ComputerWeekly.com Research Library

Powered by Bitpipe.com

Synchronous Digital Hierarchy Research

  • How Distributed Enterprise Networks are being Re-Architected in the Age of Cloud

    Sponsored by: Apcela

    The mainstream adoption of cloud-based services has caused enterprises to reconsider how their networks are architected. Legacy designs that focused on the data center no longer reflect the distributed nature of enterprise applications and services. Read this IDC report to learn how distributed enterprise networks are being re-architected.

  • HOW IT DECISION-MAKERS ARE RESPONDING TO COVID-19

    Sponsored by: Aruba Networks

    As the world moves toward a hybrid workplace (employees in between office and remote), IT investments and therefore IT consumption are set to change drastically on a global scale across all industries. Want to see the numbers? View this in-depth report.

  • How SSL-Encrypted Web Connections are Intercepted

    Sponsored by: SearchSecurity.com

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

  • How to enhance your network for the future

    Sponsored by: ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • How to Proactively Monitor and Troubleshoot Microsoft Teams Performance

    Sponsored by: ThousandEyes

    Now that teams are more distributed than ever, collaboration platforms like Microsoft Teams have become key to remaining productive. How can you ensure your workers are getting the best end user experience from these key resources? Leverage this webinar to learn how you can gain end-to-end visibility of the service delivery path for Teams.

  • Improve BYOD with the Bonjour Protocol

    Sponsored by: Aerohive Networks

    This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.

  • Intent-Based Networking: Building on the Power of the API

    Sponsored by: Apcela

    Intent-based network (IBN) systems hold the promise of finally meeting enterprise needs, delivering on the promise of self-configuring and optimizing networks that technology companies have been making for years. In this white paper, examine the trends driving interest in IBN systems along with a description of the elements of these systems.

  • Network Management for IP-based Networks

    Sponsored by: Beta Systems

    In this white paper, explore a high-level introduction to network management in the Auconent Business Infrastructure Control Solution (BICS) for office and industrial networks.

  • Networking as the enabler of digital transformation

    Sponsored by: Business nbn

    Greater uptake and deployment of cloud-based services, data storage, analytics and other digital elements are driving new ways of working. However, if businesses are without underlying communications infrastructure that can support these new methods, they’re risk falling behind. Read this white paper to learn how to stay ahead of the curve.

  • Next Generation Network Management Techniques

    Sponsored by: SearchSecurity.com

    The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!

  • Open Trusted Technology Provider Standard (O-TTPS)

    Sponsored by: ComputerWeekly.com

    This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.

  • Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals

    Sponsored by: Enterprise Management Associates (EMA)

    Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.

  • Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value

    Sponsored by: Accenture

    Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.

  • How to Save Time and Money Making Your Transition to IPv6

    Sponsored by: Cisco Systems, Inc.

    This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks.

  • IBM Rational Build Forge Demos

    Sponsored by: IBM

    Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.

  • IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments

    Sponsored by: Texas Instruments, Inc.

    This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.

  • IFRS in the Life Sciences: Broad implications

    Sponsored by: Deloitte

    This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.

  • Industry Intelligence: International Financial Reporting Standards for Hedge Funds

    Sponsored by: Advent Software, Inc

    This paper introduces hedge funds and hedge fund service providers to IFRS.

  • IPv6 Addressing Plan Basics

    Sponsored by: Infoblox

    Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!

  • IPv6: The Next IP Standard

    Sponsored by: AT&T Corp

    With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • Key Considerations for MPLS IP-VPN Success

    Sponsored by: XO Communications

    Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!

  • One Click Away: Where Does the Data Come From?

    Sponsored by: LANSA

    Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.

  • OpenFlow and SDN: What's in Store?

    Sponsored by: Big Switch Networks

    This expert e-guide explores the top factors driving the adoption of OpenFlow and software-defined networking (SDN) technology in the campus network, as well as the benefits you can realize with this strategy – including improved security, effective BYOD management, and more.

  • Optiview Network Analyzer -- Free Hardware Trial

    Sponsored by: Fluke Networks

    IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences