Subscribe: Most Popular White Papers and WebcastsNetwork Hardware and Software Research
http://bitpipe.com/data/bpXchange?b=ka_bp_nethwsw&d=31&f=rss&u=rss
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
case study  data  enterprise  learn  management  mobile security  mobile  published  security  software  storage  technology  wan 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsNetwork Hardware and Software Research

Most Popular White Papers and Webcasts Network Hardware and Software Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Mon, 05 Dec 2016 12:25:13 EST

Last Build Date: Mon, 05 Dec 2016 12:25:13 EST

 



Macy's Directs Millennial Traffic with API-led Mobile Development

Wed, 14 Sep 2016 24:00:00 EDT

This case study examines how Macy's optimized their mobile app to improve the customer experience. Find out how they increased market share and awareness by creating targeted mobile features for the millennial demographic with an API-led strategy. Published by: TIBCO Software Inc.



Increase Server Performance and Productivity

Mon, 05 Dec 2016 24:00:00 EST

This brief provides ideas on how you can refresh your old servers before your competition does. Learn how the economic and performance benefits of updating your servers on a regular basis can dramatically outweigh the time, cost, and effort of doing so. Published by: Dell EMC and Intel®



Enable Advanced Ethernet Fabric Capabilities and Scalable Networking

Mon, 05 Dec 2016 24:00:00 EST

Read this white paper and learn about network switches that allow you to overcome key challenges, and enable you to support cloud-optimized networking and greater enterprise agility. Learn about Ethernet fabric technology, and how it is helping organizations overcome barriers to network optimization. Published by: Brocade



Corridor Warrior: How IT Empowers the Future-Ready Workforce

Mon, 05 Dec 2016 24:00:00 EST

Is your IT meeting its user requirements? Learn how to implement an end-to-end IT management strategy that encapsulates the needs of the modern, mobile, dynamic workforce. Read on to assess your hardware and software, and ensure your IT supports productivity. Published by: Dell, Inc. & Intel®



Modernizing IT Infrastructure: Empower Businesses with Heightened Productivity

Sat, 31 Oct 2015 24:00:00 EDT

This white paper explores 10 of the most important IT priorities, focusing on the impact of big data, hybrid clouds, mobility, and security. Discover how to break away from static infrastructures and siloed data in order to keep up with the management demands of increasingly complex apps. Published by: Hewlett Packard Enterprise



Get Ready for the Cloud X.0 Experience

Sat, 05 Nov 2016 24:00:00 EDT

This white paper identifies some of the tell-tale signs of cloud disconnect resulting in the dissatisfaction of its customers. It also identifies a cloud solution that works best with mobile devices as well as diversified features allowing you to communicate and collaborate efficiently. Published by: TechData Corporation



How Virtualization is Transforming Technology Delivery in Healthcare

Thu, 17 Nov 2016 24:00:00 EST

Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Tune into this podcast as leaders from the nation's leading health systems discuss why application virtualization is reshaping care delivery and improving security. Published by: Citrix and Pure Storage



HPE StoreFabric Gen 6 Fibre Channel Server and Storage Solution

Wed, 30 Nov 2016 24:00:00 EST

This resource provides an evaluation of a fibre channel server and storage solution. It explains why datacenters are pairing their high-performance dual-socket servers with Fibre Channel solid-state (flash) storage systems, to improve storage performance. Published by: HPE and Brocade



How Virtualization is Transforming Technology Delivery in Healthcare

Thu, 01 Dec 2016 24:00:00 EST

Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Download this resource as leaders from the nation's leading health systems demonstrate how application virtualization is reshaping care delivery and improving security. Published by: Citrix and Pure Storage



Trends in Mobile User Authentication

Thu, 01 Dec 2016 24:00:00 EST

Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more. Published by: HID



Important Modern Trends in Digital Banking

Wed, 30 Nov 2016 24:00:00 EST

Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more. Published by: HID



HPE StoreFabric SN6600B Gen6 FC Switch

Mon, 28 Nov 2016 24:00:00 EST

This webcast discusses a fibre channel switch that optimizes your storage network for flash storage and virtualized applications and is designed for large enterprise salability. Published by: HPE and Brocade



HPE StoreFabric SN8600B Gen6 SAN Director Switch

Mon, 28 Nov 2016 24:00:00 EST

This webcast discusses a fibre channel SAN director that optimizes your storage network for flash storage and virtualized applications and is designed for large enterprise salability. Published by: HPE and Brocade



Solved: Common VDI Storage Challenges

Tue, 08 Mar 2016 24:00:00 EST

Discover how your storage peers are solving their most complex VDI challenges with all-flash array technology and learn how you can answer your most demanding VDI storage issues including complexity, cost, end-user experience and more. Published by: Dell EMC and Intel®



CenterPoint Properties Overcomes Poor Office 365 Performance in the Cloud

Tue, 29 Nov 2016 24:00:00 EST

In this case study, you'll learn how CenterPoint Properties was able to realize a 63% decrease in Office 365 traffic and implement on-going network monitoring and faster troubleshooting. Access now to learn more. Published by: Riverbed Technology, Inc.



Case Study: Sub-Zero Group, Inc. Requires Improved App Performance and Visibility

Tue, 29 Nov 2016 24:00:00 EST

Sub-Zero Group accelerated Office 365 performance, cut application troubleshooting times to less than a minute, and improved the customer experience in their showrooms. Access this case study to learn how they achieved these goals. Published by: Riverbed Technology, Inc.



SAP HANA and IBM Power Systems Means IT Simplification

Tue, 29 Nov 2016 24:00:00 EST

This video describes how one company's power architecture-based server line now has a combined offering that supports faster transactions, better data management, openness, and innovation. All while keeping up with demands around data management, while lowering operating costs. Published by: IBM



SAP HANA on IBM Power Systems

Mon, 28 Nov 2016 24:00:00 EST

This white paper describes how one company's Power Architecture-based server line now has a combined offering that supports faster transactions, better data management, openness and innovation. All while keeping up with rising demands around data management, while lowering operating costs and ensuring scalability. Published by: IBM



BYOD and Mobile Security Report

Mon, 28 Nov 2016 24:00:00 EST

Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age. Published by: BitGlass



Securing BYOD without MDM

Mon, 28 Nov 2016 24:00:00 EST

Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents. Published by: BitGlass



Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado

Tue, 29 Nov 2016 24:00:00 EST

In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now. Published by: ComputerWeekly.com



How MDM Software Exposes Your Personal Data

Wed, 23 Nov 2016 24:00:00 EST

Several willing participants had MDM software put on their personal devices. The outcome? At the click of a button information on the participants' interests, activities, relationships, and more were compromised. Access now to uncover how MDM software can actually put your personal data at risk and what can be done to stop it. Published by: BitGlass



Top 3 Cybersecurity Challenges Facing Healthcare Organizations

Thu, 30 Jun 2016 24:00:00 EDT

Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation. Published by: Arctic Wolf Networks, Inc.



The Top Cybersecurity Risks – And How Enterprises Are Responding

Mon, 31 Oct 2016 24:00:00 EDT

Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers. Published by: Arctic Wolf Networks, Inc.



Exchange 2016 Upgrade Outlined and Considerations for Your Recovery Plan

Tue, 22 Nov 2016 24:00:00 EST

This expert guide illustrates five migration issues that IT admins must tackle in order to upgrade to Exchange 2016 without adversely affecting end users. Additionally, read on to formulate a recovery plan for Office 365 outages by asking yourself the seven essential questions outlined here. Published by: Riverbed Technology, Inc.



Bottom-Up Data Center Power Management

Fri, 28 Apr 2017 24:00:00 EDT

To remain competitive, it's critical to measure power but with limited budgets, this can become quite difficult. A system featuring intelligent rack PDUs with outlet switching and outlet-level power measurement coupled with power and energy management software is an affordable way to efficiently analyze power consumption. Read on to learn more. Published by: Server Technology, Inc.



Arapahoe House Secures BYOD

Tue, 22 Nov 2016 24:00:00 EST

In this case study examine how Arapahoe House, a non-profit & leading provider of substance use disorder treatment in Colorado, deployed a security policy for their BYOD users that allowed them to selectively wipe BYOD data, streamline provisioning and de-provisioning, gain visibility into all BYOD usage, and more. Published by: BitGlass



SD-WAN Market Swells Because of Cloud-Based Business Apps

Fri, 18 Nov 2016 24:00:00 EST

IDC predicts that the SD-WAN market will hit $6 billion by the year 2020, with a 90% annual growth rate. This expert e-guide takes a look at the current SD-WAN market swell and how it's attributed to cloud-based business apps. Published by: Silver Peak



SD-WAN Technology Promises Enterprises Control, Cost Savings

Mon, 21 Nov 2016 24:00:00 EST

The time for SD-WAN is now. Access this e-guide to discover the potential benefits of adopting SD-WAN, as well as how to achieve ROI with SD-WAN technology. Published by: Silver Peak



SD-WAN Market Consolidation, APIs, SDN and More

Mon, 21 Nov 2016 24:00:00 EST

Will the software-defined WAN market consolidate? How are APIs affecting software-defined networking? And what is the state of cybersecurity in the next presidency? In this expert e-guide, 3 industry veterans answer these questions to help you stay abreast of the evolving landscape. Published by: Silver Peak



Mobile application platforms: Essential guide

Mon, 21 Nov 2016 24:00:00 EST

One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience. Published by: ComputerWeekly.com



The Definitive Guide: Infrastructure for Desktop Virtualization

Sat, 01 Oct 2016 24:00:00 EDT

Dive into this comprehensive eBook to get the details you need for starting virtualization. Written by Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and edited by Sachin Chheda of Nutanix™, you get all the detailed analysis and key points to consider Published by: Lenovo



Consider These SD-WAN Architecture Pitfalls Before Adoption

Thu, 17 Nov 2016 24:00:00 EST

The ROI for SD-WAN can be high, but there are a range of factors to consider before implementation. This expert e-guide details key considerations to keep in mind as you evaluate SD-WAN architecture for your environment. Published by: Silver Peak



Mitigate Data Theft and Inappropriate Use in your Network

Fri, 18 Nov 2016 24:00:00 EST

Security teams need tools to help deliver the deep insight necessary to detect a variety of threats. Uncover ways to detect and respond to today's security incidents with tools designed to pinpoint abnormal activity and prevent sensitive data loss. Published by: LogRhythm, Inc.



Take the Work Out of Working Together with More Efficient Collaboration

Fri, 18 Nov 2016 24:00:00 EST

This infographic illustrates the value of real-time document co-authoring and collaboration, as evidenced by one tool which streamlines communications between both the remote and in-office workforce. Download now to reclaim collaboration efficiency. Published by: Microsoft



Office 365: Enabling More Secure Collaboration

Fri, 18 Nov 2016 24:00:00 EST

How can you ensure secure collaboration with Office 365? Learn 3 steps to make this possible, as well as 3 stages of adoption for security add-ons for Office 365. Published by: VMware



When Does 1 Hour Equal 6 Figures? The Cost of Salespeople Not Selling—And How to Fix It

Fri, 18 Nov 2016 24:00:00 EST

Discover five methods for recapturing value by creating more time for your salespeople's' most valuable functions—including advice on how to curb the application flipping, enable social selling, mobilizing CRM apps and analytics, and more. Published by: Microsoft



Dynamic Security Management for a Productive Mobile Workforce

Tue, 24 May 2016 24:00:00 EDT

This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more. Published by: RES Software



Argos Leverages APIs to Boost Mobile and Digital Retail Strategies

Tue, 22 Sep 2015 24:00:00 EDT

Access this case study to discover how Argos enabled secure digital retail and seamless integrations across a variety mobile devices and platforms by implementing an API-based strategy to build apps in both open and closed development communities. Published by: TIBCO Software Inc.



The Mission-Critical Scale-Up x86 Platform for SAP, Oracle, and SQL Server

Thu, 30 Jun 2016 24:00:00 EDT

Learn how to improve application uptime, and standardize and consolidate mission-critical processing, with a scale-up, x86 platform which supports SAP, Oracle, and SQL Server databases. Download this report to greet the growing demands of decision support and business processing workloads. Published by: Hewlett Packard Enterprise



API Management Platforms: Seamless Integration between Physical and Digital Worlds

Tue, 22 Sep 2015 24:00:00 EDT

Explore how an API management platform provides seamless integration across multiple channels and ensures easy communication between your company and its employees, customers, and partners. Find out how retail companies like Coca Cola have already started to leverage APIs to change the transaction experience and boost customer relations. Published by: TIBCO Software Inc.



The Touch-Free Future and Current Adoption Trends of SDN

Fri, 11 Nov 2016 24:00:00 EST

There's a significant amount of work needed prior to reaching a future in which no-touch technology is in wide use and SDN security is common. Learn why experts say it's time to transform network change management and security to what is suitable for today's business climate and discover the status of SDN adoption and deployment in the enterprise. Published by: Juniper Networks, Inc.



Professional IT Services: The Advantages of IT Outsourcing

Fri, 29 Mar 2013 24:00:00 EDT

This video discusses one IT service provider that can support the IT operations of any enterprise. Learn about the wealth of reputable IT services this vendor offers including data center services, IT outsourcing and IT integration services, network solutions, telecommunication solutions and more. Published by: Comarch



Nearshoring IT Operations for a Top Travel Company

Wed, 07 Sep 2016 24:00:00 EDT

A top travel company needed a service provider who could deliver on-going support of the data center and assist in the knowledge transfer process between the company's previous provider. This case study details the advantages gained by choosing one particular MSP. Published by: Comarch



From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts

Wed, 02 Nov 2016 24:00:00 EDT

In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components. Published by: HP



How Passive Optical LAN Outshines Copper-Based LAN

Mon, 14 Nov 2016 24:00:00 EST

Passive optical LAN (POL) uses optical fiber instead of copper cabling, and its GPON supplies high-speed internet services to more than 100 million users and businesses around the world. Watch this video to learn more about the areas POLs can improve upon, including bandwidth, cost, security, and more. Published by: Nokia



Change the Dynamics of Your IT

Wed, 31 Aug 2016 24:00:00 EDT

This white paper explains why IT outsourcing, i.e. defining and isolating certain areas of IT in the enterprise and then transferring them to specialized third parties, is currently the best way to effectively develop and maintain the IT environment. Learn how you can simplify your IT now. Published by: Comarch



The SDN Charge and the New Role in Mobile Security

Fri, 11 Nov 2016 24:00:00 EST

Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today. Published by: Juniper Networks, Inc.



Lenovo X6 Mission Critical Servers

Mon, 14 Nov 2016 24:00:00 EST

IT professionals and data centers are challenged with growing demand for services and the resources to deploy, maintain, and manage them. In this infographic, learn how Lenovo X6 Mission Critical Servers can help meet these ever-increasing needs. Published by: Lenovo



IT Project ANZ: Virtualisation

Mon, 14 Nov 2016 24:00:00 EST

Before cloud and big data began to dominate the IT headlines, virtualisation was all the rage in the enterprise space. While the focus may have shifted to these more fashionable technologies, virtualisation is once again gaining popularity, and the ANZ market is maturing faster than most. Published by: ComputerWeekly.com