Subscribe: Most Popular White Papers and WebcastsManaging IT Research
Preview: Most Popular White Papers and WebcastsManaging IT Research

Most Popular White Papers and Webcasts Managing IT Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Wed, 21 Feb 2018 13:30:16 EST

Last Build Date: Wed, 21 Feb 2018 13:30:16 EST


Jargon Buster Guide to Artificial Intelligence

Wed, 21 Feb 2018 24:00:00 EST

Where once stood Big Data and Data Science, now stands AI and its younger sibling, Machine Learning. AI is red hot. And stuffed with jargon. Whether you are an IT professional looking to see how AI can benefit your organisation, or an entrepreneur looking to launch an AI-fuelled start up, this Jargon Buster will help to throw the trend into relief. Published by:

Start Your Digital Transformation with SAP HANA and the Right Infrastructure

Wed, 13 Sep 2017 24:00:00 EDT

This webcast dives in-depth into the benefits of running SAP HANA on IBM POWER Systems. Tune in as three experts talk through real-world cases of running HANA on POWER, and the results, including how the pair provides higher throughput to deliver fast business results, and more. Published by: IBM

The Future of Privileged Management

Wed, 14 Feb 2018 24:00:00 EST

The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts. Published by: One Identity

CW Nordics ezine February 2018

Thu, 22 Feb 2018 24:00:00 EST

In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs. Published by:

Regulating Privileged Access: When to Require Human Approval Workflows

Wed, 14 Feb 2018 24:00:00 EST

Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity. Published by: One Identity

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

Wed, 14 Feb 2018 24:00:00 EST

In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights. Published by: One Identity

Identity Analytics – A more Collective Defense

Wed, 14 Feb 2018 24:00:00 EST

As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task. Published by: One Identity

ASEAN IT Priorities 2018

Mon, 19 Feb 2018 24:00:00 EST

This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure. Published by:

Employee & Device Monitoring: Dispelling the Myths

Mon, 12 Feb 2018 01:00:59 EST

Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program. Published by: Forcepoint

How to Maintain Control of Documents and Files Shared with Others

Mon, 12 Feb 2018 24:00:00 EST

Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more. Published by: Citrix

ANZ IT Priorities 2018

Fri, 16 Feb 2018 24:00:00 EST

The IT Priorities 2018 survey results underscore what we already know about the ANZ IT landscape - more investments in software and cloud services to buttress digital transformation efforts, including the greater use of artificial intelligence, machine learning and robotics. But there were a few surprises as well Published by:

User Behavior Analysis & SIEM

Wed, 07 Feb 2018 24:00:00 EST

In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis. Published by: LogRhythm, Inc.

Securely Deliver Apps and Desktops to Any Enterprise

Mon, 12 Feb 2018 24:00:00 EST

Tune into this video, in which Scott Lane, Citrix Distinguished Engineer, demonstrates how to leverage cloud resources like Office 365 and Azure AD to access your desktop environment. You'll see federated authentication services at work, and more. Published by: Citrix

Your Guide to Building an Effective Digital Transformation

Wed, 07 Feb 2018 24:00:00 EST

In this expert e-guide, we explore 5 key steps to building a comprehensive digital transformation strategy that helps you craft positive experiences for your customers and employees. Published by: Virtusa

Contextual Access to Apps and Data Anywhere Anytime

Mon, 12 Feb 2018 24:00:00 EST

Tune into this video to learn about the power of contextual access, which allows IT to set policies for who can access data based on location, device and network. You'll learn how to ensure all endpoints—whether dedicated desktop or mobile device—are properly protected. Published by: Citrix

IoT: Take Control of the Edge

Mon, 05 Feb 2018 24:00:00 EST

With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud. Published by: VMware

Update Your Collaboration Toolbox: SharePoint 2016 and Office 365

Tue, 06 Feb 2018 24:00:00 EST

In this expert e-guide, we take a look at your options for migrating to SharePoint 2016 vs. using Office 365 for collaboration in conjunction with tools like SharePoint Online. Published by: Adobe Systems, Inc.

Shifting from Device Management to Workforce Management

Wed, 07 Feb 2018 24:00:00 EST

Download this e-guide to discover how device hyper-convergence, Devices as a Service, virtualization and cloud computing, help organizations better manage their workforces by focusing more on the users, access, identity and data. Published by: Dell and Intel

The Challenge of Unified Workspaces

Wed, 07 Feb 2018 24:00:00 EST

In this expert-guide, learn the 4 top challenges facing end-user computing today, from application updates to security. Then, explore how your IT department can address the issue of unified workspaces head-on. Published by: Dell and Intel

UK IT Priorities 2018

Mon, 12 Feb 2018 24:00:00 EST

Every year, Computer Weekly conducts a large-scale survey of our readers to find out their IT spending priorities for the year ahead – it's always an interesting take on what's happening in IT departments around the country because it's coming from the leaders making those technology purchasing decisions. Published by:

Computer Weekly – 13 February 2018: On the path to diversity in tech

Fri, 09 Feb 2018 24:00:00 EST

In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now. Published by:

Infographic: 2018 UKI IT Priorities

Thu, 08 Feb 2018 24:00:00 EST

Each year, Computer Weekly asks CIOs and senior IT decision makers what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for decision makers in the UK and Ireland in 2018. Published by:

Tips on Integrating HRIS with Cloud Talent Management Apps

Fri, 30 Jun 2017 24:00:00 EDT

A cloud-based talent management system isn't a piece of cake to integrate into your HRIS. Delve into 5 areas that you may need to tackle, along with advice to make your integration a success. Published by: Cornerstone OnDemand

Why Enterprises Invest in Talent Management Tools

Fri, 30 Jun 2017 24:00:00 EDT

How do you know if you need talent management tools? In this expert e-guide, learn more about how to evaluate your HR needs through 3 key drivers of HR tools. Published by: Cornerstone OnDemand

Break Down Talent Management System Options

Fri, 30 Jun 2017 24:00:00 EDT

In this expert e-guide, break down the differences between different talent management offerings and find the right package that will keep your employees happy. Published by: Cornerstone OnDemand

Five Milestones to GDPR Success

Tue, 06 Feb 2018 24:00:00 EST

The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant. Published by: Proofpoint, Inc.

Computer Weekly – 6 February 2018: How a digital workplace can drive innovation

Fri, 02 Feb 2018 24:00:00 EST

In this week's Computer Weekly, we look at some of the latest tools for the digital workplace and find out how they can improve collaboration and innovation. We ask what lessons the demise of Carillion has for IT outsourcing. And the CIO of retailer River Island tells us how technology is changing the high street in fashion. Read the issue now. Published by:

Content Management Analytics Arms Businesses with a Strategic Planning Edge

Thu, 01 Feb 2018 24:00:00 EST

This expert handbook explores how to enable sound, machine learning-enabled analytics for content management systems. Find out how to support decision-making with rich, real-time ECM analytics and assess the impact of things like AI and big data on your content analytics strategy. Published by: SearchContentManagement

Building a Foundation for IT Modernization

Mon, 31 Oct 2016 24:00:00 EDT

No matter what your business goals are, every initiative starts with a strong foundation. You need a foundation that will enable you to do anything your organization requires. This white paper touches on the steps necessary to achieve IT optimization and explores a system designed with customizable IT optimization in mind. Published by: Red Hat

Lower Total Cost of Ownership with Red Hat Enterprise Linux

Thu, 31 Mar 2016 24:00:00 EDT

This paper provides an analysis of five organizations that migrated enterprise applications from proprietary legacy systems to Red Hat enterprise Linux solutions. While the main focus is on lowering cost, this study also looks at non-financial, strategic decision-making information. Published by: Red Hat

CW Benelux February 2018

Thu, 01 Feb 2018 24:00:00 EST

In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities. Published by:

IT Modernisation: Achieving a balance between 2nd and 3rd platform investments

Fri, 30 Dec 2016 24:00:00 EST

How do you welcome change without disrupting your business? This white paper explains why open source software is a key enabler of change and the perpetual cycle of datacenter infrastructure standardization and modernization. Published by: Red Hat

Selecting SaaS accounting software need not be intimidating

Wed, 31 Jan 2018 24:00:00 EST

There are SaaS accounting software systems for every size of business and type of industry. But that may complicate the selection process. Published by: SearchERP

Colocation vs Cloud: Weighing up the enterprise options

Wed, 31 Jan 2018 24:00:00 EST

In this e-guide, we'll share case studies from companies who have gone down the colocation route, and take a look at some of the latest developments to affect this part of the wider datacentre market. Published by:

Easy-to-Build Workflows and Forms for Dummies

Wed, 01 Jun 2016 24:00:00 EDT

Organizations are being driven toward business process transformation in the quest to achieve process excellence. Enabling this transformation are business app workflow solutions. Access this essential guide that explains the drive toward business process transformation and the workflow solutions enabling it. Published by: K2

Cloud Management: The Future of Hybrid IT

Thu, 25 Jan 2018 24:00:00 EST

Cloud systems management is the next significant challenge for IT pros to tackle. This e-guide explores why cloud management platforms are the future of hybrid IT, what to look for in a platform, and the primary challenges you are going to need to overcome. Published by: Citrix

Access e-zine: January 2018

Tue, 30 Jan 2018 24:00:00 EST

Two companies implemented desktop transformation initiatives that stood out above the rest. Learn more about the winners of the Access Innovation Awards. Published by: SearchEnterpriseDesktop

Endpoint Protection & Device Management

Wed, 24 Jan 2018 24:00:00 EST

The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices. Published by: Seqrite

Connect to Your Workspace Easily with the Dell Dock that Fits Your Needs

Sat, 31 Dec 2016 24:00:00 EST

Because new connectivity options such as USB Type-C, Thunderbolt 3 via USB Type-C, and Intel WiGig make connecting to peripherals easy, docks that utilize one of these technologies can improve workforce efficiency. Download this paper to see four such docks in action, tested for a variety of work types. Published by: Dell and Intel

Evaluate Cloud Management Tools

Thu, 25 Jan 2018 24:00:00 EST

As more devices and OSes enter the enterprise fray, IT must learn how to deliver apps to users on several different platforms. Download this e-guide to uncover three factors to drive your EUC strategy, find out how Citrix's cloud platform is taking on management and evaluate hybrid cloud management tools for your enterprise needs. Published by: Citrix

Computer Weekly – 30 January 2018: Davos debates global tech risks

Thu, 25 Jan 2018 24:00:00 EST

In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now. Published by:

Modernizing Legacy Applications Saves Bottom Lines

Fri, 19 Jan 2018 24:00:00 EST

Since their legacy Lotus Notes environment was going to shutdown, which included over 200 custom apps, one company took a group of workers that had been developing ITIL and service management modules for years and transitioned them into a team that builds custom apps. Find out the benefits they realized from this process. Published by: ServiceNow

YoYo Wallet Case Study: Enhanced Mobile App Testing and QA

Mon, 22 Jan 2018 24:00:00 EST

Find out how Yoyo Wallet improved their software testing abilities to identify and resolve bugs in their mobile payment apps faster and more efficiently without having to build a large internal QA department. Published by: Applause

The Journey Towards Digital Transformation

Fri, 19 Jan 2018 24:00:00 EST

Most organizations are trying to figure out how to get results from digital transformation. The issue is that transformation is a journey, not a destination. Find out how CEMEX, a global leader in the building materials industry, is successfully navigating their journey to more efficient back‑office processes. Published by: ServiceNow

Analyst Report: The Rise of the Micro PC

Sun, 31 Dec 2017 24:00:00 EST

This Forrester Research study dives into why enterprise PC buyers still value the security and performance of fixed computing solutions. Read on to see the results first-hand, including how micro PCs improve security and promote productive employees, top 6 benefits of micro PCs, and more. Published by: Dell and Intel

Automating the Business of Science with Applications

Fri, 19 Jan 2018 24:00:00 EST

A national science and engineering research lab provides support and services to over 12,000 users with diverse regional, functional, and divisional requirements. This called for a renovation in how they handled their IT service management. Find out how the lab benefitted from this service overhaul. Published by: ServiceNow

From Multi-Channel to Unified Integrated Customer Experience

Fri, 19 Jan 2018 24:00:00 EST

Swiss Re, a leading and highly diversified global re-insurer, needed a way to enhance IT service experience. They created and launched their enterprise service management portal to 79 locations across 25 countries. View this webinar to learn how they accomplished this and the benefits they realized. Published by: ServiceNow

How to Build Tomorrow's Mobile App Experiences

Mon, 22 Jan 2018 24:00:00 EST

Find out how to update your software testing strategy so that you can build differentiated mobile apps with the user experience in mind. Published by: Applause

Why Websites Stay Vulnerable: And What You Can Do About It

Wed, 24 Jan 2018 24:00:00 EST

Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security. Published by: Whitehat Securities

Unleash the Creative Force of Today's Workers

Sun, 31 Dec 2017 24:00:00 EST

Companies with happier employees have 81% higher customer satisfaction. Read on to learn how to foster greater workforce productivity by deploying a portfolio of technologies that empowers the creative workforce. You'll see how employee satisfaction leads to generating new products, services, and more satisfied customers. Published by: Dell and Intel