ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • Keystones For Creating A Successful Gen AI Adoption Plan

    Sponsored by: Deloitte

    During this video, industry experts will discuss the importance of developing an effective data strategy prior to implementing an AI adoption initiative. Tune in now to discover the requirements your business needs to meet in order to take full advantage of the benefits gen AI has to offer.

  • Why enterprises can no longer afford to delay GenAI initiatives

    Sponsored by: Deloitte

    In this blog post, you’ll gain insights into the cultural changes required to harness the potential of generative AI. You’ll also learn about the pitfalls to avoid and the costs of getting your GenAI initiatives wrong. Read on now to find out how you can overcome the data challenges of GenAI adoption.

  • The 5 Stages of CTEM

    Sponsored by: XM Cyber

    Increasingly, The Continuous Threat Exposure Management (CTEM) Framework by Gartner is being seen as an impactful way to address the full range of challenges that put organizations at risk. Read this white paper now to discover the 5 stages of CTEM and find out how you can change the way your business handles cyber risk.

  • ESG Tech Review: Agile M365 Data Protection for Microsoft 365

    Sponsored by: Veeam Software

    This technical review from Tech Target's Enterprise Strategy Group documents the results of a detailed evaluation of Veeam's Microsoft 365 backup solutions, including validating granular backup management capabilities and agile recovery options.

  • Intermedia Unite and Contact Center - A Quick Overview

    Sponsored by: Intermedia.Net

    Today, many organizations are looking for new ways that they can improve their customer experience (CX) and strengthen their contact center employee collaboration. However, with so many solutions on the market, it can be difficult to know which one best fits your company’s needs. Tune into this video to learn more.

  • ecuring Data and AI in Today

    Sponsored by: Palo Alto Networks

    Organizations are wasting no time in shifting budget resources to generative AI (GenAI). Such a rapid buy-in on GenAI prompts security teams to ponder: Are standard data security practices enough? Watch this on-demand webinar to discover how to protect data in the age of generative AI and multicloud.

  • 5 Tips to Ensure Your Data is Analytics-Ready

    Sponsored by: Wolters Kluwer

    With 80% of healthcare data existing in unstructured formats and data scientists spending up to 80% of their time on data cleansing, suboptimal data readiness can limit the efficiency of your healthcare outcomes. Discover how to centralize your data effectively while implementing best practices that elevate trust and transform data analytics.

  • Level Up Your GTM: Solving Common Growth Challenges

    Sponsored by: Informa TechTarget

    The most innovative marketing leaders are looking beyond just marketing tactics to understand theirshortcomings and futureproof their growth strategies. They're investigating how their go-to-marketteams align and evolving how they activate across people, processes and technology.

  • Four Elements of Well-Designed Video

    Sponsored by: BrightTALK by TechTarget

    As the demand from B2B buyers for video content continues to grow, the market has become floodedwith videos – some good, some great and some better left undone. 61% of B2B marketers expect theirorganization to increase investment in videos in 2025.

  • 8 Benefits of a Backup Service for Microsoft 365

    Sponsored by: Veeam Software

    Read this e‑book, “8 Benefits of a Backup Service for Microsoft 365”, to understand what makes cloud‑based backup services so appealing for companies using Microsoft 365 — and why it may be just the thing to keep your business running.

  • 7 Critical Reasons for Microsoft 365 Backup

    Sponsored by: Veeam Software

    You have 7 critical reasons to protect your Microsoft 365 data. This 5-minute easy-to-read document helps explain to your managers and peers why your organization should consider Microsoft 365 data protection.

  • Conversational Microsoft 365 Recovery Best Practices

    Sponsored by: Veeam Software

    Recoverability isn’t a given with Microsoft 365. The fact that organizations need to back up their Microsoft 365 deployments has been well established. As important as backups might be, however, there is one critical item that always seems to get left out of the conversation. That item is recoverability.

  • Connecting Public Sector Data Analysis with PS2G and SAS Webinar

    Sponsored by: SAS and PS2G

    Recent research shows that data compatibility is a bigger issue than ever before for the public sector, with only 35% of organizations saying data is compatible across some applications. Discover how the SAS and PS2G partnership can help you streamline data collection and integration, achieving a unified view that drives strategic improvements.

  • IMPACT AI: NONPROFIT DIGITAL TRANSFORMATION REPORT 2024

    Sponsored by: ServiceNow

    This research paper is invaluable for nonprofit leaders looking for tech strategies with the most potential to help them advance their missions with limited resources. Learn best practices of AI “pacesetters” already realizing gains from their tech investments. Download the report for a deep dive into new data on nonprofit digital transformation.

  • Accelerating BI Mirgration to SaaS

    Sponsored by: Qlik

    In this webinar, uncover a strategy to accelerate BI migration to SaaS, including application rationalization, migration automation, and ongoing platform management. Learn how to leverage Qlik Application Automation to streamline your BI modernization journey. Access the full webinar for more.

  • Is your safety certification at risk?

    Sponsored by: Wind River

    This webinar examines the factors that influence a certifiable solution program schedule and details what you can do to mitigate common risks to achieve an on-time and on-budget development effort.

  • Container Technology Energizes Edge Computing

    Sponsored by: Wind River

    The security, portability, and agility of container technology complement the proven capabilities of the real-time operating system (RTOS), VxWorks, now available for containerized deployments at the intelligent edge. Download this white paper to learn more.

  • What Is DO-178C?

    Sponsored by: Wind River

    DO-178C, Software Considerations in Airborne Systems and Equipment Certification, is the principal certification document used by aviation across the world. This blog explores the ins and outs of DO-178C, going through its many parameters and criteria for qualification so that you can better understand and comply. Read on to learn more.

  • Wind River Certifiable Intellectual Property (IP) Blocks

    Sponsored by: Wind River

    Wind River's DO-178C-compliant IP streamlines avionics certification. Their pre-verified virtualization, networking, security & storage solutions slash development time, costs & risks.

  • Accelerating Avionics Safety Certification

    Sponsored by: Wind River

    Aerospace manufacturers struggle with costly, time-consuming DO-178C avionics software certification. Wind River's certifiable IP blocks reuse pre-certified components, slashing certification time and cost. This case study examines how a customer leveraged Wind River's software to quickly certify a 16-core system, saving millions.

  • Wind River In Aerospace And Defense

    Sponsored by: Wind River

    Whether your organization sells goods and services to the public or builds fighter jets for the military, one thing remains the same: you need safe, secure and reliable computing systems to get the job done. To make it happen, more businesses are turning to a partner who has been doing just that for over 40 years. Read on to learn more.

  • Wind River Safety Certification by the Numbers

    Sponsored by: Wind River

    Wind River is the #1 commercially deployed Real-Time Operating System (RTOS) with over 840 safety-critical programs. With 20 years of experience in safety certification software products, there's a reason so many organizations trust Wind River. Learn more about Wind River here.

  • VXWorks for Aerospace and Defense

    Sponsored by: Wind River

    VxWorks® aerospace and defense software saves costs and accelerates certification. Proven in 750+ safety programs and 120+ aircraft, Read how VxWorks streamlines compliance, satisfies real-time operating systems needs, secures systems, simplifies software integration, and inspires developers.

  • SHI Video

    Sponsored by: SHI

    What was once an eternal debate has instead united the workplace, as more and more organizations are deciding to integrate both Microsoft and Mac platforms. Join tech experts as they discuss insights on unified endpoint management, the app gap, productivity and security apps, and the importance of change management in adoption.

  • NCC Group Video

    Sponsored by: NCC Group

    As the deadline for the Digital Operational Resilience Act (DORA) approaches, the importance of regulatory readiness has never been more critical for financial institutions and technology providers alike. Tune into this webcast now to unlock best practices for achieving compliance and future proofing your business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.