Research Library

Powered by

IT Management Multimedia

  • Clients and Experts Share Premium Cloud Secrets

    Sponsored by: IBM

    Today's customers demand the best possible experience when they interact with your product, be it flawless availability or higher performance speeds. So why not give it to them? In this webinar, learn how your business can make the most out of the cloud from both providers and clients.

  • Manage with Speed and Simplicity on the Go

    Sponsored by: Serviceaide

    Outages and other problems in your enterprise can spring up anytime, meaning IT has to be ready at all times. Learn how an intelligent virtual support agent can take your mobile ITSM management tools to the next level with the power of artificial intelligence.

  • Successful Integration Through a Managed Service

    Sponsored by: Estafet Ltd

    Integrating new technology into your environment can be tricky, requiring knowledge of design best-practices and the skills to utilize integration tools. Learn more about how an expert-managed integration service can help your business find success in its integration projects.

  • Juniper Networks vSRX Virtual Firewall

    Sponsored by: Juniper Networks

    Do you want to ensure secure connectivity and protection for your Azure workloads? A virtual firewall may be the answer your enterprise is seeking. Learn more about a Next-Generation Firewall solution on Azure can upgrade your enterprise's security capabilities.

  • Five Steps for Digital Transformation Success

    Sponsored by: FixStream

    As your business zeros in on its digital transformation strategy, there are a lot of factors that can determine its success. In this webinar, learn in-depth about five critical steps your business should adhere to, and how your business can use them to successfully grab digital transformation by the horns.

  • Keeping Your Datacenter Up with Change

    Sponsored by: Rackspace

    As IT environments evolve, many companies are leveraging cloud platforms to support their increasing data needs. Discover how a cloud hosting solution can elevate your datacenter infrastructure and keep your enterprise on the cutting edge.

  • Machine Learning with Apache Spark

    Sponsored by: IBM

    This in-depth webcast explores how the high memory bandwidth and high-compute capabilities of GPUs make them ideal for accelerating I/O intensive Spark workloads. Click inside now to learn the 3 approaches to Spark acceleration, as well as some of pros and the cons of this process.

  • 3 Life Hacks for Rationalizing your Application & Technology Portfolios

    Sponsored by: Mega International

    When streamlining your IT portfolio your goal is to free up budget for new initiatives, and you need an efficient method of doing so. This webcast covers three life hacks to help you work smarter, not harder, when engaging in an IT portfolio rationalization project.

  • The Business of IT Transformation

    Sponsored by: Rackspace

    Tune into this webcast to hear from the CIO and Digital CTO at Rackspace, who in detail dissect the term "digital transformation" and highlight the challenges driving businesses like yours to the cloud. They also run down an actionable cloud implementation checklist, for you to use as guidance.

  • Continue to Transform or Risk Being Disrupted

    Sponsored by: Rackspace - AWS

    In this webinar, you'll see how Redbox evolved their IT methodologies in order to disrupt the movie rental industry. Tune in to learn how data center consolidation, limiting data sprawl, reducing licensing expense and more, factored into Redbox's dynamic digital transition.

  • On-Demand Analytics Webinar

    Sponsored by: IBM

    Watch an IBM webinar to learn how you can put your most valuable data to work in analytics.

  • Stop Living in the Past: A New Approach to Application Security

    Sponsored by: Veracode, Inc.

    This webcast will discuss how organizations should evolve their security strategies as users and apps become the risk focal point. Watch to learn how.

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    This webcast outlines the steps most of Veracode's customers take to develop a mature application security program and provides more information on mature AppSec programs.

  • The ROI of AppSec: Getting your Money's Worth from Your AppSec Program

    Sponsored by: Veracode, Inc.

    This video will take a look at the real costs of fixing vulnerabilities and how to maximize the ROI of your application security program.

  • Be the Champion of Security in a DevOps World

    Sponsored by: Veracode, Inc.

    Watch this Infosecurity Magazine webinar to learn how to become a champion of security with DevOps.

  • Securing the Enterprise in a DevOps World: Keynote & Panel

    Sponsored by: Veracode, Inc.

    Watch this roundtable discussion about the pitfalls and successes of the DevOps initiative organizations run into and much more.

  • You Can Get There From Here: The Road to Secure DevOps

    Sponsored by: Veracode, Inc.

    In this webcast, learn a basic understanding of Waterfall, Agile and DevOps from a people, process and technology point of view, how Security can best be integrated into DevOps and more.

  • Getting Started with Secure DevOps

    Sponsored by: Veracode, Inc.

    Watch this video to learn how DevOps can impact security and how to make the development process secure as well.

  • Your Chance to Get It Right: Five Keys to Building AppSec into DevOps

    Sponsored by: Veracode, Inc.

    Watch this webcast to learn five key factors of building code securely from the beginning.

  • Automating Your Corporate Mobility Management

    Sponsored by: Cisco Jasper

    In this webcast, discover how the mobile workforce is impacting corporate mobility management needs, and costs, and how enterprises are addressing this challenge with an automated mobility management platform.

  • Vident Health: More Than the Sum of its Parts

    Sponsored by: McAfee, Inc.

    Find out how Vident Health overcame alert overload and enabled an innovative, patient-focused environment.

  • Kinetic IT

    Sponsored by: McAfee, Inc.

    Hear from Kinetic IT's Security Service Director on the successful fourteen year partnership with McAfee.

  • Evolution of the Security Operations Center

    Sponsored by: McAfee, Inc.

    Hear an overview on how SOC is defined within the industry, a history of SOCs and model options for your organization.

  • Defeat the Grey

    Sponsored by: McAfee, Inc.

    Find out how to cut through mountains of grey to actionable information that improves response time and efficiency.

  • Reduce Insider Threats Risk Through End User Empowerment

    Sponsored by: McAfee, Inc.

    Employees are a giant risk to your most sensitive data. Reduce the risk by educating users on the three best practices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.