Subscribe: Most Popular White Papers and WebcastsNetwork Design and Management Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
access  api  cloud  data  discover  expert guide  guide  learn  management  network  performance  published  security  wan 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsNetwork Design and Management Research

Most Popular White Papers and Webcasts Network Design and Management Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Fri, 02 Dec 2016 12:45:15 EST

Last Build Date: Fri, 02 Dec 2016 12:45:15 EST


The Cyber Threat Guide

Wed, 30 Nov 2016 24:00:00 EST

This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them. Published by: LogicNow

Computer Weekly – Rolling out full-fibre broadband

Fri, 02 Dec 2016 24:00:00 EST

In this week's Computer Weekly, as Ofcom moves to force a split between BT and its Openreach subsidiary, we examine whether the regulator's action will improve the roll out of full-fibre broadband. Our buyer's guide looks at trends in client access devices. And IT leaders discuss the roadmap to a software-defined infrastructure. Read the issue now. Published by:

8 Key API Performance Indicators for Digital Business

Fri, 02 Dec 2016 24:00:00 EST

This white paper explores and defines some of the most common and useful key API performance indicators (KAPIs). Discover how to boost your API management and analytics with KAPIs like registered API keys, usage consistency, queries per second, and 5 more. Published by: TIBCO Software Inc.

5 Reasons Why All-Flash Storage on Oracle Is Essential for Application Owners

Thu, 01 Dec 2016 24:00:00 EST

In this article, discover the top five reasons why flash storage is a must have for application owners running Oracle. Published by: Pure Storage

Beyond the Trial: Taking OpenStack into Production

Thu, 01 Dec 2016 24:00:00 EST

This resource aims to improve your implementation of OpenStack as you transition from a trial phase into full production. By taking the steps detailed inside you can move to a production level and prepare for the next stage: utilizing the cloud for its agility and resilience. Published by: Nokia

What to Look for in IT Operations Analytics

Thu, 01 Dec 2016 24:00:00 EST

In this buyer's guide, learn what IT operations analytics is, how it works, what product features are essential and how to evaluate vendor ITOA offerings. Published by:

Beyond the Trial: Fulfilling OpenStack’s Promise of Dynamism

Mon, 31 Oct 2016 24:00:00 EDT

Once you have employed OpenStack, the next step is to harness the dynamism that's inherent in virtualization and cloud computing models. This white paper details the essential steps to take to fully leverage the benefits of the cloud virtual network. Published by: Nokia

Southern California Edison Protects Workers and Customers with EHS Management

Wed, 31 Dec 2014 24:00:00 EST

Discover how deploying one Environment, Health, and Safety (EHS) Management application will help any organization streamline management of operational risks and environmental compliance processes. Read on to learn how this EHS app streamlines incident management and automates information screening. Published by: SAP

UCaaS-to-SaaS Cooperation Offers Competitive Edge

Thu, 01 Dec 2016 24:00:00 EST

In this edition of Network Evolution, find out how integrating your unified communications platform with mission-critical enterprise applications like Salesforce can provide significant competitive advantage by reducing human error and offering new insight into customer behavior. Published by:

Networking & Digital Transformation: ANZ

Thu, 01 Dec 2016 24:00:00 EST

What are the digital transformation trends driving major changes in enterprise networking strategy? In this guide, we look at the IoT and smart city initiatives currently taking off in Australia/New Zealand, look at how hyper-converged infrastructure can enhance networking capabilities and why more businesses are refreshing aging infrastructure. Published by:

Devise a Cloud Strategy that Doesn't Cast a Shadow on App Performance

Wed, 30 Nov 2016 24:00:00 EST

Download this paper to learn how to devise a cloud strategy that doesn't cast a shadow on, or deter, app performance. Discover several cloud deployment models compared for their visibility and control, including private cloud, SaaS, and 2 more. Published by: Riverbed Technology, Inc.

Big Data Management: Streamlining IoT App Development

Tue, 29 Nov 2016 24:00:00 EST

This custom article explores how a multi-model, multi-workload data platform with support for both structured and unstructured data alike can streamline the IoT app development lifecycle. Discover how to simplify IoT and big data management with a development approach that blends analytics, natural language processing, and more. Published by: InterSystems

Give Them Access. NOT a VPN

Tue, 29 Nov 2016 24:00:00 EST

Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk. Published by: Bomgar Corp.

CenterPoint Properties Overcomes Poor Office 365 Performance in the Cloud

Tue, 29 Nov 2016 24:00:00 EST

In this case study, you'll learn how CenterPoint Properties was able to realize a 63% decrease in Office 365 traffic and implement on-going network monitoring and faster troubleshooting. Access now to learn more. Published by: Riverbed Technology, Inc.

Case Study: Sub-Zero Group, Inc. Requires Improved App Performance and Visibility

Tue, 29 Nov 2016 24:00:00 EST

Sub-Zero Group accelerated Office 365 performance, cut application troubleshooting times to less than a minute, and improved the customer experience in their showrooms. Access this case study to learn how they achieved these goals. Published by: Riverbed Technology, Inc.

Crunching the Costs of Microsoft Exchange On-premises vs. Cloud Services

Tue, 22 Nov 2016 24:00:00 EST

Download this expert guide to learn how to calculate the costs of on-premises Exchange versus those of Office 365's mail service, and from this assessment deduce if the O365 cloud is your enterprise's best option for collaboration. Discover new cost factors such as electricity, bandwidth needs, personnel expenses, and more. Published by: Riverbed Technology, Inc.

CIO's Security Checklist: Do You Know What Your Vendors are Doing?

Mon, 28 Nov 2016 24:00:00 EST

This short infographic asks an important question: Do you have complete visibility intro what your vendors are doing in your network? Learn why legacy solutions used by companies today don't provide the granular control of access required to ensure security. Published by: Bomgar Corp.

Application Performance Tools for Microsoft Office 365

Mon, 28 Nov 2016 24:00:00 EST

Access this resource to discover an app performance tool that will transform Office 365 by leveraging hybrid IT for new forms of operational and network agility. Learn how to enact complete performance awareness of O365 apps and make optimal use of network resources by analyzing design and traffic. Published by: Riverbed Technology, Inc.

How to Facilitate a Successful Transition to Office 365: A Brief Video

Fri, 16 Sep 2016 24:00:00 EDT

Discover a tool that will identify and mitigate hidden network constraints to ensure a smooth transition to O365. Here, learn how to analyze your network requirements with dependency mapping, capacity planning, and SLA analyses to ensure the best performance for all O365 end users. Published by: Riverbed Technology, Inc.

IBM FlashSystem: Powering the Future of IT

Fri, 30 Jan 2015 24:00:00 EST

This white paper explains how flash storage can provide the performance and security needed to run these apps and prevent data breaches. Access now and discover how flash can help 5 key drivers of info technology: cloud, data analytics, mobile and social engagement and security. Published by: IBM

Top 3 Cybersecurity Challenges Facing Healthcare Organizations

Thu, 30 Jun 2016 24:00:00 EDT

Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation. Published by: Arctic Wolf Networks, Inc.

Advanced Network Device Troubleshooting & End-to-End Visibility

Wed, 23 Nov 2016 24:00:00 EST

This webinar is designed to show how you can manage and monitor all aspects of your IT infrastructure now that we live in a hybrid world. Discover a network performance monitor, and view demos of the product in action. Published by: SolarWinds, Inc.

The Top Cybersecurity Risks – And How Enterprises Are Responding

Mon, 31 Oct 2016 24:00:00 EDT

Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers. Published by: Arctic Wolf Networks, Inc.

The 7 Step Hack: Thinking Like a Cybercriminal

Tue, 22 Nov 2016 24:00:00 EST

Discover how even a VPN secure network can be cracked open in 7 simple steps, leaving your enterprise at the mercy of hackers. Learn how to control, monitor, and mange access to critical systems by privileged users, including third-party vendors, without leaving yourself open to malicious activity. Published by: Bomgar Corp.

SD-WAN Market Swells Because of Cloud-Based Business Apps

Fri, 18 Nov 2016 24:00:00 EST

IDC predicts that the SD-WAN market will hit $6 billion by the year 2020, with a 90% annual growth rate. This expert e-guide takes a look at the current SD-WAN market swell and how it's attributed to cloud-based business apps. Published by: Silver Peak

SD-WAN Technology Promises Enterprises Control, Cost Savings

Mon, 21 Nov 2016 24:00:00 EST

The time for SD-WAN is now. Access this e-guide to discover the potential benefits of adopting SD-WAN, as well as how to achieve ROI with SD-WAN technology. Published by: Silver Peak

SD-WAN Market Consolidation, APIs, SDN and More

Mon, 21 Nov 2016 24:00:00 EST

Will the software-defined WAN market consolidate? How are APIs affecting software-defined networking? And what is the state of cybersecurity in the next presidency? In this expert e-guide, 3 industry veterans answer these questions to help you stay abreast of the evolving landscape. Published by: Silver Peak

SD-WAN Could Hurt NFV: How to Keep Up

Mon, 21 Nov 2016 24:00:00 EST

Keeping up with the barrage of industry developments and "must-know" technologies, without getting completely overwhelmed is hard. In this e-guide, three industry experts dive into why SD-WAN can spell trouble for NFV, how to stay up to date with industry developments and why you shouldn't be too quick to dismiss open networking. Published by: Silver Peak

Optimizing the Digital User Experience

Mon, 14 Nov 2016 24:00:00 EST

Join David Gehringer, Principal at Dimensional Research, and Antoine Aymer and Eric Odell, HPE Tech Evangelists and Digital UX experts, as they uncover the values of effective user experience management (UEM.) Learn how true user experience management requires a true lifecycle approach. Published by: Hewlett Packard Enterprise

Managing DNS Performance with Synthetic Monitoring

Mon, 21 Nov 2016 24:00:00 EST

In this e-book, you will see the various ways you can monitor and manage DNS through synthetic monitoring capabilities, and some of the particular DNS challenges and pitfalls you have to prepare for as part of any performance management strategy. Published by: Catchpoint Systems Inc.

Consider These SD-WAN Architecture Pitfalls Before Adoption

Thu, 17 Nov 2016 24:00:00 EST

The ROI for SD-WAN can be high, but there are a range of factors to consider before implementation. This expert e-guide details key considerations to keep in mind as you evaluate SD-WAN architecture for your environment. Published by: Silver Peak

Mitigate Data Theft and Inappropriate Use in your Network

Fri, 18 Nov 2016 24:00:00 EST

Security teams need tools to help deliver the deep insight necessary to detect a variety of threats. Uncover ways to detect and respond to today's security incidents with tools designed to pinpoint abnormal activity and prevent sensitive data loss. Published by: LogRhythm, Inc.

Why Officially Supported Clients aren't Optional in API Projects

Wed, 16 Nov 2016 24:00:00 EST

APIs are about more than just coordinating software processes, building code, and integrating the various pieces of app development – they're about community and communication. In this expert e-guide, explore the use of open source and building relationships with officially supported clients to help guide API projects. Published by: TIBCO Software Inc.

Implementing Proactive API Portfolio Management

Thu, 17 Nov 2016 24:00:00 EST

In this expert e-guide, we explore how to create an active, cloud-enabled API portfolio management strategy. Uncover helpful advice for enabling easy multisource integration and discover which tools can help radically improve API management. Published by: TIBCO Software Inc.

Mitigate Security Risks with Hyperconverged Infrastructure

Thu, 31 Dec 2015 24:00:00 EST

Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls. Published by: SimpliVity

From Reactive to Proactive: How to Avoid Alert Fatigue

Mon, 31 Oct 2016 24:00:00 EDT

Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected. Published by: ThreatConnect

API Portfolio Management: Setting Goals for API Success

Thu, 17 Nov 2016 24:00:00 EST

In this e-guide, expert Tom Nolle explains how to improve API portfolio management by setting goals for development, operations and ALM, and compliance. Discover which tools can help build strong API portfolios and uncover useful tips about cloud-based API management. Published by: TIBCO Software Inc.

APIs: Bridging the Bimodal IT Gap

Fri, 18 Nov 2016 24:00:00 EST

This webcast explores the concept of bimodal IT examines how APIs can connect its two sides, aligning their different cultures, speeds, strategies, and governance. Discover how APIs help expose critical data and open up its availability, creating an interface for Agile development and IT services. Published by: TIBCO Software Inc.

Office 365: Enabling More Secure Collaboration

Fri, 18 Nov 2016 24:00:00 EST

How can you ensure secure collaboration with Office 365? Learn 3 steps to make this possible, as well as 3 stages of adoption for security add-ons for Office 365. Published by: VMware

The Connected Enterprise: Unify Communications to Manage Beyond the Remote Workforce

Fri, 18 Nov 2016 24:00:00 EST

The modern workplace no longer requires the whole team to be physically present. Email, video and instant messaging/social networking allow for almost instantaneous sharing of ideas. Learn how to manage your remote workforce by unifying these channels, and providing remote access to data while maintaining compliance. Published by: Arkadin + BlueJeans

User Experience Modeling Tools In The Age Of Digital Transformation

Mon, 31 Oct 2016 24:00:00 EDT

In this research paper from Enterprise Management Associates, find out why many companies engaged in digital transformation initiatives are leveraging user experience modeling (UEM) tools to gauge how successfully a new application has been adopted by their employees. Then, discover which program stands apart from its competitors and why. Published by: Catchpoint Systems Inc.

2017 State of SaaS Performance Report

Fri, 18 Nov 2016 24:00:00 EST

This custom report explores the state of SaaS performance, examining several of the key challenges SaaS providers currently face (or will face) in the near future due to increasing complexity. Uncover valuable tips, like how to identify SaaS performance issues and put the right tools and services in place to ensure consistent performance. Published by: Catchpoint Systems Inc.

Argos Leverages APIs to Boost Mobile and Digital Retail Strategies

Tue, 22 Sep 2015 24:00:00 EDT

Access this case study to discover how Argos enabled secure digital retail and seamless integrations across a variety mobile devices and platforms by implementing an API-based strategy to build apps in both open and closed development communities. Published by: TIBCO Software Inc.

APIs: Enhancing Retail, Mobile, and Integration Strategies

Tue, 22 Sep 2015 24:00:00 EDT

This white paper explores how an API-based strategy is essential to multichannel, cross-device access to essential data for developers – whether they be in-house, partners, or affiliates. Discover how companies like Netflix, Expedia, and Citibank are leveraging APIs to accelerate their mobile strategies, transform partner integrations, and more. Published by: TIBCO Software Inc.

SDN and NFV: Increasing Business Benefits and Driving Network Change

Mon, 14 Nov 2016 24:00:00 EST

This expert e-guide details three technologies that can increase the benefits of SDN and NFV. Access now and you'll also learn how NFV and SDN can work in tandem in new network infrastructure design. Published by: NTT America, Inc.

The UC Market: UCaaS, Video, SIP Trunking and More

Mon, 14 Nov 2016 24:00:00 EST

This expert e-guide explains how you can continue to support video streaming on your multicast network. Additionally, learn how the UCaaS market is soaring due to cloud and why enterprises are beginning to use SIP trunking services. Published by: NTT America, Inc.

Demo: A Look Inside a Security Intelligence Platform

Wed, 10 Feb 2016 24:00:00 EST

In this video, you'll learn how to consolidate data from thousands of devices, endpoints and applications distributed throughout your network. You'll hear about how a security intelligence platform can replace dozens of point products helping you collect more information and make quicker decisions about threats in your network. Published by: IBM

Unify Your Data Center Operations

Thu, 31 Dec 2015 24:00:00 EST

This webcast discusses how a software-defined data center solution allows you to virtualize your data center while still providing connectivity to your essential, legacy physical resources. Learn how to achieve your virtualization goals and simplify the full lifecycle of network operations. Published by: Juniper Networks, Inc.

Fabric Solutions for Data Centers

Tue, 30 Jun 2015 24:00:00 EDT

This video discusses how a fabric solution allows you to customize your data center network to meet the specific needs of your traffic and applications. Learn how this fabric solution can facilitate the evolution from an old fashioned 3-tiered network to an integrated network designed for current and future applications and services. Published by: Juniper Networks, Inc.

The Case for Modern Network Security Operations

Fri, 30 Sep 2016 24:00:00 EDT

In this ESG white paper, examine how network security operations are completely fraught with challenges that need to be met in order for your organization to effectively protect itself. Published by: Forcepoint