ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • Accelerate digital innovation with Now Assist

    Sponsored by: ServiceNow

    Empower your developers to build apps faster and more efficiently with generative AI. Read this e-book to discover how AI-generated code suggestions and text-to-code can reduce repetitive manual work and unleash your developers’ skillsets. The result? Accelerated app development, increased productivity, and 30% higher developer productivity.

  • REVOLUTIONIZING THE LOW-CODE EXPERIENCE: THE POWER OF GENERATIVE AI

    Sponsored by: ServiceNow

    With a widening developer skills gap, how can you meet demand for faster, more agile app development, while also reducing costs? By empowering developers with GenAI. Read this e-book to see how you can drive productivity, close talent gaps, and enable agile innovation, while also cutting costs, using ServiceNow’s AI-powered platform.

  • The business case for low code

    Sponsored by: ServiceNow

    Businesses need a way to innovate faster and at scale. Enter AI-powered low-code app development. In this e-book, you’ll learn how developers of all skill levels can simplify, streamline, and scale app development for maximum ROI. Read on now to find out how you can deliver more ideas and drive better results, faster.

  • Discover how intelligent automation and GenAI fuels agility and maximizes efficiency

    Sponsored by: ServiceNow

    How can low-code app development help you unleash the full potential of your workforce? By enhancing productivity while enabling a more agile work environment—when you use a smart low-code strategy and intelligent automation on the ServiceNow platform. Read this e-book to discover more.

  • Journey to modernizing IT services and operations

    Sponsored by: ServiceNow

    How can you boost workforce productivity AND deliver better IT services? In this three-step guide, discover how you can increase IT service agent efficiency by 66% with real-time IT visibility and AI-assisted recommendations, while increasing productivity by 30% with automated self-service.

  • Learn how to best incorporate GenAI into your IT estate

    Sponsored by: ServiceNow

    How can you supercharge productivity across all your workflows AND create great experiences for employees and customers? Read this guide to see how innovative companies like yours can say YES to both with AI. Learn how you can accelerate business agility to drive better business outcomes, using a single AI-powered cloud platform.

  • How to Build a Proactive Compliance Program with Identity Security

    Sponsored by: CyberArk

    This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.

  • How to Improve Your Cloud Resilience

    Sponsored by: AWS Opti9

    In under 30 minutes, learn how to boost your cloud resilience and protect critical applications by tuning into this webcast, which features insights from Principal Solutions Architect at AWS, Diego Dalmolin, and Cloud Alliances Director at Opti9, Drew Jenkins.

  • State of Security The Race to Harness AI

    Sponsored by: Splunk

    In the State of Security 2024: The Race to Harness AI, Splunk identifies organizations that are pulling ahead of their peers and shares key characteristics and findings. Download the full report to learn how cybersecurity leaders are overcoming obstacles, innovating with AI and boosting digital resilience.

  • Top 50 Cybersecurity Threats

    Sponsored by: Splunk

    This book arms you with 50 of the top cybersecurity threats. Download your copy to learn about the most common cyber threats used by hackers today, how these threats are commonly utilized for attacks, and more.

  • The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat

    Sponsored by: Contrast Security

    Watch this webinar to break down the state of application security and threat landscape for financial services companies, alongside experts from Contrast Security and AWS. Don’t risk missing best practices for improving app security and the benefits of implementing runtime security covered.

  • Making the Better Choice for Adopting Data Security as a Service - Top 10 Decision Points for Choosing the Right Vendor

    Sponsored by: Utimaco

    This webcast takes a deep dive into Data Security as a Service, including the basics of this strategy, the top 10 decision points for choosing the right vendor, and more.

  • Discover the Gold Standard for Cloud Security

    Sponsored by: Utimaco

    In this webcast, discover how to protect your digital infrastructure throughout all cloud deployment models. Inside, discover an overview of today’s cloud usage, cloud deployment model basics, and how to achieve robust cloud security in two simple steps.

  • How to Achieve DORA Compliance with Data Protection

    Sponsored by: Utimaco

    Compliance with the Digital Operational Resilience Act (DORA) is intended to improve resilience against cyberattacks. In this webinar, uncover DORA’s objective, target market, timeline, and key requirements and tools for achieving compliance.

  • Navigating Cybersecurity as a Service

    Sponsored by: Utimaco

    This webinar shines a light on Cybersecurity as a Service: what it is, key benefits it offers, who should consider it, and more. Also inside, discover real-world success stories of organizations that have adopted this strategy.

  • Future-Proof Your Talent With an AI-powered Skills Strategy

    Sponsored by: Censia, Inc

    Today, it’s reported that fewer than 10% of HR leaders have a skills database with complete employee profiles. This means that it’s critical for organizations to revamp their talent solutions and improve their strategies. However, doing so is easier said than done. Tune into this webinar to learn more.

  • Copilot for Microsoft 365

    Sponsored by: Bytes

    Copilot for Microsoft 365 is now available for organizations of all sizes, with no minimum seat requirement. In this landing page, you’ll find out how you can use it to ease digital overload by combing powerful LLMs to assist you with any tasks. Read on now to discover how you can prepare your business for a new era of productivity.

  • Data Driven Decision Making with Microsoft Fabric

    Sponsored by: Bytes

    During this webcast from the Ignite Innovation with Microsoft event, experts from Bytes will share an overview of Microsoft Fabric. Tune in now to discover its data integration and analysis capabilities and find out how you can start putting Fabric into practice.

  • Master Class: Network Threats

    Sponsored by: Cato Networks

    In this webcast, Cato Networks brings together the voices of Staff Security Engineer, Dolev Attiya, Security Research Team Leader, Matan Mittelman, and Sr. Director of Security Strategy, Etay Maor, for an in-depth discussion of network threats. Watch now to learn more.

  • Gain Exceptional Access Security and Data Protection with FortiSASE on Google Cloud

    Sponsored by: Fortinet, Inc.

    FortiSASE on the Google Cloud network is a significantly better approach to securing modern IT environments. The key benefits include scalability, flexibility, cost efficiency, enhanced security, and improved user experience. Read the solution brief to learn how a global cloud infrastructure is perfect for SASE.

  • Fortinet Unified Secure Access Service Edge

    Sponsored by: Fortinet, Inc.

    Fortinet SASE Solution Earns AAA Rating. CyberRatings.org thoroughly tested FortiSASE to determine how it handled TLS/SSL 1.2 and 1.3 cipher suites, how it defended against 205 exploits and 7,140 malware samples, and whether any of 1,124 evasions could bypass its protection. Read the full report to get all the details.

  • Centrally manage data, movement, and taxes of excisable goods

    Sponsored by: SAP

    Traditional approaches to handling excise taxes, such as through manual processes, can open the door to errors. And as this overview puts it, "All you need to do is miss one tax-relevant material movement or make a tax-calculation error, and you've got a costly penalty to pay." Read on to learn how to modernize your strategy.

  • Single-Vendor SASE

    Sponsored by: Fortinet, Inc.

    This Dummies guide introduces you to Single-Vendor SASE—the delivery of networking and security capabilities from one vendor in a unified solution. Learn how consolidation can help IT network and security teams drive operational efficiency, reduce costs, and eliminate needless complexity.

  • SAAS Playbook Supporting your journey to SaaS

    Sponsored by: AWS

    Whether you’re in the process of adopting a Software-as-a-Service model or your business was born in the cloud, the road to embracing SaaS is not easy. This playbook outlines the four phases of the SaaS journey and the key activities and outcomes you should expect.

  • Find Known and Unknown Threats Faster

    Sponsored by: Fortinet, Inc.

    FortiCNAPP offers unified control from code to cloud, ensuring your security measures are always a step ahead of potential threats. Read this solution brief now to learn how you can defend your organization against evolving threat actors.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.