ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • IDC Maximizing Efficiency, Agility, and Growth with SaaS

    Sponsored by: AWS

    Companies built in the cloud often outperform software companies transitioning their business to SaaS. This IDC InfoBrief, based on a global survey of 1,100 SaaS businesses, sheds light on that performance gap and provides the opportunity to examine and replicate, where possible, the characteristics of native SaaS companies. Read on to learn more.

  • Identity Protection for the SOC

    Sponsored by: TD Synnex

    For security teams, their legacy identity management solutions are no longer suited for securing today’s environments. Combining 2 distinct identity security technologies, IBM Verify Identity Protection presents an approach to identity security that is designed to meet today’s threats. Watch this webcast to learn more about the emerging solution.

  • Dumb AI exists - here's some things you can do to avoid it

    Sponsored by: Oversight Systems

    Despite the promise of AI and automation, unfortunately, many solutions still have a long way to go. In this rapidly-evolving landscape, the worst thing you can do is choose to implement a “dumb AI” tool, especially for your financial teams. So, what can you do to ensure that you pick the right one? Access this article to learn more.

  • Are You REALLY Safeguarding Your Backup Data?

    Sponsored by: Cobalt Iron

    Ransomware attacks are not only more prevalent, they’re also more dangerous. In this webcast, Cobalt Iron’s Chris Snell shows you how you can leverage 6 essential security technologies to take a stand against ransomware and secure your organization. Watch now to learn more.

  • DNS, Powered by Intelligence: The Centripetal Advantage

    Sponsored by: Centripetal Networks

    At no point in human history have organizations spent as much money on cybersecurity as they currently are. CleanINTERNET DNS is designed to bring enterprises cost-effective cybersecurity, by incorporating the world’s largest threat intelligence collection to provide you with comprehensive vision of threats. Read the blog to learn more.

  • Introduction to Change Risk Prediction

    Sponsored by: Digital.ai

    This brief video examines how Change Risk Prediction (CRP) leverages AI to assess the impact and likelihood of changes before they are implemented, enabling you to drastically reduce change-related incidents and downtime.

  • Continuous Delivery on Multi-Cloud-Predicting the Unpredictable

    Sponsored by: Digital.ai

    Releasing software is a complex and risky process, especially in today's fast-paced and competitive market. This video examines how to leverage data and analytics to optimize your release management and achieve higher release success rates.

  • 3 tips to unclog your application pipeline and accelerate your releases

    Sponsored by: Digital.ai

    Application development is a hectic process, and simple bottlenecks in your application pipeline can lead to reductions in release speed that cost your organization time and money. In this webcast, Digital.ai’s Matthias Zieger and Silvia Davis present 3 tips to unclog your application pipeline and accelerate your releases. Watch now to learn more.

  • Client Portal Health Check for Financial Services

    Sponsored by: Liferay

    The financial services industry is undergoing a time of rapid change. Since you built your client portal solution, your needs, customer expectations, and technology have all shifted. And even if you’re still in the early stages of defining your strategy, you may want to validate your requirements. Access this “health check” to learn more.

  • Magic Quadrant for Single-Vendor SASE

    Sponsored by: Fortinet, Inc.

    This 2024 Gartner research examines the dynamic single-vendor SASE market, highlighting key vendor strengths and cautions, as well as market trends. It provides guidance to IT leaders on selecting the right SASE vendor. Read the full "Gartner Magic Quadrant" report to learn more.

  • Online Payments Increase by 50% for Utility Company

    Sponsored by: Liferay

    BSES used Liferay as their public website, self-service portal, and mobile application for enterprise-ready, time-saving solutions. Access this case study to hear the full story.

  • Palo Alto Networks Vulnerability

    Sponsored by: Centripetal Networks

    Want to learn more about the latest known vulnerabilities in 2024 and how you can stay safe? Explore a timeline of the discovery & reporting of a vulnerability first exploited successfully back in March.

  • 6 Best Practices for Manufacturing Customer Portals

    Sponsored by: Liferay

    Increasingly, the old methods for dealing with customer needs are not good enough for the modern customer—or your own service teams. Customers expect to be able to self-service effectively, while your internal teams struggle with efficiency when customer requests mount. The solution? Access this white paper to learn more.

  • 5 Ways a Customer Portal Can Help Your Teams and Customers Be More Efficient

    Sponsored by: Liferay

    Many companies struggle with customer service. Sometimes it’s because they don’t have the right tools, and sometimes it’s because the online experience is hard to update and maintain. These challenges can leave customers feeling confused and inefficient. So, how can this be fixed? Access this e-book to learn more.

  • Phishing - resistant frictionless consumer experiences with passkeys

    Sponsored by: Okta

    81% of hacking-related breaches are caused by weak or stolen passwords. In this joint FIDO Alliance and Okta webinar, Okta’s Salman Ladha joins FIDO Alliance’s Megan Shamas to discuss the phishing-resistant security benefits of passkeys, as well as how they fuel superior customer experiences. Watch the webcast now to learn more.

  • How small businesses can pick the right mobile devices

    Sponsored by: T-Mobile for Business

    Small businesses need the right mobile devices to boost productivity and communication. Discover how to select the optimal devices, manage them effectively, and leverage features like rugged designs and device management platforms. Read the full blog post to learn more.

  • The Benefits Of AI And Automation For Smbs And How 5G Can Help Amplify Them

    Sponsored by: T-Mobile for Business

    With 71% of U.S. small and medium businesses planning to increase their IT spending in the next 12 months, many of these organizations are looking to AI and automation tools to improve their operational efficiency. But what exactly are the benefits of AI and automation? Access this report to learn more.

  • Check Point Vulnerability

    Sponsored by: Centripetal Networks

    Vulnerabilities are constantly being exposed by highly trained and organized threat actors. Discover some important extra measures you can take to prevent being the victim of the latest vulnerability in this blog.

  • Connected World: Unveiling the Latest in Small Business Connectivity

    Sponsored by: T-Mobile for Business

    Traditional broadband can limit your business’s potential. Don’t let obsolete functions and outdated features hold you back. In this webcast, experts from CIO Marketing Services, T-Mobile for Business, and IDC Research, come together to discuss the importance of connectivity for modern businesses. Watch now to learn more.

  • Introduction to Change Risk Prediction

    Sponsored by: Digital.ai

    The circumstances of the modern business world force today’s organizations to embrace constant change. This video introduces Digital.ai’s Change Risk Prediction (CRP) product, which uses predictive AI to help organizations account for and deal with risk as they manage change. Watch the brief video now to learn more about CRP.

  • PuTTY Vulnerability

    Sponsored by: Centripetal Networks

    Today’s organizations don’t have a malware problem, they have an adversary problem. CleanINTERNET from Centripetal Networks offers dynamic threat intelligence-based protection against known indicators of compromise, limiting threat actors’ ability to attack. Read this blog to learn if you are the bearer of a known vulnerability in 2024.

  • StorPool Storage: Ultra-fast, Reliable, Linearly Scalable Primary Storage Platform

    Sponsored by: StorPool

    Dual-controller, shared-disk storage arrays have long been the default for storage systems. However, this paradigm is quickly proving unsuitable. To meet your performance and data requirements, consider the efficacy of solutions like StorPool Storage, in this product overview. Read on to tap into the top 8 benefits.

  • Fortinet Vulnerability

    Sponsored by: Centripetal Networks

    Rather than going on the attack themselves, threat actors often take advantage of known network vulnerabilities and pick up the scraps. CleanINTERNET from Centripetal Networks offers dynamic threat intelligence-based protection against

  • The 2024 Block Data Storage Buyer's Guide

    Sponsored by: StorPool

    How can you ensure you select the most appropriate block storage software or system for your business’ unique needs? Look no further than this Block Storage Buyer's Guide. Download a copy to solve 8 common block storage challenges, to evaluate block storage options, and more.

  • What Systems Do Most Call Centers Use?

    Sponsored by: Intervision

    Discover the key technologies that elevate the modern call center experience, from CRMs and call routing to AI-powered features. Learn how to build a future-ready contact center that delivers exceptional customer service. Read the full blog post to explore the latest call center systems and best practices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.