Subscribe: Most Popular White Papers and WebcastsManaging IT Research
Preview: Most Popular White Papers and WebcastsManaging IT Research

Most Popular White Papers and Webcasts Managing IT Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Fri, 08 Dec 2017 14:20:14 EST

Last Build Date: Fri, 08 Dec 2017 14:20:14 EST


IT Priorities: Server Virtualization and IT Automation

Mon, 04 Dec 2017 24:00:00 EST

This e-guide contains insights from IT professionals as to why they server virtualization is still valuable, how older platforms can leverage new technologies, and five ways IT infrastructure automation eases your day-to-day operations. Published by: Dell EMC and Microsoft

Computer Weekly – 12 December 2017: The 50 most influential people in UK IT

Fri, 08 Dec 2017 24:00:00 EST

In this week's Computer Weekly, we reveal our annual list of the 50 most influential people in UK IT, and talk to this year's winner – Mayank Prakash, chief digital and information officer at the Department for Work and Pensions. Read the issue now. Published by:

MicroScope - December 2017: Unlock the potential of DaaS

Mon, 27 Nov 2017 24:00:00 EST

This month's MicroScope ezine looks at the issues around device as a service (DaaS), the outlook from HP and a report from the UK CompTIA conference. Published by: MicroScope

Computer Weekly – 28 November 2017: Chancellor gives £500m in Budget for UK technology growth

Sat, 25 Nov 2017 24:00:00 EST

In this week's Computer Weekly, after chancellor Philip Hammond offered £500m to boost the tech sector, we ask if it's enough to ease fears over Brexit. Experts debate the future of artificial intelligence and its effects on society. And we find out how emerging technologies could help the work of charity Save the Children. Read the issue now. Published by:

Workplace Revolution: How HR technology is transforming the way we work

Wed, 22 Nov 2017 24:00:00 EST

In this e-guide, we explore how businesses around the world are using advanced HR technology to transform the way we work and to improve the efficiency of the workplace. We focus on how advances in artificial intelligence, virtual reality and data analytics are helping to propel HR and the workplace into the future. Published by:

EU General Data Protection Regulation

Wed, 15 Nov 2017 24:00:00 EST

This webcast covers the importance of understanding the GDPR, and steps you can take to comply with the new regulation, with the use of a database that integrates data better and faster, and that's cost efficient. Published by: MarkLogic

CW Nordics November 2017

Thu, 23 Nov 2017 24:00:00 EST

The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough. Published by:

VMware's Role in the Growing DevOps Culture

Thu, 09 Nov 2017 24:00:00 EST

As the DevOps culture continues to sweep through the IT world, and the trend toward microservices picks up steam, VMware steps into the fray. This exclusive e-guide takes a look at what one of the largest names in virtualization platforms is looking to do with DevOps monitoring. Published by: VMware

Access e-zine: November 2017

Tue, 14 Nov 2017 24:00:00 EST

More end-user monitoring tools are relying on machine learning and analytics to help IT get more granular information about the end-user computing experience. Published by: SearchEnterpriseDesktop

How Can Privileged Access Accounts Be Managed in Large Companies?

Mon, 13 Nov 2017 24:00:00 EST

According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access. Published by: One Identity

How can organizations get control over privileged identity management?

Tue, 14 Nov 2017 24:00:00 EST

Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information Published by: One Identity