ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • LevelBlue Futures™ Report 2024

    Sponsored by: AT&T

    This 2024 research uncovered the relationships between the barriers to cyber and cybersecurity resilience and how the business prioritizes them. Get your copy of the report to learn what’s on the horizon that may impact cyber resilience, five steps for prioritizing cyber resilience, and more.

  • How to Check If Blood Samples Stayed Chilled Out in Transit

    Sponsored by: Zebra Technologies

    Healthcare expert Lorna Hopkin has noticed a disturbing trend towards retest request normalcy in blood work, in which more and more samples are being rejected for controllable reasons. Discover why implementing RFID systems can be a game-changer for reducing retest requests in her recent blog piece.

  • Secrets At Scale For Japan’s Most Visited Website

    Sponsored by: HashiCorp

    Managing the data of over 80 million users presents JAPAN with a number of challenges. By adopting HashiCorp Vault, JAPAN developed a high-availability system that incorporates the latest cryptographic technologies that Vault offers, while maintaining the functionality of the existing key management system. Read on to learn more.

  • Liberate Your Mixed IT Environment: More Choices, Lower Costs And Reduced Risks

    Sponsored by: SUSE

    As enterprises embrace mixed IT environments, maintaining flexibility and control is crucial. Learn how SUSE can simplify management, minimize risks, and liberate your Linux ecosystem in this white paper.

  • Boost Your Efficiency and Productivity with Contact Center AI Solutions: 7 Key Benefits of Using AI in Your Contact Center

    Sponsored by: Broadvoice

    Contact center AI solutions can boost efficiency, increase agent productivity, and streamline operations. Learn the 4 ways AI enhances contact center performance and 3 tips for effective implementation. Read the full article to discover how AI can improve your contact center.

  • Hpe Synergy For Composable Infrastructure Versus Cisco Ucs

    Sponsored by: Starshot Ventures LLC

    Infrastructure as a Service (IaaS) has gained enormous popularity because of the ease and speed with which it lets companies deploy and manage compute to handle varied workloads. Read this paper to learn how HPE Synergy facilitates IaaS in your company’s data center by being more unified, with simpler management, than its competitors.

  • Sophos Enabled Its Sales Team Through Routine Salesforce Updates With Whatfix

    Sponsored by: Whatfix

    When this global cybersecurity team began to struggle with disconnected client relationships and poor win rates, they invested in Salesforce CRM to improve their outcomes. However, facilitating this change proved to be no easy task. Watch this short video to learn more.

  • University of Washington Valley Medical Center Secures PACS Performance and Availability with Nutanix

    Sponsored by: Nutanix

    UW Valley Medical Center improved PACS performance and availability by consolidating on Nutanix's hyperconverged infrastructure. Key benefits include simplified management, scalable capacity, resilient data protection, and responsive support. Read the full case study to learn more.

  • Email Security Buyer's Guide

    Sponsored by: Checkpoint Software Technologies

    Email is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.

  • Observability Buyer’s Guide

    Sponsored by: Splunk

    To drive digital resilience, many organizations have adopted an observability tool. So, when evaluating the observability market, what selection criteria should IT leaders keep in mind? Tap into this 18-page buyer’s guide to discover 3 key considerations.

  • AI/ML-powered Medicare Advantage benefit design

    Sponsored by: ZS

    The competitive Medicare Advantage (MA) market is growing rapidly, and health plans are under pressure to differentiate themselves. One way to do this is by designing a benefits package that meets the evolving needs of MA customers.

  • The Big Book of Genai 5 Ways to Leverage Your data to build Production-Quality GenAl Applications

    Sponsored by: DataBricks

    This 118-page e-book is a thorough guide to deploying GenAI applications. It details the entire GenAI process, from using foundation models to custom model pretraining and fine-tuning. Access the full e-book now to learn how you can unlock the potential of GenAI for your organization.

  • Moving at Consumer Speed

    Sponsored by: Teradata

    When 77% of today’s customers agree that they prefer doing business with companies that provide a seamless CX, it’s no wonder why so many organizations have started to prioritize their CX efforts. However, finding the right ways to combine CX and data is easier said than done. Access this guide to learn more.

  • Shaping the Future: Artificial Intelligence for Financial Services

    Sponsored by: Pure Storage

    Although AI is already having an impact on nearly every facet of business in financial services, one wrong move can lead to automated disaster. Discover in this e-book the top 10 challenges to AI success in financial services… and how to solve them.

  • M-Trends 2024 Special Report: Today’s top cybersecurity trends

    Sponsored by: Google

    The M-Trends 2024 Special Report is a must-read for security practitioners and security leaders driven to stay one step ahead of rapidly evolving cyber threats. These learnings help increase cybersecurity awareness and lead to enabling action for improved cyber defense capabilities against future compromise.

  • Cyber Drill Data Sheet

    Sponsored by: SimSpace

    According to a recent study, 80% of respondents feel their organization is unprepared to handle a severe cyberattack that happens in production. The SimSpace platform provides a suite of cyber drills designed to evaluate and enhance the capabilities of cybersecurity personnel, teams, and defenses across various scenarios. Read on to learn more.

  • Platform Datasheet

    Sponsored by: SimSpace

    What if there was a way to simulate an attack to gain experience, without putting your organization at risk? Download this data sheet to learn how the SimSpace platform can help you model your production environment and continuously emulate real adversaries to test your defenses.

  • Training Data Sheet

    Sponsored by: SimSpace

    Emulate real-world cyber threats to train and prepare your security team. The SimSpace platform enables comprehensive training in a realistic production environment, with adversary emulation, performance analytics, and collaborative learning. Read the full product overview to learn how you can enhance your team's cyber readiness.

  • AI for Sales

    Sponsored by: Be-Terna

    In this webcast, you’ll find out about the potential of AI for sales, including the top 10 use cases you can start using today as well as best practices for getting started. Tune in now to evaluate your organization’s AI readiness and discover how you can empower your sales reps.

  • PREVENTING NEXT-GENERATION THREATS THROUGH AI AND INNOVATION

    Sponsored by: Checkpoint Software Technologies

    The current threat landscape is more untenable than ever before. Enter artificial intelligence (AI). By integrating AI into security technologies, organizations can enhance threat prevention. Download this white paper to learn more.

  • Omdia Universe: Email Security, 2024

    Sponsored by: Checkpoint Software Technologies

    Email is notoriously susceptible to attacks, making email security a continuing necessity for organizations. In order to make sense of a crowded and complex market, this Omnia Universe report breaks down the most important information about the landscape as a whole, as well as leading vendors. Read on to learn more.

  • 5 Ways Event-Driven Automation Can Help You Achieve More

    Sponsored by: Red Hat

    Discover how event-driven automation enhances IT proactivity, efficiency, and streamlining in this white paper.

  • RANSOMWARE PREVENTION ESSENTIAL GUIDE

    Sponsored by: Checkpoint Software Technologies

    Ransomware is a growing threat, with attacks costing millions. This guide provides practical tips to protect your business, including using zero-trust network access and secure web gateways. Learn how to build a secure corporate network and prevent ransomware attacks. Read the white paper to learn more.

  • AI Regulation Is In The Works, With Strong Consumer Support

    Sponsored by: S&P Global

    As AI continues to advance, there is growing consumer support for federal regulation to address concerns around fraud, privacy, and misuse. This article explores current AI regulation efforts in the US and EU, and the need to balance innovation with protecting the public. Read the article to learn more.

  • What Is Tier Pricing For Cloud Services? And Why You Should Consider It

    Sponsored by: Rumble Cloud

    For a leader’s guide to tiered pricing for cloud services, dig into this 11-page white paper and discover the approach’s pros and cons.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.