Research Library

Powered by

All Research

  • Measuring the ROI of DevOps

    Sponsored by: PagerDuty

    DevOps could help you reach continuous deployment, automated testing, decrease downtime, and much more. In this quick guide, learn how to gain executive buy-in for a DevOps adoption.

  • Modernizing IT Security with Cloud Device Computing Platforms

    Sponsored by: Google

    Learn how this modern, cloud-based device computing platform, can be an effective approach to your organization's major security challenges

  • CW Nordics August 2018

    Sponsored by:

    In April 2017 the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.

  • Computer Weekly – 21 August 2018: Delivering the potential of the internet of things

    Sponsored by:

    In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyperconverged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.

  • Disrupting Security: Revamping IT Security Through SecOps and Incident Management

    Sponsored by: PagerDuty

    Learn how SecOps is revolutionizing security management and how organizations can adopt it in order to meet the security threats of today, as well as those they'll face tomorrow. Keep your organization's name out of the next headline involving a major security breach.

  • How Veolia empowers its cloud workers to collaborate securely anytime, anywhere

    Sponsored by: Google

    Check out this blog post to learn how one company was able to empower their global workforce with cloud-based productivity apps and cloud-native devices to meet the demands of a "work anytime/anywhere" program.

  • Modern Management of Windows Devices with VMware Workspace One

    Sponsored by: VMware

    Discover ways your organization can let its employees work with the devices they want to use, within or outside of the organization, all while ensuring secure and compliant access to your organization's resources.

  • Managing Confluence at scale: navigating the high seas of growth

    Sponsored by: Atlassian

    Confluence, a collaboration software program, is used by over 40,000 customers worldwide to organize documentation, draw up project requirements, and more. Take a look at this blog to see how other Confluence admins have gone about scaling their instances to cover up to 89 separate applications.

  • Event Intelligence: Next-Gen AIOps for Every Team

    Sponsored by: PagerDuty

    Many organizations now deal with thousands, if not millions, of events taking place across their systems every day. In this e-book, learn about a new approach to AIOps that eliminates silos between event and incident management, has helped customers reduce noise on average by 98%, and supports both centralized and distributed workflows in harmony.

  • Turbo Charge Your Splunk Enterprise Deployments

    Sponsored by: Pure Storage

    Download this paper to learn how you can successfully accelerate Splunk data ingest, indexing, search, and reporting capabilities using an all-flash architecture. Results include reducing the burden on your IT team and scaling confidently and seamlessly.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.