Subscribe: Most Popular White Papers and WebcastsNetwork Hardware and Software Research
http://www.bitpipe.com/rss/multi/ka_bp_nethwsw.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
case study  cloud  data  learn  management  mobile  network  published  security  software  storage  technology  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsNetwork Hardware and Software Research

Most Popular White Papers and Webcasts Network Hardware and Software Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 09 Dec 2016 16:55:12 EST

Last Build Date: Fri, 09 Dec 2016 16:55:12 EST

 



Simplify your SDDC Strategy with Network Virtualization

Fri, 09 Dec 2016 24:00:00 EST

To support the software-defined data center (SDDC), your network must be automated, agile, and fast. It also must work seamlessly with your virtual infrastructure. Discover ways to create a reliable foundation, achieve full network visibility, and more. Published by: Brocade



Getting the Most Out of Cisco IWAN

Tue, 31 May 2016 24:00:00 EDT

In this white paper, you will learn about one sd-wan infrastructure management platform that combines polled/collected metrics, NetFlow and logs to provide complete visibility into Cisco IWAN. Published by: Verizon



Backup technologies help appliances do more than backup

Tue, 06 Dec 2016 24:00:00 EST

Deduplication creates huge savings, which has led to the development of backup technologies and rising products to use backup data and hardware in a more cost-effective manner. In this e-guide, learn how backup targets have evolved and what makes the newest backup systems different and more efficient. Published by: Rubrik



Getting Down to Business: Reducing the Risk of Restrictive IT

Sat, 28 Feb 2015 24:00:00 EST

This white paper explores how to overcome issues with restrictive, legacy IT technologies. Find out how CIOs can implement strategic planning to absorb the growing cost of updating systems, mitigate the impact of a failing network, and more. Published by: Brocade



Building a Flexible Foundation for a Software-Defined Data Center

Thu, 08 Dec 2016 24:00:00 EST

To deliver physical and virtual network functions, architectures, and services at high scale and performance, organizations are looking to the software-defined data center (SDDC.) Discover ways to achieve improved visibility across data center resources. Published by: Brocade



Analyzing the Top 8 Indicators of Threat Traffic

Wed, 07 Dec 2016 24:00:00 EST

While endpoint security tools assist with the detection of a compromised endpoint, the analysis of anomalous network traffic is critical to detecting ongoing compromised systems. Read on for details on the top 8 indicators of compromise in network traffic. Published by: LogRhythm, Inc.



Importance of the Desk-Based Worker on Enterprise Success

Wed, 07 Dec 2016 24:00:00 EST

In this white paper, learn how to choose better hardware and software to create a more comfortable work environment for desk-based workers to increase business success. Read on and see how this can be applied to five common desk-based roles: engineer, accountant, customer support, executive assistant and inside salesman. Published by: Dell, Inc. & Intel®



Bringing Hyper-Scale Cloud Efficiencies to the Enterprise Data Center and Network

Tue, 06 Dec 2016 24:00:00 EST

Discover how the software-defined data center (SDDC) and software-defined networking (SDN) market is building products and services that can deliver hyper-scale cloud efficiencies to the enterprise today. Published by: Brocade



A Guide to Choosing the Right Technology for Your Team and Getting Buy-In from IT

Tue, 06 Dec 2016 24:00:00 EST

How do you ensure that everyone in your organization has the right equipment to deliver what's best for the organization? Download this instructive guide to learn to choose the right technology for your team, be servicing their device demands and accommodating the methods in which they work. Published by: Dell, Inc. & Intel®



Setting a New Standard for Network Efficiency with Ethernet Fabric Multilayer, Multipathing Capabilities

Tue, 06 Dec 2016 24:00:00 EST

Modern Ethernet fabrics employ multi-pathing capabilities in both hardware and software to. Learn 3 ways to help your organization efficiently use the network for best performance and maximum network utilization. Published by: Brocade



Spotlight on On-the-Go Professionals and How IT Adapts to Them

Tue, 06 Dec 2016 24:00:00 EST

Learn how to power up mobile professionals' productivity with greater portability by optimizing IT to accommodate the demands of your users. Read on to create the optimum IT experience by kick-starting efficiency with devices that multitask and protect devices with recovery services. Published by: Dell, Inc. & Intel®



Macy's Directs Millennial Traffic with API-led Mobile Development

Wed, 14 Sep 2016 24:00:00 EDT

This case study examines how Macy's optimized their mobile app to improve the customer experience. Find out how they increased market share and awareness by creating targeted mobile features for the millennial demographic with an API-led strategy. Published by: TIBCO Software Inc.



Increase Server Performance and Productivity

Mon, 05 Dec 2016 24:00:00 EST

This brief provides ideas on how you can refresh your old servers before your competition does. Learn how the economic and performance benefits of updating your servers on a regular basis can dramatically outweigh the time, cost, and effort of doing so. Published by: Dell EMC and Intel®



Enable Advanced Ethernet Fabric Capabilities and Scalable Networking

Mon, 05 Dec 2016 24:00:00 EST

Read this white paper and learn about network switches that allow you to overcome key challenges, and enable you to support cloud-optimized networking and greater enterprise agility. Learn about Ethernet fabric technology, and how it is helping organizations overcome barriers to network optimization. Published by: Brocade



Corridor Warrior: How IT Empowers the Future-Ready Workforce

Mon, 05 Dec 2016 24:00:00 EST

Is your IT meeting its user requirements? Learn how to implement an end-to-end IT management strategy that encapsulates the needs of the modern, mobile, dynamic workforce. Read on to assess your hardware and software, and ensure your IT supports productivity. Published by: Dell, Inc. & Intel®



Modernizing IT Infrastructure: Empower Businesses with Heightened Productivity

Sat, 31 Oct 2015 24:00:00 EDT

This white paper explores 10 of the most important IT priorities, focusing on the impact of big data, hybrid clouds, mobility, and security. Discover how to break away from static infrastructures and siloed data in order to keep up with the management demands of increasingly complex apps. Published by: Hewlett Packard Enterprise



Get Ready for the Cloud X.0 Experience

Sat, 05 Nov 2016 24:00:00 EDT

This white paper identifies some of the tell-tale signs of cloud disconnect resulting in the dissatisfaction of its customers and details a cloud solution that works best with mobile devices as well as diversified features allowing you to communicate and collaborate efficiently. Published by: TechData Corporation



HPE StoreFabric Gen 6 Fibre Channel Server and Storage Solution

Wed, 30 Nov 2016 24:00:00 EST

This resource provides an evaluation of a fibre channel server and storage solution. It explains why datacenters are pairing their high-performance dual-socket servers with Fibre Channel solid-state (flash) storage systems, to improve storage performance. Published by: HPE and Brocade



How Virtualization is Transforming Technology Delivery in Healthcare

Thu, 17 Nov 2016 24:00:00 EST

Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Tune into this podcast as leaders from the nation's leading health systems discuss why application virtualization is reshaping care delivery and improving security. Published by: Citrix and Pure Storage



How Virtualization is Transforming Technology Delivery in Healthcare

Thu, 01 Dec 2016 24:00:00 EST

Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security. Published by: Citrix and Pure Storage



Trends in Mobile User Authentication

Thu, 01 Dec 2016 24:00:00 EST

Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more. Published by: HID



Important Modern Trends in Digital Banking

Wed, 30 Nov 2016 24:00:00 EST

Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more. Published by: HID



HPE StoreFabric SN6600B Gen6 FC Switch

Mon, 28 Nov 2016 24:00:00 EST

This webcast discusses a fibre channel switch that optimizes your storage network for flash storage and virtualized applications and is designed for large enterprise salability. Published by: HPE and Brocade



HPE StoreFabric SN8600B Gen6 SAN Director Switch

Mon, 28 Nov 2016 24:00:00 EST

This webcast discusses a fibre channel SAN director that optimizes your storage network for flash storage and virtualized applications and is designed for large enterprise scalability. Published by: HPE and Brocade



Solved: Common VDI Storage Challenges

Tue, 08 Mar 2016 24:00:00 EST

Discover how your storage peers are solving their most complex VDI challenges with all-flash array technology and learn how you can answer your most demanding VDI storage issues including complexity, cost, end-user experience and more. Published by: Dell EMC and Intel®



CenterPoint Properties Overcomes Poor Office 365 Performance in the Cloud

Tue, 29 Nov 2016 24:00:00 EST

In this case study, you'll learn how CenterPoint Properties was able to realize a 63% decrease in Office 365 traffic and implement on-going network monitoring and faster troubleshooting. Access now to learn more. Published by: Riverbed Technology, Inc.



Case Study: Sub-Zero Group, Inc. Requires Improved App Performance and Visibility

Tue, 29 Nov 2016 24:00:00 EST

Sub-Zero Group accelerated Office 365 performance, cut application troubleshooting times to less than a minute, and improved the customer experience in their showrooms. Access this case study to learn how they achieved these goals. Published by: Riverbed Technology, Inc.



Manage the Business, Not the Printer

Mon, 30 Nov 2015 24:00:00 EST

Explore shortcomings of a centralized printing approach that are often overlooked and discover a new class of business inkjet printers that make inkjet technology a viable alternative to color laser printers in office settings. Published by: Epson



SAP HANA and IBM Power Systems Means IT Simplification

Tue, 29 Nov 2016 24:00:00 EST

This video describes how one company's power architecture-based server line now has a combined offering that supports faster transactions, better data management, openness, and innovation. All while keeping up with demands around data management, while lowering operating costs. Published by: IBM



SAP HANA on IBM Power Systems

Mon, 28 Nov 2016 24:00:00 EST

This white paper describes how one company's Power Architecture-based server line now has a combined offering that supports faster transactions, better data management, openness and innovation. All while keeping up with rising demands around data management, while lowering operating costs and ensuring scalability. Published by: IBM



2016 BYOD and Mobile Security Spotlight Report

Mon, 28 Nov 2016 24:00:00 EST

With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age. Published by: BitGlass



Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado

Tue, 29 Nov 2016 24:00:00 EST

In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now. Published by: ComputerWeekly.com



Securing BYOD without MDM

Mon, 28 Nov 2016 24:00:00 EST

Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents. Published by: BitGlass



How MDM Software Exposes Your Personal Data

Wed, 23 Nov 2016 24:00:00 EST

Mobile device management software is widely used in organizations embracing the BYOD movement, but how much does it truly monitor? In this case study, several willing participants had MDM software installed on their personal devices. The outcome? Access this case study to find out. Published by: BitGlass



Top 3 Cybersecurity Challenges Facing Healthcare Organizations

Thu, 30 Jun 2016 24:00:00 EDT

Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation. Published by: Arctic Wolf Networks, Inc.



The Top Cybersecurity Risks – And How Enterprises Are Responding

Mon, 31 Oct 2016 24:00:00 EDT

Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers. Published by: Arctic Wolf Networks, Inc.



Exchange 2016 Upgrade Outlined and Considerations for Your Recovery Plan

Tue, 22 Nov 2016 24:00:00 EST

This expert guide illustrates five migration issues that IT admins must tackle in order to upgrade to Exchange 2016 without adversely affecting end users. Additionally, read on to formulate a recovery plan for Office 365 outages by asking yourself the seven essential questions outlined here. Published by: Riverbed Technology, Inc.



Bottom-Up Data Center Power Management

Fri, 28 Apr 2017 24:00:00 EDT

To remain competitive, it's critical to measure power but with limited budgets, this can become quite difficult. A system featuring intelligent rack PDUs with outlet switching and outlet-level power measurement coupled with power and energy management software is an affordable way to efficiently analyze power consumption. Read on to learn more. Published by: Server Technology, Inc.



Arapahoe House Secures BYOD

Tue, 22 Nov 2016 24:00:00 EST

In this case study examine how Arapahoe House, a non-profit & leading provider of substance use disorder treatment in Colorado, deployed a security policy for their BYOD users that allowed them to selectively wipe BYOD data, streamline provisioning and de-provisioning, gain visibility into all BYOD usage, and more. Published by: BitGlass



SD-WAN Market Swells Because of Cloud-Based Business Apps

Fri, 18 Nov 2016 24:00:00 EST

IDC predicts that the SD-WAN market will hit $6 billion by the year 2020, with a 90% annual growth rate. This expert e-guide takes a look at the current SD-WAN market swell and how it's attributed to cloud-based business apps. Published by: Silver Peak



SD-WAN Market Consolidation, APIs, SDN and More

Mon, 21 Nov 2016 24:00:00 EST

Will the software-defined WAN market consolidate? How are APIs affecting software-defined networking? And what is the state of cybersecurity in the next presidency? In this expert e-guide, 3 industry veterans answer these questions to help you stay abreast of the evolving landscape. Published by: Silver Peak



Mobile application platforms: Essential guide

Mon, 21 Nov 2016 24:00:00 EST

One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience. Published by: ComputerWeekly.com



The Definitive Guide: Infrastructure for Desktop Virtualization

Sat, 01 Oct 2016 24:00:00 EDT

Dive into this comprehensive eBook to get the details you need for starting virtualization. Written by Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and edited by Sachin Chheda of Nutanix™, you get all the detailed analysis and key points to consider Published by: Lenovo



Consider These SD-WAN Architecture Pitfalls Before Adoption

Thu, 17 Nov 2016 24:00:00 EST

The ROI for SD-WAN can be high, but there are a range of factors to consider before implementation. This expert e-guide details key considerations to keep in mind as you evaluate SD-WAN architecture for your environment. Published by: Silver Peak



Mitigate Data Theft and Inappropriate Use in your Network

Fri, 18 Nov 2016 24:00:00 EST

Security teams need tools to help deliver the deep insight necessary to detect a variety of threats. Uncover ways to detect and respond to today's security incidents with tools designed to pinpoint abnormal activity and prevent sensitive data loss. Published by: LogRhythm, Inc.



Office 365: Enabling More Secure Collaboration

Fri, 18 Nov 2016 24:00:00 EST

How can you enable secure collaboration with Office 365? Learn 3 steps to make this possible, as well as 3 stages of adoption for security add-ons for Office 365. Published by: VMware



Dynamic Security Management for a Productive Mobile Workforce

Tue, 24 May 2016 24:00:00 EDT

This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more. Published by: RES Software



Argos Leverages APIs to Boost Mobile and Digital Retail Strategies

Tue, 22 Sep 2015 24:00:00 EDT

Access this case study to discover how Argos enabled secure digital retail and seamless integrations across a variety mobile devices and platforms by implementing an API-based strategy to build apps in both open and closed development communities. Published by: TIBCO Software Inc.



The Mission-Critical Scale-Up x86 Platform for SAP, Oracle, and SQL Server

Thu, 30 Jun 2016 24:00:00 EDT

Learn how to improve application uptime, and standardize and consolidate mission-critical processing, with a scale-up, x86 platform which supports SAP, Oracle, and SQL Server databases. Download this report to greet the growing demands of decision support and business processing workloads. Published by: Hewlett Packard Enterprise



API Management Platforms: Seamless Integration between Physical and Digital Worlds

Tue, 22 Sep 2015 24:00:00 EDT

Explore how an API management platform provides seamless integration across multiple channels and ensures easy communication between your company and its employees, customers, and partners. Find out how retail companies like Coca Cola have already started to leverage APIs to change the transaction experience and boost customer relations. Published by: TIBCO Software Inc.