Research Library

Powered by

All Research

  • Colocation Cloud Interconnection Requires a Purposeful, Planned Approach

    Sponsored by: Equinix

    Dive into this Gartner report to find suggestions and strategic advice on how to stitch together a colocation and cloud interconnection plan that ensures scalability, accounts for contingency factors, and negates any unplanned interruptions.

  • ITIL V4: Intro to the 2019 ITIL Update

    Sponsored by: BMC

    Dive into this article to find out what's new within the fourth iteration of ITIL, including the most recent batch of certifications, and find out what's changed since the V2 and V3 editions.

  • Achieving Secure Authentication and Zero-Trust Security Without Agents or Proxies

    Sponsored by: Silverfort

    Silverfort can enable organizations to enforce secure authentication – including MFA, adaptive authentication and zero trust – without deploying software agents or proxies. Tune into this webinar to learn more.

  • Computer Weekly – 16 July 2019: Reaping the benefits of digital transformation at Defra

    Sponsored by:

    In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.

  • Scality RING Hybrid Cloud Data at Scale

    Sponsored by: Scality

    To unlock the ability to run petabyte-scale, data-rich services like web applications, VOD, active archives, compliance archives, and private and hybrid clouds, download this datasheet. It explains how software-defined storage can streamline and simplify hybrid cloud data management.

  • 5 Reasons Why Marketing Automation Software Implementations Fail

    Sponsored by: Act-On Software

    Marketing automation can be a game-changer when it comes to driving conversions and improving ROI. But, it's not as simple as implementing a strong platform. Read this resource for 5 common obstacles to successful marketing automation implementation—and how to overcome them.

  • The Risk Initiative: Building a Business Case with Mitigation ROI

    Sponsored by: Cyber-Ark Software

    CyberArk launched a multi-part research project "The Risk Initiative: Building a Business Case with Mitigation ROI" which is designed to investigate how cybersecurity professionals can mature their programs to move towards ROI-centric decision-making. Download this research report to explore key findings.

  • Marketing Personalization Strategies You Might Be Missing

    Sponsored by: Act-On Software

    The entry point for revenue-driving personalization isn't as hard to reach as you might think—if you have a website, a CRM tool and an adaptive marketing platform, then you have a wide array of marketing personalization opportunities available. Read this resource to learn more.

  • Where Security Accountability Stops and Starts In the Public Cloud

    Sponsored by: Cyber-Ark Software

    Whether in the cloud or on-premises, credentials are vital to secure and manage. It is especially important to protect privileged credentials because they allow the escalation of privileges within the cloud infrastructure. In this white paper, learn why a privileged access security strategy is key to protecting critical data in the cloud.

  • The Truth About Cognitive and AI

    Sponsored by: BMC

    AI and cognitive technologies are finally ready to shed their sci-fi associations and make an impact on day-to-day business and IT operations, and companies are eager to dive in. Inside, find out why IT service management might be the best place to get started.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.