ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • Hybrid IT and Virtualized Workloads Preparing for a Shift to Microsoft Azure

    Sponsored by: SolarWinds, Inc.

    Government agencies are moving to the cloud by the masses and adopting a hybrid IT environment to support the migration, highlighting the need for comprehensive, full-stack visibility across the entire hybrid IT environment. Find out everything you need to know about migrating to and monitoring Microsoft Azure cloud deployments in this blog.

  • SolarWinds, Inc Video 27

    Sponsored by: SolarWinds, Inc.

    When you design a security strategy, IT teams know they must offer continuous security training along with a comprehensive security strategy for your infrastructure. To do that, you need a partner you can trust. Watch this video to learn more about security strategies that cover all aspects of your business and be ready if an attack comes your way.

  • Private CDN Between Myth And Reality

    Sponsored by: MediaNova

    Making the decision whether to take on a Private CDN can be tricky, but it doesn’t have to be. There are some general misunderstandings about Private CDN that are finally put to rest in this article. If you think you’d be on your own managing a CDN, or its too expensive or only for enterprises, then think again. Read on to learn more.

  • Why Customer Identity?

    Sponsored by: Okta

    According to a recent report 61% of data breaches involve credentials. This white paper takes a deeper look at customer identity access and management (CIAM), analyzing why it is so important for both security and UX, and providing you with key qualities you should look for in a solution. Read on to discover more.

  • Medianova Overview

    Sponsored by: MediaNova

    When it comes to speed and performance of your website, understanding and utilizing a static CDN solution can be the catalyst for both rapid customer conversion rates and increased sales. Read on to learn more about a partner who can optimize your website with the technology to drive your business onward to profit.

  • Case Study: Data Protection for Grocery Distribution and Retail Markets

    Sponsored by: Protegrity

    Tap into this case study to learn how Protegrity enabled a supermarket chain to increase the level of security in its data exchange and analyze data anonymously while meeting GDPR standards.

  • Cortex XSOAR SOC Automation Tour

    Sponsored by: Palo Alto Networks

    Learn how a modern SOC solution like Cortex XSOAR SOC leverages automation to offer threat hunting, monitoring and incident response services in this webinar.

  • Media Nova Optimize Images in Split Seconds to Maximize Sales

    Sponsored by: MediaNova

    For any organization that sells products online, you know the importance of having thousands of product images optimized for your customers to view. You don’t know what device your customer is using nor that screen size or browser. All these variables impact your customer experience, and your sales. Read on to learn more and optimize your site.

  • MBC’s Private CDN: Living on The Edge

    Sponsored by: MediaNova

    In this case study, see how the global streaming giant MBC brought over 66,000 hours of video content in a new interface and partnered with a global leader in CDN to make it happen. The results were as expected. MBC’s subscriber rates soared, and they continue to add customers. Read on to see how they did it and what CDN they chose and why.

  • The Need for Real-Time Analytics

    Sponsored by: PingCap

    To make the best possible operational decisions, you need the most current and accurate data. The benefits of being able to explore data in real time allows your business to respond quickly and appropriately to whatever may arise. Read on to learn more about TiDB and its ability to get you the data you need when you need it most.

  • Cybersecurity For Retail: Prevention Is Better Than The Cure

    Sponsored by: Tanium

    Prevention is almost always better than the cure. But how many organisations are living up to the promise in the retail sector? Tanium surveyed IT and Security leaders in Retail for their views in the state of security in this focussed report.

  • HackerOne Assets Demo

    Sponsored by: HackerOne

    The widespread growth of organizations’ digital presence has resulted in a security dilemma. With every asset a potential for hacker, it is crucial that organizations regain visibility and effectively monitor their digital assets. This video presents a demonstration of HackerOne’s asset management solution. Watch now to learn more.

  • How SASE safely replaces MPLS with cheaper internet links

    Sponsored by: Superloop

    MPLS was designed for use in the legacy, pre-cloud world where all enterprise users typically worked in a branch and all traffic was routed back to a data center to access IT applications and resources. Access this white paper to learn how SASE safely replaces MPLS with cheaper internet links.

  • DELIVER HYBRID CLOUD YOUR WAY

    Sponsored by: Nutanix

    Digital transformation can have massive impacts on all parts of your organization, but many transformation attempts fail to address manual workflows, re-platforming and the challenge of shifting company culture. To address these critical elements, explore the benefits of a unified hybrid multicloud management platform like Nutanix in this e-book.

  • 7 Features you Should Look for When Choosing a PAM Solution

    Sponsored by: SSH Communications Security Corp.

    As the digital transformation has drastically increased organizations’ digital presences, access management has become more important than ever for maintaining security.This data sheet looks at what constitutes an effective privileged access management (PAM) solution, highlighting 7 key factors. Download now to learn more.

  • Major Oil Company Chooses Tokenization To Achieve Pci Compliance

    Sponsored by: Comforte AG

    Are you looking to protect customer data stored in a highly complex environment while meeting compliance standards? Access this case study to learn how a major oil company was able to reduce risk and potential impact of data breaches while meeting compliance standards by leveraging SecurDPS to tokenize sensitive customer data.

  • Database Modernization & Optimization

    Sponsored by: AWS and Cloudreach

    For organizations that have database initiatives that involve optimizing performance, then you need a strong understanding of what it really means to modernize and optimize your database in today’s workplace. In this webinar you will learn from industry experts on current database challenges and how optimization is the key. Watch more to see how.

  • Intelligent Industry: Manufacturing Edition

    Sponsored by: AWS and Capgemini

    Businesses that are focusing on digital technology will be the ones that see success in the next generation where digital will be embedded in everything. There is no time for long, drawn out transformations anymore. Today, companies are forced to figure it out quickly. Read on to learn more about the future of intelligent industry and be prepared.

  • Five Ways to Ensure Your Edge Infrastructure Checks Every Box

    Sponsored by: Cisco

    The ability of hyper-converged infrastructure to simplify operations, provide future-ready cloud-scale flexibility, and support advanced data management have made the system a go-to for organizations improving their digital experience. Download this white paper to access 5 key factors necessary for effective edge infrastructure.

  • Accelerating the Results That Matter to Your Mission (AUS)

    Sponsored by: Elastic

    Today, public sector organizations are expected to find and share insights faster, monitor infrastructure for anomalies, and protect targeted systems and data. However, many organizations struggle to find solutions that can enable this. Access this white paper to discover more.

  • REDUCE MANUAL AP WORK TO INCREASE VISIBILITY AND IMPROVE CONTROLS

    Sponsored by: Hyland

    As the digital transformation changes workforces across the world, it has become critical for businesses to capture invoices electronically and deliver them to the appropriate people for review, approval and coding. However, this transition can seem daunting, and many don’t know where to begin. Access this white paper to learn more.

  • Data Management for VMware Tanzu

    Sponsored by: VMware Tanzu

    Are you looking to deliver ease of operations, automation and scalability to your vSphere-powered data centers and clouds? Access this product overview to learn how you can get the same ease of use from a managed service while maintaining control over data services by leveraging Data Management for VMware Tanzu.

  • Reducing Maintenance Spend With Optimized Facilities And Field Service Management

    Sponsored by: Accruent

    Access this case study to learn how EHU has created structured scheduling processes for preventative and reactive work orders, complete with live updates and risk assessments that ensure procedures are done in a safe, compliant manner with help from Accruent.

  • How Law Firms Achieve Flawless Meetings

    Sponsored by: Accruent

    Meetings are the de facto epicenter of where business gets done. But it can also be a challenge. Access this white paper to explore how you can enhance your meetings quality, all while attracting and retaining high-quality employees.

  • How To Overcome Common Turnaround Challenges

    Sponsored by: Accruent

    Plant turnaround – or plant shutdown – is both an inescapable reality and a common occurrence as assets age, processes fail, and you need to periodically shut down to make upgrades and repairs. Access this blog post to learn how you can overcome common turnaround challenges with best practices and tools.

Browse by Report Type: .NET White Papers | .NET Multimedia | .NET IT Downloads

See more topics related to: .NET

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.