Subscribe: Most Popular White Papers and WebcastsNetwork Design and Management Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
business  cloud  data  discover  enterprise  infrastructure  learn  mobile  network  published  red hat  security  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsNetwork Design and Management Research

Most Popular White Papers and Webcasts Network Design and Management Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Fri, 21 Oct 2016 16:35:18 EDT

Last Build Date: Fri, 21 Oct 2016 16:35:18 EDT


Key Features and Benefits of Effective Mobile Development

Fri, 21 Oct 2016 24:00:00 EDT

Explore ways to bring agility, integration, and centralized control to mobile innovation. Access this resource and learn how to achieve flexibility for developers, continuous delivery for DevOps, tools that create apps quickly, and more. Published by: Red Hat

DNS For Hybrid Cloud Success

Fri, 21 Oct 2016 24:24:20 EDT

This webcast addresses industry concerns about applications hosted in a hybrid cloud, as well as explores various strategies for implementing cloud services in your business. Learn some successful cloud adoption tactics like using traditional technologies to assist cloud migration and focusing on a 3-part migration life-cycle. Published by: Dyn

Unified Mobility Management: Manage Everything from Phones to Tablets, PCs to Remote Sensor Devices

Fri, 21 Oct 2016 24:00:00 EDT

In response to complexity and TCO challenges, unified mobility has emerged as the next phase of device management. Say goodbye to maintaining parallel support infrastructures for mobile devices and PCs by bringing them under one umbrella. Published by: IBM

Enterprise Mobility Management: Mobile Device Management's Expansion to Devices, Apps and Content

Fri, 21 Oct 2016 24:00:00 EDT

This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously. Published by: IBM

What Increased Powered-Device Wattages Means For The Future of Cabling

Tue, 30 Jun 2015 24:00:00 EDT

Use this whitepaper to gain an insight into the current cutting-edge of power cable design, but also a glimpse into the direction this industry is heading, and how enterprises can adjust their practices to become early adopters. Published by: Panduit

Converged System Revs Up App Performance

Fri, 31 Jul 2015 24:00:00 EDT

Make infrastructure deployment easy, efficient and versatile: Tune into this brief video to discover how integrated, converged infrastructure delivers faster and more reliable execution of business apps with the versatility to adapt as priorities change. Published by: IBM

Explore the Evolving DDoS Threat Landscape

Tue, 18 Oct 2016 24:00:00 EDT

Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more. Published by: Radware

Data Centers in the Crosshairs: Today's Most Dangerous Security Threats

Thu, 20 Oct 2016 24:00:00 EDT

Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure you're enterprise isn't their next victim. Published by: A10 Networks

Ransomware, Phishing and APTs: What Can be Done About These Growing Threats

Thu, 20 Oct 2016 24:00:00 EDT

Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs. Published by: Barracuda Networks

Rapid Mobile Innovation Begins at the Business Level

Thu, 20 Oct 2016 24:00:00 EDT

Decision-making is hampered by mobile app development issues, but your greatest barriers might just be huge misconceptions. Uncover seven common myths that stall mobile innovation, and four ways to boost your app development business case. Published by: Red Hat

Putting Digital at the Heart of Development

Thu, 20 Oct 2016 24:00:00 EDT

This resource explores the forces that are driving digital transformation. Learn how to enable innovation and creativity by reimagining software architecture, development methodologies, business processes, and more. Published by: Red Hat

Microservices for Java Developers

Thu, 30 Jun 2016 24:00:00 EDT

This extensive e-book explores how Java developers and architects can assess whether or not a microservice architecture is right for their organization. Discover how to implement microservices successfully by finding out what other companies have done to make them work for their cultures, organizational structures, and market pressures. Published by: Red Hat

The Business Value of Printer Security

Mon, 30 Nov 2015 24:00:00 EST

This resource from IDC explores how implementing or increasing you rprinter security can help save money and increase IT efficiency. Learn how to increase security by decommissioning out-of-date devices, balance tight enable all devices with encrypted communications protocols, and more. Published by: HP

How the Cloud Stretches Enterprise Networks

Thu, 20 Oct 2016 24:00:00 EDT

This white paper explores how to provide your IT pros with real-time cloud diagnostics to make sure that your network is always running smoothly. Inside learn how you can gain insight into slowdowns and errors in critical elements of your cloud network, discover the contact information of problem nodes, and more. Published by: SolarWinds, Inc.

Gala Leisure Ltd. Harnesses Cost-effective Storage to Optimize IT Resource Use

Thu, 20 Oct 2016 24:00:00 EDT

Download this case study to discover how Gala Leisure cut storage support and operational costs in half by employing a low-latency flash appliance, which additionally resulted in a 98% reduction in required floor space, reduced the data center footprint, and offers rapid deployment and execution of critical business apps. Published by: IBM

10 Critical Requirements for Optimizing Application Delivery

Wed, 19 Oct 2016 24:00:00 EDT

Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more. Published by: A10 Networks

A Platform for Modernizing Java Applications: Designing Workloads for the Cloud and Modern Ecosystems

Wed, 19 Oct 2016 24:00:00 EDT

Java-based applications can enable modern development in a cloud-friendly environment. Learn how cloud-based application deployment allows you to take advantage of existing resources while moving toward newer (read: digital) application models. Published by: Red Hat

Barracuda NextGen Firewall X: Simple Cloud-Based Network Management for Small to Midsized Businesses

Fri, 30 Sep 2016 24:00:00 EDT

Discover a next-generation firewall that can stand up to new and evolving cyber threats. Gain antivirus and web filtering functionality without the need for additional IT staff or special training. Published by: Barracuda Networks

The 10 Pillars of Mobile Excellence, And How They Work In The Real World

Wed, 19 Oct 2016 24:00:00 EDT

In this white paper, learn "the 10 pillars of mobile excellence" which can help improve all aspects of your business from customer service to sales. Find out how to discover the end-goal of your mobile maturity, identify the hurdles towards mobile success, plan app deployment in stages, and more inside. Published by: Red Hat

Mobile Becomes A Key Success Imperative For CIOs

Thu, 12 Nov 2015 24:00:00 EST

This report leverages Forrester's survey data to depict the current state of the CIO's mobile mind shift and their ability and willingness to support comprehensive mobile solutions. Learn why mobility is now the single most critical tool at your enterprise for your continued success and how to best use it by accessing now. Published by: Red Hat

Printer and Embedded Device Security

Fri, 01 May 2015 24:00:00 EDT

Many printers and embedded devices fail to meet today's enterprise security needs. Uncover five key security capability categories that should be addressed in order to ensure hackers aren't exposing these weak links. Published by: HP

Using DNS Monitoring to Detect Network Breaches

Mon, 17 Oct 2016 24:00:00 EDT

Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests. Published by: Dyn

Develop Mobile Apps at the Speed of Business

Tue, 18 Oct 2016 24:00:00 EDT

Discover ways to shorten (and support) the full app development lifecycle without letting line of business workers and non-developer stakeholders encumber the process. Read on to also learn strategies for enabling developers to more efficiently design, collaborate, and test apps across mobile environments. Published by: Kony

Stop Malware Before It Stops You

Tue, 31 Dec 2013 24:00:00 EST

Detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways. Published by: Trustwave

How Eurostar Was Able to Dramatically Reduce Their Monthly Mobile Bill

Tue, 18 Oct 2016 24:00:00 EDT

In this case study discover how Wandera, an international transportation company, found a way to cut monthly expenses by deploying Wandera software in synchronization with their existing MDM solution. Learn how they were able to restrict access of roaming users in countries where business doesn't operate, cut monthly bills by 40%, and more. Published by: Wandera

Best-of-Breed Next-Generation Security For the Mid-Market

Fri, 30 Sep 2016 24:00:00 EDT

Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats. Published by: Barracuda Networks

How DNS Information Can Help Cut Millions from Your Infrastructure Costs

Mon, 17 Oct 2016 24:00:00 EDT

One of the hardest things about infrastructure planning in the web-enabled world is estimating capacity needs, especially from a network perspective. This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Published by: Dyn

Masergy's Unified Enterprise Security Solution

Tue, 18 Oct 2016 24:00:00 EDT

This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency. Published by: MASERGY

Data Center Design Best Practices: Efficiencies Beyond Power and Cooling

Wed, 31 Dec 2014 24:00:00 EST

This white paper details five key elements that should be considered when designing today's data center. Learn these elements to help attain complete efficiency in your data center design. Published by: Legrand

A Golden Age Dawns for Network Services

Mon, 17 Oct 2016 24:00:00 EDT

Advanced network technology options have expanded, offering enterprises better, but cheaper, options for network services. Published by:

The Security Risks of Network Sensors in the Enterprise

Tue, 11 Oct 2016 24:00:00 EDT

In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets. Published by: IBM

Internet of Things Application Guide

Wed, 31 Aug 2016 24:00:00 EDT

The Internet of Things (IoT) is making an unprecedented positive impact on how commercial buildings are managed and operated. This white paper explains how to construct an IoT ready building design, so you can reap all the benefits IoT has to offer. Published by: Legrand

Mapping the Demands of Real-World Apps — One IO at a Time

Mon, 17 Oct 2016 24:00:00 EDT

When considering variables such as transactions completed in a period of time (transaction efficiency) or throughput (transfer efficiency), it becomes clear that not all deployments of the same application will behave similarly. Access this analysis to explore deployment-to-deployment variation for several common application categories. Published by: Nimble Storage

SDN and NFV in the WAN

Fri, 29 Jul 2016 24:00:00 EDT

This white paper provides insights into SDN and NFV by answering questions like: What are they? What's driving them? How are they related to each other? And you will learn the value that SDN and NFV bring to the WAN. Published by: MASERGY

Accelerating Mobile App Development

Wed, 31 Aug 2016 24:00:00 EDT

This white paper details how to overcome today's mobile app development challenges by way of new enterprise grade software tools and frameworks that finally enable model-driven application development (MDAD) for the mobile space. Published by: Kony

Mobility Fuels Productivity Gains for Energy and Utilities

Mon, 17 Oct 2016 24:00:00 EDT

Download this e-book to mobilize your enterprise with strategic mobile asset and workforce management. By reading on, you will learn 6 core strategies for mobile app development, including instruction on how to make use of device-specific functionality and integrate with multiple existing systems and domains. Published by: Red Hat

Machine Learning Delivers Better IT Insights

Wed, 31 Aug 2016 24:00:00 EDT

Machine learning and advanced analytics bring many advantages to modern, self-monitoring IT. Discover ways to combine the vertical, horizontal, and correlated analytics views needed to understand the status of your apps and the infrastructure that supports them. Published by: Nimble Storage

4 Keys to More Effective CIO Succession Planning

Mon, 03 Oct 2016 24:00:00 EDT

Many companies face two dilemmas with respect to technology strategy—succession planning for retiring CIOs, and keeping up with the digital transformation of their industry. This white paper highlights the 4 keys to more effective CIO succession planning in the age of digital transformation. Published by: Infor

The Hidden Costs of ERP Customizations

Fri, 29 Jan 2016 24:00:00 EST

Customizations for enterprise resource planning (ERP) and business applications are becoming less useful and threaten to widen the functional gaps they were supposed to help bridge. Access this white paper to discover the hidden costs of ERP customizations and learn how to transition into the next generation of app personalization. Published by: Infor

Network Considerations for Digital Building Infrastructure

Mon, 17 Oct 2016 24:00:00 EDT

This webcast explores the concept of creating "Smart Space" workplaces by leveraging Power over Ethernet (PoE) technology to create digital building infrastructures. Discover how you can create smarter facility systems, like LED lighting that becomes part of an intelligent IP platform, allowing light fixtures to monitor CO2 levels and more. Published by: Panduit

Enabling Tomorrow's Connected Infrastructure for IoT

Wed, 31 Aug 2016 24:00:00 EDT

With the Internet of Things (IoT) there are new and critical network infrastructure considerations to think about as you prepare for what's ahead. This white paper highlights important considerations for designing your infrastructure to support tomorrow's needs being driven by billions of IoT connected devices. Published by: Legrand

EzVerify Finds the Optimal Scale-Out Solution for Their Storage Infrastructure

Mon, 17 Oct 2016 24:00:00 EDT

Access this case study to learn how Automated HealthCare Solutions (AHCS) transformed application performance and systems availability as a result of implementing an all-flash array, scale-out storage architecture—transforming how physicians manage dispensing and inventory and automated claims. Published by: NetApp SolidFire

If External DNS Fails, So Does Your Digital Business

Thu, 15 Sep 2016 24:00:00 EDT

Without properly functioning external DNS, Internet-based resources may "disappear" or become unavailable without warning. To boost DNS management, this Gartner research report explores the concept of externally sourced and managed DNS as a service. Access now to uncover their key findings and learn best practices for improved DNS performance. Published by: Dyn

Top 5 Pitfalls to Avoid in Your Data Protection Strategy

Fri, 30 Sep 2016 24:00:00 EDT

Discover five critical pitfalls to avoid when building a successful data protection strategy for your organization. Learn how to best navigate the various data protection solutions from digital to physical and private to public clouds while ensuring enterprise scalability. Published by: HDS and Veritas

Ease Support, Deployment, and Training with Video-Aided Remote Support Tools

Fri, 14 Oct 2016 24:00:00 EDT

This white paper discusses how remote support IT services can alleviate some of the growing challenges in managing devices. Included are the results of a survey that indicates how CIOs how deploying remote IT support as a way to alleviate some of technology management problems. Published by: LogMeIn, Inc.

Critical Capabilities for Mobile Application Development Platforms

Tue, 09 Aug 2016 24:00:00 EDT

The following research is designed to help mobile and app development leaders evaluate the most appropriate MADP across four common enterprise mobile app use cases. Uncover four key recommendations for investing in mobile app development platforms (MADPs.) Published by: Kony

Determining the Business Value of Red Hat CloudForms

Fri, 30 Sep 2016 24:00:00 EDT

Here are highlighted the benefits of a vendor-agnostic platform for self-service provisioning across hybrid multivendor virtualized, private cloud, public cloud, and container-based environments. Access now to deliver services and infrastructure resources with agility across the entire estate. Published by: Red Hat

DDoS Attacks Are On The Rise – And Fatal to Most Businesses

Tue, 11 Oct 2016 24:00:00 EDT

This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention. Published by: Arbor Networks

Protecting the Distributed Enterprise

Fri, 30 Sep 2016 24:00:00 EDT

Today, almost every distributed enterprise demands fast, transparent access to critical information. And as the data travels fast, so too must protection around it. Discover a tightly integrated infrastructure – access, networking and security - capable of meeting these demands without compromising performance or security. Published by: Fortinet, Inc.

Elevating The Design and Manufacture of World-Class Helicopters with vGPU-enabled VDI

Thu, 31 Dec 2015 24:00:00 EST

Non-GPU virtualization deployments couldn't keep up with the graphics-intensive apps Bell Helicopter, a globally recognized helicopter design and manufacturing business, required. Find out how graphics accelerated VDI delivered the graphics application performance they were looking for. Published by: NVIDIA