ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • The Complexities of APACs Threat Landscape - Part 1

    Sponsored by: Rapid7

    In the first of a two-part series, join an expert panel as they discuss the challenging and evolving threat landscape in the Asia Pacific region. The panel shares their views as to how Asia Pacific fares up against other global regions in cyber awareness, and the heightened discussions in government policy to combat threat actors.

  • Better, Faster Data-Based Decisions

    Sponsored by: Red Hat & Starburst

    The traditional extract, transform, and load (ETL) process has become outdated and inefficient, meaning organizations need to find a new way to gain insights quickly without worrying about where the data is stored. Read on to learn how you can unlock hidden value for your business by accessing and analyzing data from any data source at scale.

  • Smart Decisions From Disparate Data

    Sponsored by: Red Hat & Starburst

    Most organizations have data stored all over the ecosystem. But if that data is not quickly accessible you run the risk of not keeping up with the competition. However, with the right solution, you can have the flexibility and performance to streamline your critical workloads with SQL, giving you the agility you need. Read on to learn more.

  • Kasten K10 Supports Upgrades To Red Hat OpenShift 4

    Sponsored by: Red Hat & Veeam

    For IT teams tasked with backing up their Kubernetes environment, there has been a big change to the support for the OpenShift platform. With version 3.11 no longer being supported, organizations must find a way to migrate applications and data quickly and efficiently. Read on to learn about the next-gen solution that does just that.

  • Couchbase Solution: Customer 360

    Sponsored by: Red Hat and Couchbase

    This product overview will explore a data platform designed to give you the flexibility you need to aggregate all forms of data, enabling a single omnichannel view and giving both customers and customer-facing employees fast access for a seamless and more personalized experience. Tune in to learn more.

  • Couchbase Cluster demo with Red Hat OpenShift and Twitter

    Sponsored by: Red Hat and Couchbase

    In this product demo, you will learn how to configure a multi-node Couchbase Cluster and deploy an app that consumes Tweets from Twitter with specific hashtags. Tune in to learn more.

  • RUCKCast #74: RWG - The New Dog On The Block

    Sponsored by: Ruckus Wireless

    For enterprises and service providers, having powerful network services is the key to attracting and retaining more customers. To do that, you need a purpose-built network that offers complete connectivity, robust security and efficient management. Today, there is a new solution that can provide all of that. Listen to this podcast to learn more.

  • RUCKCast #73: The Evolution that is RUCKUS One

    Sponsored by: Ruckus Wireless

    For an introduction to a new AI-driven cloud platform, tune into this episode of Ruckus Networks’ podcast, RUCKCast.

  • The 2023 Global Ransomware Report

    Sponsored by: Fortinet, Inc.

    Decades on from its first gaining attention, ransomware remains a leading threat for today’s organizations. Download this report on global ransomware to access key research that Fortinet has gathered and gain insight into the state of ransomware.

  • Clearing the Path to Microsegmentation

    Sponsored by: Akamai Technologies

    To enhance visibility and security of data migrating to the cloud, organizations are utilizing a new technique called microsegmentation. Discover what microsegmentation is, if your company needs it, and how to implement it in this e-book.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.