ComputerWeekly.com Research Library

Powered by Bitpipe.com

ARP Research

  • 2021 Top Sd-Wan Edge Trends

    Sponsored by: Silver Peak

    SASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • A Computer Weekly buyer’s guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Border Gateway Protocol: The Roadmap to the Internet

    Sponsored by: AppNeta

    Monitoring BGP data gives enterprise IT visibility into the high-level networks and Autonomous Systems that an app may traverse on its path to delivery. In this white paper, learn how AppNeta helps teams put this data to use.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: SearchSecurity.com

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • Focus: Network security

    Sponsored by: ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • Four Dimensions of Network Monitoring

    Sponsored by: AppNeta

    Your network spans multiple cloud providers, third-party services, and an always-growing web of remote locations. Does your team have the comprehensive visibility to tie it all together? Download this quick checklist to ensure that you have all the data and insights you need to manage your network effectively.

  • HOW IT DECISION-MAKERS ARE RESPONDING TO COVID-19

    Sponsored by: Aruba Networks

    As the world moves toward a hybrid workplace (employees in between office and remote), IT investments and therefore IT consumption are set to change drastically on a global scale across all industries. Want to see the numbers? View this in-depth report.

  • Achieving SaaS Security with Connected® Online PC Backup

    Sponsored by: Iron Mountain

    This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.

  • Adaptive Packet Filtering

    Sponsored by: Gigamon

    This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.

  • An Introduction to Quantum Lifecycle Management

    Sponsored by: ComputerWeekly.com

    This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.

  • Built-in Self-test (BIST) Using Boundary Scan

    Sponsored by: Texas Instruments, Inc.

    This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.

  • Business Continuity Management Systems

    Sponsored by: ComputerWeekly.com

    Brush-up you knowledge of the practical aspects of business continuity management with this book extract.

  • Cisco Intercompany Media Engine for Dummies Section 1: SIP Alone Doesn't Cut It

    Sponsored by: Cisco Systems, Inc.

    To help address the many questions about the Cisco Intercompany Media Engine, Wade Hamblin and Hakim Mehmood from the product team will post a "for Dummies" blog every 2 weeks to explain the basics and help you understand what it is, how it works, and why you should care.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Demystifying IT Network Cabling Specifications from 5e to 7A

    Sponsored by: Siemon Company

    This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.

  • Dirk Hohndel on Intel and the Linux Foundation

    Sponsored by: Intel

    In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

  • Dual Stack Network

    Sponsored by: Cisco Systems, Inc.

    In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.

  • E-Book: Standardizing Business Continuity

    Sponsored by: IBM

    Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

  • Ericom Blaze — RDP Acceleration

    Sponsored by: Ericom Software

    Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.

  • Extreme Networks Solution with NEC

    Sponsored by: Extreme Networks

    Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.

  • Facilitating “sound practices” in risk management with IBM OpenPages ORM

    Sponsored by: IBM

    This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.

  • From Development to Production: Streamlining SharePoint Deployment with DocAve® Deployment Manager

    Sponsored by: AvePoint, Inc.

    This document examines the capabilities of DocAve Deployment Manager and offers tips and guidance to help streamline the SharePoint deployment process while maintaining the integrity of all SharePoint staging instances.

  • Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals

    Sponsored by: Enterprise Management Associates (EMA)

    Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.

  • Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value

    Sponsored by: Accenture

    Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.

Browse by Report Type: ARP White Papers | ARP Multimedia | ARP IT Downloads

See more topics related to: ARP

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences