ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET White Papers

  • Utilities Leader Gains Cross-Enterprise System for Enhanced Meter Data Management

    Sponsored by: Qualitest Group

    A major utility company upgraded its meter data management (MDM) system across three operating companies, deploying a common platform with new functionality. This case study highlights how the company improved billing services for 10 million customers and reduced IT costs by 60%. Read the full case study.

  • Case Study Red Hat Enterprise Linux (RHEL)

    Sponsored by: Red Hat

    A Red Hat Enterprise Linux user reviews its stability, security, and scalability. The report praises RHEL's customization, compliance tools, and simple setup and management. Despite the cost, the reviewer highly recommends RHEL for organizations valuing stability and security. Access the full review for details.

  • 2024 Cloud Security Report

    Sponsored by: Checkpoint Software Technologies

    As organizations increase their cloud usage, cyberattacks that target cloud infrastructure present a greater threat. This report uncovers the evolving priorities of cloud security, leveraging research from over 800 cloud and cybersecurity professionals to present a holistic bird’s-eye view of the landscape. Read on to learn more.

  • The Evolution of Network Intelligence in the Digital Age

    Sponsored by: Comcast Business

    Only 25% of IT decision-makers consider their visibility into real-time network states to be advanced, according to a survey conducted by Foundry and sponsored by Comcast Business. So, how can the other 75% of IT leaders boost their network visibility? Unlock insights in this white paper.

  • Multi-Factor Authentication Deployment Guide

    Sponsored by: Okta

    There are many steps to fully leverage the power of multi-factor authentication (MFA) security without disrupting the workforce. A modern, automated approach to MFA can help organizations control access, safely automate recovery, and dramatically reduce the risk of data breaches. In this 20-page e-book, unlock an MFA deployment guide.

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: Splunk

    Splunk is proud to be named a Leader in the 2024 Gartner Magic Quadrant for Security Information and Event Management (SIEM). Gartner defines SIEM as a configurable security system of record that aggregates and analyzes security event data from on-premises and cloud environments.

  • Checklist 6 Ways Vantage Dx Can Optimize Microsoft Teams

    Sponsored by: Martello Technologies

    According to a recent report, 81% of customer-facing and revenue-generating Teams users say that Teams performance issues such as poor video or audio quality have a high or significant impact on their productivity. Discover how Vantage DX makes complex Teams issues very simple for IT to fix.

  • What Path Should You Take to SAP S/4HANA?

    Sponsored by: Lemongrass

    Time is running out to move to SAP S/4HANA, but the current adoption rate doesn’t reflect that reality. If you’re looking for the fastest and easiest way to get your organization to SAP S/4HANA success, download this e-book for your guide to the most effective paths.

  • Future Further Report

    Sponsored by: LogicMonitor

    Download this infographic for a consolidation of the data and the desires of IT managers into one report, which sheds light on hotspots that, when addressed, will position your organization for long-term resiliency.

  • Maximizing 5G Inside and Beyond Retail Stores

    Sponsored by: Cradlepoint

    To follow 6 retail connectivity journeys, including at Subway and T-Mobile, tap into this 17-page e-book.

  • Unlocking The Future Of Intelligent Employee Experiences

    Sponsored by: Zendesk

    Explore the future of intelligent employee experiences in this research report. Learn how AI, flexible work, and data-driven strategies are transforming the workplace. Discover insights to enhance employee satisfaction and drive better business outcomes. Read the full report.

  • Solving The Top 3 Print Challenges Of Hybrid Work

    Sponsored by: HP Inc

    If managing your hybrid transition feels like jumping through hoops, you’re not alone. Organizations must devise new print strategies considering remote work possibilities, but few know where, why and how materials are being printed in their company, let alone what cost. Take HP’s expertise to manage your hybrid transition in this white paper.

  • Cloud Router Console Connect

    Sponsored by: Console Connect by PCCW Global

    To discover how you can simplify network configuration and management in your multi-cloud environment, take a look through this overview.

  • Unlock the Power of PowerEdge Servers for AI Workloads: Experience Up to 177% Performance Boost!

    Sponsored by: Dell Technologies and Intel

    Can your computational resources address the demands of AI workloads? To help you answer yes, Dell Technologies developed the Dell PowerEdge servers. To discover how these servers stack up against industry-standard AI benchmarks like OpenVINO and TensorFlow, review this white paper.

  • Global Consumer Goods Company Achieves Pan-enterprise DevOps Transformation

    Sponsored by: Qualitest Group

    A global consumer goods company achieved a successful enterprise-wide DevOps transformation with Qualitest's help. They implemented a standardized Quality Assurance Governance Framework, reducing regression testing time by over 95%. Read the full case study to learn how they transformed their DevOps processes.

  • Modernize Your IT With A Modern OS

    Sponsored by: Red Hat

    95% of IT leaders label enterprise open source as important to their company’s overall enterprise infrastructure, according to a report by Red Hat. To learn about an enterprise open source operating system (OS) that can support your modern IT practices, check out this infographic.

  • A CISO's Guide to Cyber Security in Action (2023)

    Sponsored by: Checkpoint Software Technologies

    Emerging threats are forcing security teams to evolve by adopting and adapting new technologies, putting tremendous pressure on CISOs. This white paper presents a guide to help CISOs navigate the challenges of today’s security landscape. Read on to learn more.

  • Powering Innovation by Enhancing Trust in Confidential Computing: Intel® Trust Authority and Thales

    Sponsored by: Intel Tiber Trust Services

    Intel and Thales have collaborated to enhance trust in Confidential Computing by integrating Intel Trust Authority's attestation service with Thales' CipherTrust Data Security Platform. This provides end-to-end data protection and enables secure migration to the cloud. Read the full blog to learn more.

  • MIT CIO Generative AI Report

    Sponsored by: DataBricks

    Generative AI is revolutionizing enterprises, democratizing access to AI and driving adoption across business functions. This e-book from MIT Technology Review explores how IT leaders are leveraging large language models to unlock business value. Read on to discover key considerations to get started and more.

  • The IT Roadmap for In-Vehicle Network Solutions

    Sponsored by: Cradlepoint

    Office buildings, pop-up sites, vehicle fleets: Today, network transformation occurs at all these places. You may be wondering what successful digital transformation looks like in vehicles. Download “The IT Roadmap for In-vehicle Networks” to find out.

  • Subway Franchisee Keeps Network Fresh with 5G Connectivity

    Sponsored by: Cradlepoint

    DiPasqua Enterprises runs over 100 Subway locations. To support its expansive franchise portfolio, DiPasqua Enterprises performed a network refresh. Tap into this case study to discover what that refresh required and the outcomes that it has delivered.

  • Seven Data Integration Drivers — and the Opportunities They Present for ISVs, Data Providers, and Digital Businesses

    Sponsored by: Qlik

    Real-time data today is in demand by everyone - and everywhere - throughout an enterprise. Now more than ever, it’s important for independent software vendors (ISVs), data providers, and digital businesses to be able to navigate their complex collections of customer data and turn that data into actionable insights. Read on to learn how.

  • Is Your Enterprise Network Ready for What’s Next in CX and EX?

    Sponsored by: Comcast Business

    As customer experience (CX) and employee experience (EX) expectations evolve, can your enterprise network keep up? To help you confidently answer yes, this white paper breaks down 5 components of a future-ready network. Keep reading to access the full insights.

  • Todyl SASE Explained

    Sponsored by: Todyl

    As the network perimeter expands, security must move with it. This e-book explains how SASE can secure remote access and provide a consistent user experience across locations. Download it now to learn how SASE can address your connectivity and security challenges.

  • Cloud-Native Meets Hybrid Cloud: A Strategy Guide

    Sponsored by: Red Hat

    As technologies evolve, organizations need to adopt new strategies to achieve success. This guide is designed as a strategy primer for enterprise architects and IT leaders to map out how to tackle modern IT strategy, focusing on the most important key trends. Read now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.