Subscribe: Most Popular White Papers and WebcastsManaging IT Research
http://www.bitpipe.com/rss/multi/ka_bp_manageit.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
access  cloud  computer weekly  computer  computerweekly  find  guide  learn  management  published computerweekly  published  weekly 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsManaging IT Research

Most Popular White Papers and Webcasts Managing IT Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 23 Feb 2018 13:30:15 EST

Last Build Date: Fri, 23 Feb 2018 13:30:15 EST

 



Making GRC Understandable, Actionable, and Auditable for New Regulations

Wed, 21 Feb 2018 24:00:00 EST

TBD Published by: ServiceNow



Computer Weekly – 27 February 2018: How IT is taking UPS to new heights

Fri, 23 Feb 2018 24:00:00 EST

In this week's Computer Weekly, we talk to UPS CIO Juan Perez to find out how making his IT department "business intimate" is driving innovation. We look at how cloud management platforms can help ease the adoption of multiple public cloud services. And we examine how UK local councils are struggling to deal with cyber attacks. Read the issue now. Published by: ComputerWeekly.com



Your UCaaS Checklist

Thu, 22 Feb 2018 24:00:00 EST

Evaluating UCaaS providers and cloud-based products can be overwhelming, especially as market growth continues throughout 2018. Access this e-guide to uncover 3 areas of criteria when assessing UCaaS vendors and learn how to ensure top security measures are in place, so you can embrace the many inherent benefits of UCaaS. Published by: Intermedia Net



Jargon Buster Guide to Artificial Intelligence

Wed, 21 Feb 2018 24:00:00 EST

Where once stood Big Data and Data Science, now stands AI and its younger sibling, Machine Learning. AI is red hot. And stuffed with jargon. Whether you are an IT professional looking to see how AI can benefit your organisation, or an entrepreneur looking to launch an AI-fuelled start up, this Jargon Buster will help to throw the trend into relief. Published by: ComputerWeekly.com



Start Your Digital Transformation with SAP HANA and the Right Infrastructure

Wed, 13 Sep 2017 24:00:00 EDT

This webcast dives in-depth into the benefits of running SAP HANA on IBM POWER Systems. Tune in as three experts talk through real-world cases of running HANA on POWER, and the results, including how the pair provides higher throughput to deliver fast business results, and more. Published by: IBM



The Future of Privileged Management

Wed, 14 Feb 2018 24:00:00 EST

The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts. Published by: One Identity



CW Nordics ezine February 2018

Thu, 22 Feb 2018 24:00:00 EST

In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs. Published by: ComputerWeekly.com



Regulating Privileged Access: When to Require Human Approval Workflows

Wed, 14 Feb 2018 24:00:00 EST

Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity. Published by: One Identity



Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

Wed, 14 Feb 2018 24:00:00 EST

In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights. Published by: One Identity



Identity Analytics – A more Collective Defense

Wed, 14 Feb 2018 24:00:00 EST

As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task. Published by: One Identity



ASEAN IT Priorities 2018

Mon, 19 Feb 2018 24:00:00 EST

This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure. Published by: ComputerWeekly.com



Employee & Device Monitoring: Dispelling the Myths

Mon, 12 Feb 2018 01:00:59 EST

Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program. Published by: Forcepoint



How to Maintain Control of Documents and Files Shared with Others

Mon, 12 Feb 2018 24:00:00 EST

Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more. Published by: Citrix



ANZ IT Priorities 2018

Fri, 16 Feb 2018 24:00:00 EST

The IT Priorities 2018 survey results underscore what we already know about the ANZ IT landscape - more investments in software and cloud services to buttress digital transformation efforts, including the greater use of artificial intelligence, machine learning and robotics. But there were a few surprises as well Published by: ComputerWeekly.com



User Behavior Analysis & SIEM

Wed, 07 Feb 2018 24:00:00 EST

In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis. Published by: LogRhythm, Inc.



Securely Deliver Apps and Desktops to Any Enterprise

Mon, 12 Feb 2018 24:00:00 EST

Tune into this video, in which Scott Lane, Citrix Distinguished Engineer, demonstrates how to leverage cloud resources like Office 365 and Azure AD to access your desktop environment. You'll see federated authentication services at work, and more. Published by: Citrix



Your Guide to Building an Effective Digital Transformation

Wed, 07 Feb 2018 24:00:00 EST

In this expert e-guide, we explore 5 key steps to building a comprehensive digital transformation strategy that helps you craft positive experiences for your customers and employees. Published by: Virtusa



Contextual Access to Apps and Data Anywhere Anytime

Mon, 12 Feb 2018 24:00:00 EST

Tune into this video to learn about the power of contextual access, which allows IT to set policies for who can access data based on location, device and network. You'll learn how to ensure all endpoints—whether dedicated desktop or mobile device—are properly protected. Published by: Citrix



IoT: Take Control of the Edge

Mon, 05 Feb 2018 24:00:00 EST

With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud. Published by: VMware



Update Your Collaboration Toolbox: SharePoint 2016 and Office 365

Tue, 06 Feb 2018 24:00:00 EST

In this expert e-guide, we take a look at your options for migrating to SharePoint 2016 vs. using Office 365 for collaboration in conjunction with tools like SharePoint Online. Published by: Adobe Systems, Inc.



Shifting from Device Management to Workforce Management

Wed, 07 Feb 2018 24:00:00 EST

Download this e-guide to discover how device hyper-convergence, Devices as a Service, virtualization and cloud computing, help organizations better manage their workforces by focusing more on the users, access, identity and data. Published by: Dell and Intel



The Challenge of Unified Workspaces

Wed, 07 Feb 2018 24:00:00 EST

In this expert-guide, learn the 4 top challenges facing end-user computing today, from application updates to security. Then, explore how your IT department can address the issue of unified workspaces head-on. Published by: Dell and Intel



UK IT Priorities 2018

Mon, 12 Feb 2018 24:00:00 EST

Every year, Computer Weekly conducts a large-scale survey of our readers to find out their IT spending priorities for the year ahead – it's always an interesting take on what's happening in IT departments around the country because it's coming from the leaders making those technology purchasing decisions. Published by: ComputerWeekly.com



Computer Weekly – 13 February 2018: On the path to diversity in tech

Fri, 09 Feb 2018 24:00:00 EST

In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now. Published by: ComputerWeekly.com



Infographic: 2018 UKI IT Priorities

Thu, 08 Feb 2018 24:00:00 EST

Each year, Computer Weekly asks CIOs and senior IT decision makers what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for decision makers in the UK and Ireland in 2018. Published by: ComputerWeekly.com



Tips on Integrating HRIS with Cloud Talent Management Apps

Fri, 30 Jun 2017 24:00:00 EDT

A cloud-based talent management system isn't a piece of cake to integrate into your HRIS. Delve into 5 areas that you may need to tackle, along with advice to make your integration a success. Published by: Cornerstone OnDemand



Why Enterprises Invest in Talent Management Tools

Fri, 30 Jun 2017 24:00:00 EDT

How do you know if you need talent management tools? In this expert e-guide, learn more about how to evaluate your HR needs through 3 key drivers of HR tools. Published by: Cornerstone OnDemand



Break Down Talent Management System Options

Fri, 30 Jun 2017 24:00:00 EDT

In this expert e-guide, break down the differences between different talent management offerings and find the right package that will keep your employees happy. Published by: Cornerstone OnDemand



Five Milestones to GDPR Success

Tue, 06 Feb 2018 24:00:00 EST

The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant. Published by: Proofpoint, Inc.



Computer Weekly – 6 February 2018: How a digital workplace can drive innovation

Fri, 02 Feb 2018 24:00:00 EST

In this week's Computer Weekly, we look at some of the latest tools for the digital workplace and find out how they can improve collaboration and innovation. We ask what lessons the demise of Carillion has for IT outsourcing. And the CIO of retailer River Island tells us how technology is changing the high street in fashion. Read the issue now. Published by: ComputerWeekly.com



Content Management Analytics Arms Businesses with a Strategic Planning Edge

Thu, 01 Feb 2018 24:00:00 EST

This expert handbook explores how to enable sound, machine learning-enabled analytics for content management systems. Find out how to support decision-making with rich, real-time ECM analytics and assess the impact of things like AI and big data on your content analytics strategy. Published by: SearchContentManagement



Building a Foundation for IT Modernization

Mon, 31 Oct 2016 24:00:00 EDT

No matter what your business goals are, every initiative starts with a strong foundation. You need a foundation that will enable you to do anything your organization requires. This white paper touches on the steps necessary to achieve IT optimization and explores a system designed with customizable IT optimization in mind. Published by: Red Hat



Lower Total Cost of Ownership with Red Hat Enterprise Linux

Thu, 31 Mar 2016 24:00:00 EDT

This paper provides an analysis of five organizations that migrated enterprise applications from proprietary legacy systems to Red Hat enterprise Linux solutions. While the main focus is on lowering cost, this study also looks at non-financial, strategic decision-making information. Published by: Red Hat



CW Benelux February 2018

Thu, 01 Feb 2018 24:00:00 EST

In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities. Published by: ComputerWeekly.com



IT Modernisation: Achieving a balance between 2nd and 3rd platform investments

Fri, 30 Dec 2016 24:00:00 EST

How do you welcome change without disrupting your business? This white paper explains why open source software is a key enabler of change and the perpetual cycle of datacenter infrastructure standardization and modernization. Published by: Red Hat



Selecting SaaS accounting software need not be intimidating

Wed, 31 Jan 2018 24:00:00 EST

There are SaaS accounting software systems for every size of business and type of industry. But that may complicate the selection process. Published by: SearchERP



Colocation vs Cloud: Weighing up the enterprise options

Wed, 31 Jan 2018 24:00:00 EST

In this e-guide, we'll share case studies from companies who have gone down the colocation route, and take a look at some of the latest developments to affect this part of the wider datacentre market. Published by: ComputerWeekly.com



Cloud Management: The Future of Hybrid IT

Thu, 25 Jan 2018 24:00:00 EST

Cloud systems management is the next significant challenge for IT pros to tackle. This e-guide explores why cloud management platforms are the future of hybrid IT, what to look for in a platform, and the primary challenges you are going to need to overcome. Published by: Citrix



Access e-zine: January 2018

Tue, 30 Jan 2018 24:00:00 EST

Two companies implemented desktop transformation initiatives that stood out above the rest. Learn more about the winners of the Access Innovation Awards. Published by: SearchEnterpriseDesktop



Endpoint Protection & Device Management

Wed, 24 Jan 2018 24:00:00 EST

The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices. Published by: Seqrite



Connect to Your Workspace Easily with the Dell Dock that Fits Your Needs

Sat, 31 Dec 2016 24:00:00 EST

Because new connectivity options such as USB Type-C, Thunderbolt 3 via USB Type-C, and Intel WiGig make connecting to peripherals easy, docks that utilize one of these technologies can improve workforce efficiency. Download this paper to see four such docks in action, tested for a variety of work types. Published by: Dell and Intel



Evaluate Cloud Management Tools

Thu, 25 Jan 2018 24:00:00 EST

As more devices and OSes enter the enterprise fray, IT must learn how to deliver apps to users on several different platforms. Download this e-guide to uncover three factors to drive your EUC strategy, find out how Citrix's cloud platform is taking on management and evaluate hybrid cloud management tools for your enterprise needs. Published by: Citrix



Computer Weekly – 30 January 2018: Davos debates global tech risks

Thu, 25 Jan 2018 24:00:00 EST

In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now. Published by: ComputerWeekly.com



Modernizing Legacy Applications Saves Bottom Lines

Fri, 19 Jan 2018 24:00:00 EST

Since their legacy Lotus Notes environment was going to shutdown, which included over 200 custom apps, one company took a group of workers that had been developing ITIL and service management modules for years and transitioned them into a team that builds custom apps. Find out the benefits they realized from this process. Published by: ServiceNow



The Journey Towards Digital Transformation

Fri, 19 Jan 2018 24:00:00 EST

Most organizations are trying to figure out how to get results from digital transformation. The issue is that transformation is a journey, not a destination. Find out how CEMEX, a global leader in the building materials industry, is successfully navigating their journey to more efficient back‑office processes. Published by: ServiceNow



YoYo Wallet Case Study: Enhanced Mobile App Testing and QA

Mon, 22 Jan 2018 24:00:00 EST

Find out how Yoyo Wallet improved their software testing abilities to identify and resolve bugs in their mobile payment apps faster and more efficiently without having to build a large internal QA department. Published by: Applause



Analyst Report: The Rise of the Micro PC

Sun, 31 Dec 2017 24:00:00 EST

This Forrester Research study dives into why enterprise PC buyers still value the security and performance of fixed computing solutions. Read on to see the results first-hand, including how micro PCs improve security and promote productive employees, top 6 benefits of micro PCs, and more. Published by: Dell and Intel



Automating the Business of Science with Applications

Fri, 19 Jan 2018 24:00:00 EST

A national science and engineering research lab provides support and services to over 12,000 users with diverse regional, functional, and divisional requirements. This called for a renovation in how they handled their IT service management. Find out how the lab benefitted from this service overhaul. Published by: ServiceNow



From Multi-Channel to Unified Integrated Customer Experience

Fri, 19 Jan 2018 24:00:00 EST

Swiss Re, a leading and highly diversified global re-insurer, needed a way to enhance IT service experience. They created and launched their enterprise service management portal to 79 locations across 25 countries. View this webinar to learn how they accomplished this and the benefits they realized. Published by: ServiceNow



How to Build Tomorrow's Mobile App Experiences

Mon, 22 Jan 2018 24:00:00 EST

Find out how to update your software testing strategy so that you can build differentiated mobile apps with the user experience in mind. Published by: Applause