ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • Azure Sentinel vs. Azure Security Center

    Sponsored by: Predica Group

    Given that networks are becoming more distributed and cyberthreats are increasing in sophistication, many organizations are turning to tools to strengthen their defenses. Two such tools are Microsoft Azure Security Center (ASC) and Microsoft Azure Sentinel (AS). What do these tools do, and how do they differ? Check out this blog for answers.

  • Offering Outstanding Learning Experiences In The Classroom And Beyond.

    Sponsored by: Lenovo & Microsoft

    Discover in this case study why Majmaah University has relied on rock-solid infrastructure from Lenovo to empower its 13,000 students and 3,000 faculty and staff.

  • 30 Minutes To A More Secure Network, On Campus And Off

    Sponsored by: Cisco

    Between distance learning tools, cloud-based applications and a student population that’s scattered beyond campus, proactive school cybersecurity has never been more important. Read this e-book to learn how you can quickly strengthen your network against student data breaches, sophisticated threats and more.

  • Risk-Based Authentication

    Sponsored by: Cisco

    According to Cisco, trust should be seen as a grading of risk, where each situation is evaluated on a spectrum, and each new attempt merits a reevaluation of trust. This white paper explores how risk-based authentication (RBA) can help organizations achieve their zero-trust goal through more nuanced trust evaluation. Continue on to discover more.

  • The Challenges of Hospital Wireless

    Sponsored by: Comport

    Read through this e-book delve into the unique challenges facing hospital wireless experiences, evaluate where your organization stands with its current wireless ecosystem, and learn what steps you can take to move your hospital’s wireless solution forward.

  • IBM Maximo Visual Inspection

    Sponsored by: Alkan Telecom

    Download this detailed paper to learn how AI-based solutions like IBM’s Maximo Visual Inspection improve asset management, with AI-powered insights at scale and made actionable through automation.

  • TECHNOLOGY TRENDS FOR MODERNIZING YOUR EPIC INFRASTRUCTURE

    Sponsored by: Comport

    Access this blog post to discover the emerging trends you need to consider as you plan your Epic Infrastructure modernization strategies.

  • 6 Benefits of a Real Device Cloud vs. Physical/On-Premises Real Devices for Mobile App Testing

    Sponsored by: Sauce Labs

    Dive into this blog post to examine the case for moving real device testing to the cloud.

  • HPE Video

    Sponsored by: HPE

    How can you position your organization for growth by embracing smart factory initiatives? Watch this webcast to gain a deeper understanding of how AI is changing the manufacturing industry and learn about some of the latest offerings from HPE, NVIDIA and Deloitte, including a virtual tour of The Smart Factory @ Wichita.

  • CTAC’S TECHNICAL KNOWLEDGE IS BEYOND DISPUTE; THEY KNOW SAP THROUGH AND THROUGH

    Sponsored by: AWS and CTAC

    AnalytiChem partnered with Ctac to make their SAP S/4HANA migration occur at record speed. AnalytiChem’s CEO Raoul Biskupek said Ctac was the clear choice since they “know SAP inside out.” Access the case study here to learn more Ctac and their SAP expertise.

  • Finance Agility in Uncertain Times

    Sponsored by: Prophix Software

    Nowhere is there more volatility in the corporate world than in finance teams. This blog details why agility is a necessity for finance in today’s world and how your organization can stay agile even with fewer people in a challenging economy. Read the blog.

  • Cribl.io Video 5

    Sponsored by: Cribl.io

    As SOAR platforms continue to prove critical to detecting cyberattacks and mitigating damages to organizations, a question arises: How can you enhance your SOAR to realize even more value? Step in Cribl LogStream. Watch this webcast for an introduction to the tool.

  • Security Readiness Best Practices with Veeam Platform v12

    Sponsored by: Veeam Software

    Tune into this Veeam webinar to discover the security readiness best practices you need to know, and learn how Veeam Platform v12 can help you keep your data and backups safe and secure.

  • 10 Best Practices to Improve Recovery Objectives

    Sponsored by: Veeam Software

    Download this white paper for a guide through the best practices to help you to achieve and optimize your personal recovery objectives.

  • 2023 Cloud Protection Trends: Executive Brief

    Sponsored by: Veeam Software

    To investigate methodologies associated with operating and protecting cloud-based workloads, a survey of 1,700 IT leaders was conducted on Veeam’s behalf. This brief explores those results, covering topics like BaaS versus DRaaS and backing up M365 services. So, how can you protect your cloud workloads in 2023? Continue on for guidance.

  • How to Succession Plan Like Your Future Depends on It

    Sponsored by: SHL US LLC

    Due to a lack of time and resources, 56% of organizations report that they don’t have a succession plan in place for their most critical roles. However, as turnover rates continue to rise, many company leaders are rethinking their talent strategy agendas. But what are the best ways to do so? Check out this article to learn more.

  • The Enterprise Guide To Workplace Compliance

    Sponsored by: Envoy, Inc.

    Enterprise organizations now have more compliance rules to follow than ever, and the complexity of these regulations tend to be huge pain points for IT teams, as one wrong move can risk the safety of their data. So, how can you make compliance easier for all? Browse this article to learn more.

  • DIGITAL WORKSPACES FOR FINANCIAL FIRMS: DEVELOPER SOLUTIONS

    Sponsored by: Dizzion

    Access this e-book to learn how Dizzion Digital Workspaces addresses 7 significant workspace challenges for developers and view 6 benefits of adopting this solution in your company.

  • Yesterday’s Mobile Security Was Designed For A Different Purpose

    Sponsored by: Palo Alto Networks

    Is your organization struggling to secure your 5G’s critical applications? Consider a zero-trust architecture (ZTA) for 5G. This white paper outlines 5 steps for achieving zero trust for 5G, beginning with defining your protect surface. Review now to learn about Palo Alto Networks as a partner for your 5G zero-trust journey.

  • 7 Considerations for Choosing a File and Object Storage Platform

    Sponsored by: Pure Storage

    To fulfill data-centric business demands and unstructured data performance needs alike, this paper outlines 7 considerations for choosing a file and object storage platform for your company’s workload needs. View the full list.

  • project44 Video 1

    Sponsored by: project44

    When managing a supply chain, it’s critical to have an organized view of your key processes. This is particularly important when it comes to ocean shipments and functionality of your ports. But, many businesses can get overwhelmed and can be daunted trying to find a solution that fits their goals. Watch this video to learn more.

  • Remote, On-site, Or Hybrid Work – A Guide And Insights For Your Team

    Sponsored by: Zoom Video Communications

    Whatever choice you make, it is crucial to have a solution that offers the features and functionality your team needs to stay safe, connected, and productive. This digital guide covers three options for what your next phase of work could look like, as well as the specific tools and features of Zoom that can make them possible.

  • Google Video 7

    Sponsored by: Google

    Google explores the latest innovations to autopilot mode in Google Kubernetes Engine that makes it easy to optimize and run your apps in minutes.

  • Microsoft Dynamics 365 CRM for financial services organisations: key features and benefits

    Sponsored by: Inciper

    The purpose of a CRM tool is clear, but in the financial services sector, it is not as simple. Financial organizations have complex processes and regulatory requirements that make it difficult to find the right CRM. Now, there is a solution that offers deeper customer insights and stays compliant with legislation. Read on to learn more about it.

  • Softchoice Video 1

    Sponsored by: Softchoice

    Studies show that on average, 1,200 organizations fall victim to ransomware on a weekly basis. In this video, experts from Softchoice look at the state of cybersecurity, analyzing the landscape and discussing their approach. Watch now to learn more about the current state of cybersecurity.

Browse by Report Type: .NET White Papers | .NET Multimedia | .NET IT Downloads

See more topics related to: .NET

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.