Subscribe: Most Popular White Papers and WebcastsNetwork Design and Management Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
application  business  data  discover  enterprise  infrastructure  learn  mobile  network  published  security  white paper  white 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsNetwork Design and Management Research

Most Popular White Papers and Webcasts Network Design and Management Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Wed, 19 Oct 2016 14:45:33 EDT

Last Build Date: Wed, 19 Oct 2016 14:45:33 EDT


10 Critical Requirements for Optimizing Application Delivery

Wed, 19 Oct 2016 24:00:00 EDT

Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more. Published by: A10 Networks

A Platform for Modernizing Java Applications: Designing Workloads for the Cloud and Modern Ecosystems

Wed, 19 Oct 2016 24:00:00 EDT

Java-based applications can enable modern development in a cloud-friendly environment. Learn how cloud-based application deployment allows you to take advantage of existing resources while moving toward newer (read: digital) application models. Published by: Red Hat

Barracuda NextGen Firewall X: Simple Cloud-Based Network Management for Small to Midsized Businesses

Fri, 30 Sep 2016 24:00:00 EDT

Discover a next-generation firewall that can stand up to new and evolving cyber threats. Gain antivirus and web filtering functionality without the need for additional IT staff or special training. Published by: Barracuda Networks

The 10 Pillars of Mobile Excellence, And How They Work In The Real World

Wed, 19 Oct 2016 24:00:00 EDT

In this white paper, learn "the 10 pillars of mobile excellence" which can help improve all aspects of your business from customer service to sales. Find out how to discover the end-goal of your mobile maturity, identify the hurdles towards mobile success, plan app deployment in stages, and more inside. Published by: Red Hat

Mobile Becomes A Key Success Imperative For CIOs

Thu, 12 Nov 2015 24:00:00 EST

This report leverages Forrester's survey data to depict the current state of the CIO's mobile mind shift and their ability and willingness to support comprehensive mobile solutions. Learn why mobility is now the single most critical tool at your enterprise for your continued success and how to best use it by accessing now. Published by: Red Hat

Printer and Embedded Device Security

Fri, 01 May 2015 24:00:00 EDT

Many printers and embedded devices fail to meet today's enterprise security needs. Uncover five key security capability categories that should be addressed in order to ensure hackers aren't exposing these weak links. Published by: HP

Using DNS Monitoring to Detect Network Breaches

Mon, 17 Oct 2016 24:00:00 EDT

Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests. Published by: Dyn

Develop Mobile Apps at the Speed of Business

Tue, 18 Oct 2016 24:00:00 EDT

Discover ways to shorten (and support) the full app development lifecycle without letting line of business workers and non-developer stakeholders encumber the process. Read on to also learn strategies for enabling developers to more efficiently design, collaborate, and test apps across mobile environments. Published by: Kony

Stop Malware Before It Stops You

Tue, 31 Dec 2013 24:00:00 EST

Detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways. Published by: Trustwave

How Eurostar Was Able to Dramatically Reduce Their Monthly Mobile Bill

Tue, 18 Oct 2016 24:00:00 EDT

In this case study discover how Wandera, an international transportation company, found a way to cut monthly expenses by deploying Wandera software in synchronization with their existing MDM solution. Learn how they were able to restrict access of roaming users in countries where business doesn't operate, cut monthly bills by 40%, and more. Published by: Wandera

Best-of-Breed Next-Generation Security For the Mid-Market

Fri, 30 Sep 2016 24:00:00 EDT

Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats. Published by: Barracuda Networks

How DNS Information Can Help Cut Millions from Your Infrastructure Costs

Mon, 17 Oct 2016 24:00:00 EDT

One of the hardest things about infrastructure planning in the web-enabled world is estimating capacity needs, especially from a network perspective. This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Published by: Dyn

Masergy's Unified Enterprise Security Solution

Tue, 18 Oct 2016 24:00:00 EDT

This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency. Published by: MASERGY

Data Center Design Best Practices: Efficiencies Beyond Power and Cooling

Wed, 31 Dec 2014 24:00:00 EST

This white paper details five key elements that should be considered when designing today's data center. Learn these elements to help attain complete efficiency in your data center design. Published by: Legrand

A Golden Age Dawns for Network Services

Mon, 17 Oct 2016 24:00:00 EDT

Advanced network technology options have expanded, offering enterprises better, but cheaper, options for network services. Published by:

Internet of Things Application Guide

Wed, 31 Aug 2016 24:00:00 EDT

The Internet of Things (IoT) is making an unprecedented positive impact on how commercial buildings are managed and operated. This white paper explains how to construct an IoT ready building design, so you can reap all the benefits IoT has to offer. Published by: Legrand

Mapping the Demands of Real-World Apps — One IO at a Time

Mon, 17 Oct 2016 24:00:00 EDT

When considering variables such as transactions completed in a period of time (transaction efficiency) or throughput (transfer efficiency), it becomes clear that not all deployments of the same application will behave similarly. Learn how one analysis explores deployment-to-deployment variation for several common application categories. Published by: Nimble Storage

SDN and NFV in the WAN

Fri, 29 Jul 2016 24:00:00 EDT

This white paper provides insights into SDN and NFV by answering questions like: What are they? What's driving them? How are they related to each other? And you will learn the value that SDN and NFV bring to the WAN. Published by: MASERGY

Accelerating Mobile App Development

Wed, 31 Aug 2016 24:00:00 EDT

This white paper details how to overcome today's mobile app development challenges by way of new enterprise grade software tools and frameworks that finally enable model-driven application development (MDAD) for the mobile space. Published by: Kony

Mobility Fuels Productivity Gains for Energy and Utilities

Mon, 17 Oct 2016 24:00:00 EDT

Download this e-book to mobilize your enterprise with strategic mobile asset and workforce management. By reading on, you will learn 6 core strategies for mobile app development, including instruction on how to make use of device-specific functionality and integrate with multiple existing systems and domains. Published by: Red Hat

Machine Learning Delivers Better IT Insights

Wed, 31 Aug 2016 24:00:00 EDT

Machine learning and advanced analytics bring many advantages to modern, self-monitoring IT. Discover ways to combine the vertical, horizontal, and correlated analytics views needed to understand the status of your apps and the infrastructure that supports them. Published by: Nimble Storage

4 Keys to More Effective CIO Succession Planning

Mon, 03 Oct 2016 24:00:00 EDT

Many companies face two dilemmas with respect to technology strategy—succession planning for retiring CIOs, and keeping up with the digital transformation of their industry. This white paper highlights the 4 keys to more effective CIO succession planning in the age of digital transformation. Published by: Infor

The Hidden Costs of ERP Customizations

Fri, 29 Jan 2016 24:00:00 EST

Customizations for enterprise resource planning (ERP) and business applications are becoming less useful and threaten to widen the functional gaps they were supposed to help bridge. Access this white paper to discover the hidden costs of ERP customizations and learn how to transition into the next generation of app personalization. Published by: Infor

Network Considerations for Digital Building Infrastructure

Mon, 17 Oct 2016 24:00:00 EDT

This webcast explores the concept of creating "Smart Space" workplaces by leveraging Power over Ethernet (PoE) technology to create digital building infrastructures. Discover how you can create smarter facility systems, like LED lighting that becomes part of an intelligent IP platform, allowing light fixtures to monitor CO2 levels and more. Published by: Panduit

Enabling Tomorrow's Connected Infrastructure for IoT

Wed, 31 Aug 2016 24:00:00 EDT

With the Internet of Things (IoT) there are new and critical network infrastructure considerations to think about as you prepare for what's ahead. This white paper highlights important considerations for designing your infrastructure to support tomorrow's needs being driven by billions of IoT connected devices. Published by: Legrand

EzVerify Finds the Optimal Scale-Out Solution for Their Storage Infrastructure

Mon, 17 Oct 2016 24:00:00 EDT

Access this case study to learn how Automated HealthCare Solutions (AHCS) transformed application performance and systems availability as a result of implementing an all-flash array, scale-out storage architecture—transforming how physicians manage dispensing and inventory and automated claims. Published by: NetApp SolidFire

If External DNS Fails, So Does Your Digital Business

Thu, 15 Sep 2016 24:00:00 EDT

Without properly functioning external DNS, Internet-based resources may "disappear" or become unavailable without warning. To boost DNS management, this Gartner research report explores the concept of externally sourced and managed DNS as a service. Access now to uncover their key findings and learn best practices for improved DNS performance. Published by: Dyn

Top 5 Pitfalls to Avoid in Your Data Protection Strategy

Fri, 30 Sep 2016 24:00:00 EDT

Discover five critical pitfalls to avoid when building a successful data protection strategy for your organization. Learn how to best navigate the various data protection solutions from digital to physical and private to public clouds while ensuring enterprise scalability. Published by: HDS and Veritas

Ease Support, Deployment, and Training with Video-Aided Remote Support Tools

Fri, 14 Oct 2016 24:00:00 EDT

This white paper discusses how remote support IT services can alleviate some of the growing challenges in managing devices. Included are the results of a survey that indicates how CIOs how deploying remote IT support as a way to alleviate some of technology management problems. Published by: LogMeIn, Inc.

Critical Capabilities for Mobile Application Development Platforms

Tue, 09 Aug 2016 24:00:00 EDT

The following research is designed to help mobile and app development leaders evaluate the most appropriate MADP across four common enterprise mobile app use cases. Uncover four key recommendations for investing in mobile app development platforms (MADPs.) Published by: Kony

Determining the Business Value of Red Hat CloudForms

Fri, 30 Sep 2016 24:00:00 EDT

Here are highlighted the benefits of a vendor-agnostic platform for self-service provisioning across hybrid multivendor virtualized, private cloud, public cloud, and container-based environments. Access now to deliver services and infrastructure resources with agility across the entire estate. Published by: Red Hat

DDoS Attacks Are On The Rise – And Fatal to Most Businesses

Tue, 11 Oct 2016 24:00:00 EDT

This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention. Published by: Arbor Networks

Protecting the Distributed Enterprise

Fri, 30 Sep 2016 24:00:00 EDT

Today, almost every distributed enterprise demands fast, transparent access to critical information. And as the data travels fast, so too must protection around it. Discover a tightly integrated infrastructure – access, networking and security - capable of meeting these demands without compromising performance or security. Published by: Fortinet, Inc.

Elevating The Design and Manufacture of World-Class Helicopters with vGPU-enabled VDI

Thu, 31 Dec 2015 24:00:00 EST

Non-GPU virtualization deployments couldn't keep up with the graphics-intensive apps Bell Helicopter, a globally recognized helicopter design and manufacturing business, required. Find out how graphics accelerated VDI delivered the graphics application performance they were looking for. Published by: NVIDIA

5 Critical KPIs For Field Service Success

Wed, 12 Oct 2016 24:00:00 EDT

This report identifies the KPIs that you can leverage to improve your business, regardless of your industry. Access now to learn more about these indicators. Published by: LogMeIn, Inc.

Remove Blind Spots from the Network: A Guide for I&O Professionals

Wed, 12 Oct 2016 24:00:00 EDT

Gain visibility of all software and devices used across the IT estate with software asset management (SAM) that will remove your ITAM and network blind spots. Download this e-book to enforce total visibility across all assets to maintain SLAs. Published by: Snow Software

Community College Delivers Improved App Performance and Flexibility with vGPU Powered VDI

Thu, 31 Dec 2015 24:00:00 EST

Discover how Butler County Community College in Pennsylvania migrated away from individual PCs to a VDI deployment powered by graphics acceleration technology to resolve performance issues and allow seamless remote access from any device. Published by: NVIDIA

Survey Says: LogMeIn Rescue comes Highly Recommended

Wed, 12 Oct 2016 24:00:00 EDT

This survey result identifies which remote support system stands above the rest in the estimation of users. Published by: LogMeIn, Inc.

Executive Guide: Safely Adopting Office 365

Wed, 31 Aug 2016 24:00:00 EDT

To safely and effectively adopt 0ffice 365, you must budget and plan for additional security measures and you will probably need to provision up to accommodate higher internet traffic volumes. This executive guide provides key security and provisioning considerations to keep in mind during your move to Office 365. Published by: Symantec + Blue Coat

How EAM Is Making Operations More Efficient for Service-Oriented Businesses

Wed, 12 Oct 2016 24:00:00 EDT

In service-oriented businesses such as utility companies, a lot of changes have to be made on the fly. Discover how utility companies are using enterprise asset management (EAM) to make their operations more efficient. Plus, learn how they are separating themselves from reliance on paper, tracking workers in the field, and much more. Published by: CraveInfoTech

Why NGFWs Are Becoming the New Standard in Enterprise Security

Fri, 30 Sep 2016 24:00:00 EDT

The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW. Published by: Fortinet, Inc.

Red Hat CloudForms Unifies and Improves Service Delivery and Management

Thu, 30 Jun 2016 24:00:00 EDT

As your infrastructure evolves toward an Infrastructure-as-a-Service model, you need a management platform that follows suit. Download this white paper to simplify hybrid IT management with a platform that evolves to handle all container, virtual, private, and public cloud infrastructures. Published by: Red Hat

The Future State of Enhanced Cybersecurity in the Digital Economy

Fri, 16 Sep 2016 24:00:00 EDT

Discover security, privacy, and trust recommendations in the areas of critical Infrastructure, research and development, federal governance, IAM, and IoT in today's digital, interdependence-based economy. Published by: Unisys

The Anatomy of DDoS Attacks And Best Practices for Preventing Them

Tue, 11 Oct 2016 24:00:00 EDT

This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information. Published by: Arbor Networks

Extending Global Load Balancing to the Cloud With Secondary DNS

Wed, 13 Jul 2016 24:00:00 EDT

Discover how on premise global load balancing (GLB) can become part of your cloud deployment. With GLB enhancing your DNS networks, you can improve security and prevent DDoS attacks. Published by: Dyn

Is Passive Optical Networking Good For Enterprises?

Mon, 10 Oct 2016 24:00:00 EDT

This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON. Published by: Nokia

"As-a-Service" IT Consumption Model for Digital Business Innovation

Fri, 30 Sep 2016 24:00:00 EDT

This IDC Technology Spotlight examines how data center services providers can assist the IT organization in improving overall data center performance while enhancing resource allocation and consumption in the IT environment so that IT can be more vital to digital transformation. Published by: Hewlett Packard Enterprise

Webcast: New, IoT Ready Quark Microcontrollers

Fri, 30 Sep 2016 24:00:00 EDT

This webcast highlights the IoT ready Quark Microcontroller D2000 and Quark SE Microcontroller C1000. View now to learn how these two microcontrollers can extend security, bring intelligence to real-world applications, simplify design and reduce bills of materials. Published by: Intel

The CIO's Roadmap to The Cloud

Wed, 31 Dec 2014 24:00:00 EST

Starting with a critical business application is the only way to truly prove the value and capabilities of doing business in the Cloud and silence the naysayers. This white paper will explore moving to the cloud by starting with a mission-critical application. Published by: Genesys

How to Use an Incident Response Policy to Better Collaborate

Thu, 06 Oct 2016 24:00:00 EDT

In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data. Published by: Delta Risk