IT Management Research Library

Powered by Bitpipe.com

All Research

  • Reasons to Re-architect with the Cloud

    Sponsored by: Dell, Inc.

    This white paper explores two roads for moving legacy apps to the cloud: re-hosting and re-architecting. Discover the benefits of each strategy, and learn why re-architecting may be the way to go for monolithic, restrictive legacy applications that could use an agility boost.

  • Simple Steps to Prevent Data Theft

    Sponsored by: HID

    This white paper talks about the recent data breaches that have happened in the retail and financial services sector recently and describes 4 steps that can be taken to prevent data theft.

  • DevOps for Dummies

    Sponsored by: IBM

    If you're unsure about how to leverage DevOps to its greatest potential, or just looking to brush-up on your DevOps best practices, then this e-book is for you. DevOps for Dummies provides a comprehensive look at what DevOp is, how it can benefit your organization, and what you'll need to succeed.

  • Service Virtualization Vendors Compared - Analyst Report

    Sponsored by: IBM

    This Forrester Wave™ report provides an in-depth comparison of five top service virtualization vendors -- IBM, CA Technologies, HP, Parasoft, and SmartBear Software -- against 15 criteria.

  • A Multilayered Defense Approach to Protect Your Organization's Data

    Sponsored by: Symantec Corporation

    This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.

  • Head to Head Comparison: Two Top Backup Solutions Face Off

    Sponsored by: CA ARCserve

    This white paper compares two backup/data recovery tools. It shows how each performs on a number of different areas including performance, costs, ease of use and more.

  • Enterprise Information Security in Transition

    Sponsored by: IBM

    This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.

  • Adventures in Business Process Automation

    Sponsored by: Perceptive Software

    Learn about the software capable of optimizing business processes in order to increase productivity, efficiency and control across numerous back office operations.

  • Desigual - Worldwide Business Intelligence with BOARD

    Sponsored by: Board International

    This case study tells how a clothing brand found and implemented a business intelligence tool that delivered improved sales intelligence, supply chain monitoring and more.

  • Extending Security Intelligence with Big Data

    Sponsored by: IBM

    This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.

About the IT Management Research Library

The IT Management Research Library provides CIOs in India with the latest research on IT leadership and planning, governance strategies, outsourcing, business intelligence, ERP, business management software, SOA and more with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

IT Management Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.