Research Library

Powered by


  • HPE's Storage Portfolio: A Comprehensive Overview and Guide for Partners

    Sponsored by: Arrow and HPE  | Premiered: Sep 28, 2023

    Along with presenting a comprehensive overview of HPE’s storage portfolio, this webcast can serve as a guide for partners. Watch now to unlock these storage insights.

  • RUCKCast #73: The Evolution that is RUCKUS One

    Sponsored by: Ruckus Wireless  | Premiered: Sep 27, 2023

    For an introduction to a new AI-driven cloud platform, tune into this episode of Ruckus Networks’ podcast, RUCKCast.

  • The Complexities of APACs Threat Landscape - Part 1

    Sponsored by: Rapid7  | Premiered: Sep 27, 2023

    In the first of a two-part series, join an expert panel as they discuss the challenging and evolving threat landscape in the Asia Pacific region. The panel shares their views as to how Asia Pacific fares up against other global regions in cyber awareness, and the heightened discussions in government policy to combat threat actors.

  • RUCKCast #74: RWG - The New Dog On The Block

    Sponsored by: Ruckus Wireless  | Premiered: Sep 27, 2023

    For enterprises and service providers, having powerful network services is the key to attracting and retaining more customers. To do that, you need a purpose-built network that offers complete connectivity, robust security and efficient management. Today, there is a new solution that can provide all of that. Listen to this podcast to learn more.

  • Couchbase Cluster demo with Red Hat OpenShift and Twitter

    Sponsored by: Red Hat and Couchbase  | Premiered: Sep 27, 2023

    In this product demo, you will learn how to configure a multi-node Couchbase Cluster and deploy an app that consumes Tweets from Twitter with specific hashtags. Tune in to learn more.

  • Backup and DR for Databases on OpenShift with Gaurav Rishi & Michael Courcy

    Sponsored by: Red Hat & Veeam  | Premiered: Sep 26, 2023

    This webcast takes a deep dive into backup and disaster recovery for databases on OpenShift, and specifically how Kasten by Veeam can assist in those efforts. Tune in to learn how you can leverage the solution to enhance backup and restore, disaster recovery, and application mobility for your IT environment.

  • RUCKCast #68: Choose Your Own CloudPath

    Sponsored by: Ruckus Wireless  | Premiered: Sep 26, 2023

    To learn about augmenting your organization’s network access security, tune into this episode of Ruckus Networks’ podcast, RUCKCast.

  • Discussing our first annual cyber extortion report

    Sponsored by: Orange Cyberdefense  | Premiered: Sep 23, 2023

    Cyber extortion (Cy-X) is a form of cyberattack in which the security of a digital asset is compromised and exploited in a threat in order to extort payment. This webcast presents the research and findings of the first addition of Orange Cyberdefense’s Cy-Xplorer Cyber Extortion Report. Tune in now to learn more.

  • Modern & Secure App Transformation with Red Hat OpenShift & Kasten K10

    Sponsored by: Red Hat & Veeam  | Premiered: Sep 23, 2023

    As more businesses utilize containerized apps, they also need to deliver the same enterprise-level SLAs and compliance requirements as legacy applications. Tune into this webcast to learn the importance of cloud-native principles in containerized app protection and why complete cluster disaster recovery is vital to maintain app availability.

  • Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1

    Sponsored by: Mandiant  | Premiered: Sep 22, 2023

    Organizations of all sizes must test and measure the effectiveness of their cybersecurity for compliance reasons, security operations, and more. However, exactly when and how to do it can be confusing for some, which is why this video explains the best practice methodologies to accomplish that task. Watch this video to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.