ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • Intel Google Cloud Webinar

    Sponsored by: Google and Intel

    To review recent findings from a survey about the evolving edge ecosystem – and to understand changes that impact telcos and hyperscalers – tune into this webcast that features 5 subject-matter experts.

  • Time to Simplify: A Fresh Look at Infrastructure and Operations for Artificial Intelligence

    Sponsored by: Red Hat

    This blog examines the need for a simplified infrastructure and operations approach to Artificial Intelligence (AI). It discusses the challenges of traditional IT infrastructure and operations, and how AI can help to reduce complexity and cost. Read the blog here.

  • Unlocking Seamless Cross-Cloud Connectivity with Prosimo

    Sponsored by: Prosimo

    Organizations operating in today’s complex multi-cloud landscape face challenges in ensuring seamless resource integration, optimizing performance, and safeguarding their network against potential vulnerabilities, among other difficulties. Download this white paper now to learn how you can enable a streamlined, connected multi-cloud environment.

  • MDR Buyer’s Guide

    Sponsored by: Arctic Wolf

    What can you do to support your security team and protect your business from increasing threats? Managed Detection and Response (MDR) solutions can help not only through traditional capabilities, but also by supporting security posture improvement over time. Access this buyer’s guide to learn how you can identify the right MDR solution for you.

  • How To Prepare Your Cybersecurity Program

    Sponsored by: Arctic Wolf

    Just because your business is small to medium sized, that does not mean it is any safer from cyberattacks than the largest corporations around the globe. This guide articulates 8 steps an SMB can take to start improving their security posture and put themselves in a position to be more resilient to threats. Read on to learn more.

  • Managing and Preventing Claims Denials

    Sponsored by: Inovalon, Inc.

    Reducing denials is on all of us. The revenue cycle starts at patient registration and doesn’t end until payment is posted. To collect effectively, every department must be engaged in managing and preventing claims denials. In this webinar, discover strategies to improve accountability, engagement, and cash flow.

  • From Silos to Success

    Sponsored by: Dataiku

    In this video, you’ll hear from Shaun McGirr, Field CDO at Dataiku, and Peeyush Aggarwal, Deloitte banking expert, about how decentralized data management can help banks overcome data silos and harness the full power of data through AI. Tune in to learn how you can make the most of your data assets.

  • How-To Guide Unlock The Full Potential Of Trino

    Sponsored by: Starburst Data

    Data is scattered, complex, and ever-changing. Enter Trino: a widely used, massively parallel processing (MPP) query engine for rapid, SQL-based analytics of big, distributed data. In this e-book, you’ll discover how you can leverage Trino as a critical data architecture component to accelerate your access to data. Read on to learn more.

  • 3D Digital Twin with the Viya Platform

    Sponsored by: SAS and RWA

    The world of motherboard manufacturing can be delicate and difficult to fully understand, especially for those unfamiliar. This white paper can provide you with an inside look at the current market and its top vendors.

  • Is Your Use Of Threat Intelligence Up To Scratch?

    Sponsored by: Kaspersky

    In under 10 minutes, Kaspersky’s easy online tool lets you assess your team’s capabilities against 15 key metrics like time to detect, triage and prioritizing incident response, and dealing with false positives - and get customized recommendations based on your responses. Check out this resource to learn more.

  • Separating Fact from Fiction with At-Bay: 3 Myths About Cyber Insurance

    Sponsored by: AWS & At-Bay

    Today’s threats, growing by 15% annually, represent a huge financial burden for businesses, but many are yet to invest in cyber insurance. Join insurance and cybersecurity experts at INSUREtrust and At-Bay as they discuss the most damaging myths about cyber insurance and how AWS and At-Bay partnered to introduce the world’s first InsurSec solution.

  • Kaspersky Digital Footprint Intelligence

    Sponsored by: Kaspersky

    Dealing with phishing and scam URLs requires a thorough understanding of your footprint, through a combination of network reconnaissance, continuous dark web monitoring, and data leakages discovery. You can get all these capabilities and more with the Digital Footprint Intelligence service. Take a look now to learn more.

  • Building Great Data Products with SAS Analytics

    Sponsored by: SAS and Katalyze

    Despite the recent advancement in data and data technologies, many organizations are still struggling with a handful of challenges. So, how can you best combat these hurdles? What strategies or solutions can you leverage to alleviate stress and which vendors best fit your company’s needs? Tune into this webinar to learn more.

  • People, Processes, Technology: Building A Successful Security Operations Center

    Sponsored by: Kaspersky

    Security Operations Centers (SOCs) are an increasingly popular way for organizations to secure themselves by centralizing personnel, tools and expertise. However, building or expanding an existing SOC involves overcoming many complex challenges. Download this white paper to learn how to solve these problems on your way to building the future SOC.

  • 5 Artificial Intelligence Sales

    Sponsored by: Pipeliner

    For today’s organizations, sales forecasting has never been more important. To keep up with new standards, many have turned to AI to better navigate and explore customer and prospective data captured in CRM. However, there is still a lot of misinformation spread about AI in sales. Browse this e-book to learn more.

  • 6 Tips for Evaluating HR Tech Providers

    Sponsored by: Paycom

    Despite recent HR tech developments, many organizations still aren’t satisfied with their tools. So, when 67% of employees report they would take a pay cut for workplace tech twice as good as what they currently have, it’s clear some considerations must be made. Access this guide to learn more.

  • Leverage Demand Planning And Forecasting For Best0in0class Performance During Volatile Times

    Sponsored by: Workday

    Due to market volatility and process inefficiencies, many organizations are searching for effective ways that they can improve their financial planning and analysis (FP&A) capabilities. However, most are unsure of where to start their transformations, especially when it comes to picking an FP&A solution. Browse this report to learn more.

  • Build a Better Webinar Day of Execution

    Sponsored by: BrightTALK by TechTarget

    You've spent weeks preparing for your webinar and done most of the heavy lifting before your go-live day. Now it's show time! Ensuring everything goes smoothly during your webinar is key to delivering a positive and engaging audience experience. Browse this e-book to learn more.

  • Build a travel search form with Bootstrap

    Sponsored by: Amadeus

    Learn how to build a sleek travel search form with Bootstrap. This step-by-step tutorial covers form layout, input validation, and responsive styling. Build your own flight search app in minutes with the Amadeus for Developers APIs. Read the full post to get started.

  • The Total Economic Impact Of Cisco Duo

    Sponsored by: Cisco DUO

    Through four customer interviews and data aggregation, Forrester analyzed the three-year financial impact of Cisco Duo. View the infographic for a summary of solution benefits, user quotes and the real ROI of Cisco Duo.

  • How to build an aircraft seat map in React

    Sponsored by: Amadeus

    Learn how to build an interactive aircraft seat map using React and data from the Amadeus SeatMap Display API. Follow a step-by-step tutorial to create components for seats, exits, facilities & wings. Then connect your frontend to the API. Read the full blog post to boost your travel app's UX.

  • Duo Trusted Endpoints

    Sponsored by: Cisco DUO

    How can you strengthen your defense against unauthorized access to your digital assets? In this overview, explore the full potential of device trust with Duo Trusted Endpoints.

  • VMware names Hero For Good winners in Global Customer Achievement Awards

    Sponsored by: VMware, Inc.

    Reviewed, evaluated and ranked by a panel of judges, 2 of VMware’s customers were awarded as winners in the “Hero for Good” category this year. These organizations effectively leveraged cloud and application transformation efforts to enable heroic acts for the public good. Check out who won in this resource.

  • What Is DO-178C?

    Sponsored by: Wind River

    DO-178C, Software Considerations in Airborne Systems and Equipment Certification, is the principal certification document used by aviation across the world. This blog explores the ins and outs of DO-178C, going through its many parameters and criteria for qualification so that you can better understand and comply. Read on to learn more.

  • QR Code Phishing: What You Need To Know

    Sponsored by: Cofense

    QR code phishing attacks are on the rise, exploiting the ubiquitous technology to steal data. Learn how to spot malicious QR codes, protect yourself, and train employees. Read on for details on real-world attacks and defense strategies. Learn more in this resource.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.