ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • 3 STEPS TO MANAGE TECHNOLOGY SPEND AND RISK

    Sponsored by: ServiceNow

    In this e-book, discover a practical, 3-step approach to optimizing technology spend and mitigating risk.

  • Five ways to reduce costs with Strategic Portfolio Management

    Sponsored by: ServiceNow

    Too many organizations are not generating satisfactory returns on their strategic investments. They are leaving opportunity and money on the table, and their competitors couldn’t be happier. In this e-book, learn how the ServiceNow Now platform can help your organization make sure no opportunities are left on the table.

  • PingOne Protect

    Sponsored by: Ping Identity Corporation

    Is your identity security sufficient to protect your organization? By evaluating multiple attack vectors, assigning risk scores, and providing insights, PingOne Protect allows organizations to thwart potential attacks. Download the data sheet to learn more.

  • Staying Successful at Hiring in a Confusing Labor Market

    Sponsored by: Greenhouse Software

    The current labor market can only be described nowadays as confusing. With the battle over remote work still going and a new generation in the workforce with different skills, it can be tough to hire the right person every single time. But it doesn’t have to be. Read on to learn how to build a successful hiring strategy for any labor market.

  • Technology-enabled support centre for Alzheimer’s Society, the UK’s leading dementia charity

    Sponsored by: FourNet

    Contact center evolution at Alzheimer’s Society presented 6 key challenges, one of which being that the go-live across sites could not interrupt support services to those living with dementia. Along with unpacking all the obstacles, this case study maps out how FourNet guided the Society’s contact center transformation. Read on to learn more.

  • 3 Paths to Faster Growth with Low Code Development

    Sponsored by: ServiceNow

    Low-code development platforms enable faster innovation and growth by expanding the developer pool. To learn more, read this paper on how low-code development can accelerate your digital transformation.

  • DHL Supply Chain Delivers Warehouse Robotics Excellence

    Sponsored by: Blue Yonder

    Many organizations are fascinated by warehousing and supply chain robotics, but not many are taking advantage of this technology due to cost and time assumptions. But not at DHL. See how they realized the promise of robotics for their supply chain and how this solution is now saving them a tremendous amount of time and money. Read on to learn more.

  • Application Development Maturity Assessment

    Sponsored by: ServiceNow

    Are you ready to drive business results and get more done with low-code tooling on the ServiceNow Platform? Take this assessment to uncover key next steps and best practices no matter where you are on your journey.

  • Achieving consolidation benefits without compromise

    Sponsored by: Trend Micro

    Integrating individual security solutions and vendors can lead to operational inefficiencies and decreased security effectiveness. With platform consolidation, organizations can attain a stronger security posture, improve performance and efficiency, while reducing complexity. Learn more in this white paper.

  • How To Protect Your Organization From Identity-Based Attacks

    Sponsored by: Okta

    According to a recent study, 86% of web app breaches involve the use of stolen credentials. The loss of a single high-ris access identity can render the rest of your security parameters completely futile. Download this white paper to learn what you need to look for in an effective identity security solution.

  • Kaspersky Next EDR Optimum

    Sponsored by: Kaspersky

    Today’s hackers can buy cheap ready-built tools and attack anyone - stealing data, damaging infrastructure and demanding ever-growing level of ransom. In this paper, discover how Kaspersky Next EDR Optimum helps you identify, analyze and neutralize evasive threats with easy-to-use advanced detection.

  • Driving DevOps Maturity in Large Enterprises

    Sponsored by: Qualitest Group

    This white paper, "Driving DevOps Maturity in Large Enterprises" outlines a framework for DevOps growth, featuring maturity models, self-assessment, and strategies for stakeholder buy-in and continuous learning. Access now to get a free maturity assessment and learn to build a baseline, roadmap, and culture for DevOps excellence.

  • Cisco Secure Access At a Glance

    Sponsored by: Cisco & Rhingle

    To learn how you can enhance access security for your highly distributed workforce, take a look through this 5-page guide by Cisco.

  • Global FS and Reinsurance Leader Secures 40% Cost Efficiency with Expert Quality Engineered Managed Testing Services

    Sponsored by: Qualitest Group

    A global FS and reinsurance leader was running into agility issues that were holding back their Agile transformation efforts, and quality deficiencies were hampering their competitive edge. Read this case study to discover why the company decided to leverage Qualitest to revamp its testing and quality assurance processes with an AI analysis.

  • Double-Team: A Top Retailer Accelerates Ecommerce Releases with Qualitest & Tricentis

    Sponsored by: Qualitest Group

    A leading global fashion retailer aimed to accelerate ecommerce releases without compromising quality. Manual testing couldn't keep pace with their rapid expansion, causing delays. By partnering with Qualitest, they were able to implement an automation-first strategy and optimize processes. Read this case study to learn how.

  • From Chaos to Clarity: How Good Data Powers Precise AI

    Sponsored by: Qualitest Group

    For many, AI is still an unknown quantity, presenting more questions than answers.This webinar is designed to illuminate the profound impact of AI Data Services on model training and refinement. Watch now to join experts from Qualitest as they show you how to craft AI models that stand out.

  • 7 Reasons How Healthcare Organizations Can Boost Digital Discoverability

    Sponsored by: Quality Reviews

    When health systems are struggling with low volume, leaders are often quick to suggest ad campaigns. But when your website doesn’t serve as a welcoming digital front door for patients, any budget spent on advertising is largely wasted.

  • Unify Customer Experience

    Sponsored by: ServiceNow

    When it comes to creating a sustainable and unified customer experience, consistency and uniformity are the keys. However, for organizations with multiple locations, delivering a consistent CX can be hard. Overcoming the challenges of varied data models and silos requires the right solution. Watch this video to see what that solution is.

  • From Complexity to Confidence The Smart Approach to Testing Smart Devices

    Sponsored by: Qualitest Group

    To unlock insights about Smart testing for Smart devices, check out this webcast featuring Head of the Phygital (IoT) Testing Center of Excellence at Qualitest, Balaji Ponnada.

  • Anatomy of a Cloud Security Incident

    Sponsored by: SentinelOne

    For a deep dive on the anatomy of a cloud security incident, tune into this webcast featuring leaders at SentinelOne.

  • Drivers Of Change: Meeting The Energy And Data Challenges Of Ai Adoption

    Sponsored by: Pure Storage

    In this white paper, discover why not being prepared for AI’s impact on infrastructure may put your AI initiatives at risk… and what you can do to prepare your business before AI deployment.

  • Software Supply Chain State of the Union 2024

    Sponsored by: JFrog

    To understand the state of the software supply chain landscape in 2024, tap into this 34-page research report.

  • Simplify your field service technology selection

    Sponsored by: ServiceNow

    For organizations looking to upgrade their field service management offerings, there are many benefits to an initiative like this. Whether it’s optimizing scheduling, improving CX, or having the ability to offer connected field service and outcome-based contracts will give you the advantage you need. Read this Gartner report to learn more.

  • How Supply Chain Attacks Work — and How to Secure Against Them

    Sponsored by: JFrog

    The first step toward defending against supply chain attacks is deepening your understanding of how they work. Enter this e-book, which contains 5 articles about supply chain security. Download the book to discover 5 actions that you can take to level up your security posture – and much more.

  • How Fleet Management Can Improve Your Bottom Line

    Sponsored by: T-Mobile for Business

    In this e-book, uncover the 6 key areas where smarter, integrated fleet management technology can help you tackle your challenges head on.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.