ComputerWeekly.com Research Library

Powered by Bitpipe.com

Multimedia

  • Modern ways of working for distributed teams

    Sponsored by: Atlassian  | Premiered: Jan 16, 2025

    During this webcast, you’ll hear from industry experts as they discuss how leaders can drive clearer goals, create more focus time, and better coordinate work for their teams. Tune in now to find out how you can implement modern ways of working to empower your distributed workforce.

  • Accelerating BI Mirgration to SaaS

    Sponsored by: Qlik  | Premiered: Jan 7, 2025

    In this webinar, uncover a strategy to accelerate BI migration to SaaS, including application rationalization, migration automation, and ongoing platform management. Learn how to leverage Qlik Application Automation to streamline your BI modernization journey. Access the full webinar for more.

  • What is a vulnerability?

    Sponsored by: Contrast Security  | Premiered: Jan 6, 2025

    Larry Maccherone, a thought leader on DevSecOps, Agile, and analytics, is unimpressed with the common definition of security vulnerability. In this on-demand webinar, discover the simple change in language that can help AppSec teams more effectively defend against one of bad actors’ favorite methods.

  • What is a vulnerability?

    Sponsored by: Contrast Security  | Premiered: Jan 6, 2025

    Larry Maccherone, a thought leader on DevSecOps, Agile, and analytics, is unimpressed with the common definition of security vulnerability. In this on-demand webinar, discover the simple change in language that can help AppSec teams more effectively defend against one of bad actors’ favorite methods.

  • Siemens Energy innovates using SAP data with Snowflake and Qlik

    Sponsored by: Qlik  | Premiered: Jan 6, 2025

    In this webcast, you’ll learn about a simplified data and AI platform designed to empower manufacturers with the visibility needed for faster value delivery. By consolidating data from all your ERP sources, you can create a foundation for future business growth. Tune in now to learn how you can unlock the true value of your SAP data.

  • A First Look at Securing Your Machine Identities With Certificates, PKI, and Secrets

    Sponsored by: CyberArk  | Premiered: Jan 6, 2025

    Digital transformation, cloud adoption and AI are driving dramatic increases in machine identities, including TLS (Transport Layer Security) certificates and secrets. Watch this webinar to learn about why certificates and PKI matter and why organizations want to replace their legacy PKI.

  • Data Modernization for Improved Business Results

    Sponsored by: Qlik  | Premiered: Jan 6, 2025

    Organizations often face the challenge of having enormous amounts of data trapped in their mainframes. Join this session to learn about the capabilities and services for mainframe replication and migration into AWS environments to unlock value from your mainframe data.

  • Empowering SAP Data with Generative AI to Unlock New Possibilities

    Sponsored by: Qlik  | Premiered: Jan 6, 2025

    To learn why and how to empower your organization’s SAP data with generative AI, tune into this webcast featuring subject-matter experts from Qlik, VP of Global SAP Business & Strategy, Matthew Hayes, and Emerging Technology Evangelist, David Freriks.

  • Unlock the Hidden Value of SAP Data for Cloud Analytics

    Sponsored by: Qlik  | Premiered: Jan 6, 2025

    Today, organizations need a way to combine SAP data with data from non-SAP sources and improve their data replication abilities. To do so, many have started to search for solutions and partners that can provide them with clear-cut methods and technologies to best match their vision. Tune into this webinar to learn more.

  • SHI Video

    Sponsored by: SHI  | Premiered: Jan 4, 2025

    What was once an eternal debate has instead united the workplace, as more and more organizations are deciding to integrate both Microsoft and Mac platforms. Join tech experts as they discuss insights on unified endpoint management, the app gap, productivity and security apps, and the importance of change management in adoption.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.