk of remote vendor access.

  • Introducing CyberArk Alero: Reduce Risk from Remote Vendors

    Sponsored by: CyberArk Software, Inc

    Yesterday’s VPNs, passwords, and other remote access security tools no longer provide adequate protection against today’s threats. In this blog post, get an inside look at CyberArk’s Alero offering, designed to address the risks associate with remote access using zero-trust, biometrics and just-in-time provisioning.

  • Hitachi Early to Market with a Bespoke HCI Solution Built Around NVMe and Storage-Class Memory

    Sponsored by: Hitachi Vantara

    One major use case for NVMe technology will be a hyper-converged infrastructure as they are easy to purchase and scale out. Access this white paper to learn about an HCI architecture built around a web-scale design using x86-based server nodes with a local storage connected across a high-speed switched fabric.

  • Infographic: Gartner AI and compliance spending forecast

    Sponsored by:

    More than 60 jurisdictions around the world have proposed or are drafting postmodern privacy and data protection laws as a result. This infographic shows Gartner AI and compliance spending forecast.

  • The Autonomous Customer 2020: Still Phoning, Still Emailing… But Ready for AI

    Sponsored by: BT

    A recent survey by British Telecommunications found that nearly 90% of consumers said they would like organizations to always offer a varying array of channels to meet their needs. Download this Autonomous Customer report to review more results from BT’s research, and explore the 5 major CX trends they identified for 2020.

  • The Cloud Adoption Journey in 5 Steps

    Sponsored by: Cloudreach Inc.

    According to Gartner’s research, by 2022, 70% of organizations will have a formal cloud strategy. How do you get everyone in your organization or your team on board? This guide offers 5 steps to follow for your cloud adoption journey, starting with getting your organization on the same page when it comes to cloud strategy. Read the guide now.

  • Raise Your Business to New Heights with a Cloud Phone System

    Sponsored by: LogMeIn, Inc.

    It’s clear that the cloud is the new normal for businesses. Phone systems are no exception, although the motivation to move this service to the cloud will become more of a necessity than a trend in the future. In this white paper, learn how you can future-proof your organizations by moving your phone system to the cloud.

  • UK’s Leading Secure Hybrid IT Provider

    Sponsored by: Pulsant

    Learn about Pulsant, the UK’s leading secure hybrid cloud provider and their network of data centers designed to deliver hybrid IT services tailor fitted to your organization’s needs – regardless of industry.

  • Safeguarding New Zealand’s Power and Telecoms Network

    Sponsored by: Nozomi Networks

    Learn how Nozomi Networks delivered OT visibility, threat detection and insight to a leading New Zealand power, gas, broadband and phone company.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.