ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Google Video 3

    Sponsored by: Google

    Join this Google webinar to find out how you can use Google Kubernetes Engine’s built-in insights to analyze the cost and performance of your workloads.

  • Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.

  • Webroot Video 2

    Sponsored by: Webroot

    Using new tactics, cybercriminals are able to take advantage of dispersed workforces, including office networks. Is your security strong enough to beat social engineering? Watch this brief video to understand how cybercriminals are evolving and how you can avoid becoming a victim of social engineering.

  • 4 tips for delivering superior apps

    Sponsored by: Red Hat & Dynatrace

    By adopting containers and a cloud-native approach to application development, you can achieve the scalability and flexibility necessary to meet user demand for new features and services. Read on to learn 4 steps that your organization can take to deliver superior apps with app development partner ecosystem solutions.

  • How to secure buy-in for Microsoft Dynamics 365 CRM

    Sponsored by: Inciper

    If your organization is in the market for a cloud-based CRM, then you need a solution that advances your digital transformation journey, ensures compliance, and focuses on the whole business, not just one department. Read on to learn more about a solution that offers all of that and more.

  • EN Identity Made Easy Episode 3 - Stronger Customer Authentication

    Sponsored by: Okta

    While most authentication deals with securing an enterprise network while allowing employees the proper access, it is important to remember customers also require authentication. In this third installment of the Identity Made Easy webcast series, experts from Computer Weekly and Okta discuss Customer Identity. Watch now to learn more.

  • CIAM Customer Success Stories

    Sponsored by: Okta

    In today’s digitally evolved world, customers expect a seamless experience that caters to their high UX expectations. Okta aims to demonstrate that organizations that utilize their CIAM offerings can maintain a highly customized access platform, while maintaining a high level of security. Read the full case study to learn more.

  • Red Hat Video

    Sponsored by: Red Hat

    This financial services spotlight webinar hosted by IDC Financial Insights and Red Hat details:The biggest challenges of the finance industry today, where organizations stand, and what comes nextPreparing for the DORA act in the EUAnd best practices in cloud management for financial servicesListen in to the discussion here.

  • Prioritization To Prediction Volume 3: Winning the Remediation Race

    Sponsored by: Cisco Umbrella

    Hackers aren’t waiting for you to find and fix the vulnerabilities hiding in your code, so you need to make sure your vulnerability management is up to par. In this third volume of the Prioritization to Prediction report, Kenna aims to gauge how organizations compare against each other in the vulnerability remediation market. Read on to learn more.

  • Lunch Garden Ctac facilitates transformation project with AWS and SAP

    Sponsored by: AWS and CTAC

    Lunch Garden, Belgium’s largest restaurant chain, identified a goal: to enhance its customer experiences. To accomplish this, the organization surrounded itself with a team composed of SAP, AWS and Ctac. Dig into this case study to understand how the team empowered Lunch Garden with SAP S/4HANA RISE on AWS.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.