ComputerWeekly.com Research Library

Powered by Bitpipe.com

Coalition Against Unsolicited Commercial Email Research

  • Introduction to Perspectium

    Sponsored by: ServiceNow

    This video highlights the two major problems Perspectium can solve for ServiceNow customers: automating data extraction at volume and velocity, for archive, backup/restore, reporting and analytics, migrations, and more and providing a platform for service providers to connect with their customers throughout the service relationship.

  • IT jobswatch – trends in media IT recruitment

    Sponsored by: ComputerWeekly.com

    This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.

  • Palo Alto Networks rockets resiliency by transforming IT

    Sponsored by: ServiceNow

    Problem management is an IT service management process that follows the life cycle of underlying service problems. In this webinar, learn how Palo Alto simplified problem management processes using digital workflows and automation, and how you can do the same at your organization.

  • Real World Stories of IT Admin Heroes

    Sponsored by: Pure Storage

    Check out this compendium of case studies to see 7 shining examples of everyday IT admin heroes as they use Pure Storage to help their organizations simplify and transform operations for mission-critical databases, virtualized environments, and analytics with all-flash and NVMe.

  • Secure IT Asset Disposition: Achieving Business Value While Mitigating Risks

    Sponsored by: Iron Mountain

    The risks of not having an IT asset disposition (ITAD) solution are substantial.Download this white paper for advice on how to dispose of old IT equipment successfully while achieving security, compliance, and environmental goals.

  • Solution Spotlight: Creating a Strong Customer Experience Management Strategy

    Sponsored by: SearchCRM

    In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.

  • The definitive IT troubleshooting guide

    Sponsored by: TechTarget

    Applications composed of microservices in containers on distributed resources hardly look like their monolithic ancestors from just a few years ago. Yet, no matter the architecture, IT operations support must quickly identify and rectify any problems in production. Open this guide for best practices on monitoring for container-based applications.

  • Visibility to Containers: Measurable outcomes from CMDB

    Sponsored by: ServiceNow

    Containers couple both applications and systems dependencies together into a single artifact and introduce a new layer of abstraction, simplifying DevOps. Access this eBook to learn how teams can leverage this efficiency to transform legacy IT into fast IT through automation, reduced costs, and improved productivity.

  • 11 Questions Every CIO Should Ask Their IT Manager

    Sponsored by: Red Hat and JBoss

    What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.

  • Easy Active Directory Clean-Up Tips

    Sponsored by: One Identity

    Inside this E-Guide, read through some Active Directory organization strategies designed to minimize the headaches that often accompany user group restructuring projects – and ultimately reduce the time spent sifting through messy group architectures.

  • eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices

    Sponsored by: RES Software

    Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...

  • eBook: The Shortcut Guide to User Workspace Management - Chapter 4: Transforming to an Environment of User Workspace Management

    Sponsored by: RES Software

    You’ve already come to understand the workspace itself, and how that workspace can be made pervasive across the spectrum of delivery mechanisms.

  • Gartner Middle East CIO Leadership Forum

    Sponsored by: Gartner

    Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.

  • Presentation Transcript: Why Implement a Pilot Program for Desktop Virtualization? Why Now?

    Sponsored by: DellEMC and Intel®

    Why is a pilot implementation so important?  This presentation transcript will help you understand how a desktop virtualization pilot works, how to select the right user group, why it's critical to the success of a full desktop virtualization implementation; and what you need to consider before getting started.

  • SAP and Voice: Optimize Supply Chain Operations

    Sponsored by: Voxware, Motorola, and PEAK Technologies

    Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.

  • Take the Modernization Impact Assessment

    Sponsored by: Hewlett Packard Enterprise

    Take this online assessment today to discover the impact that modernization can have on your organization's IT environment, and find out what you can do to plan for modernization success.

  • Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations

    Sponsored by: Oracle Corporation

    Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.

  • The 7 Deadly Skills of The Perfect Employee

    Sponsored by: Skillsoft

    This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.

  • The 7 Deadly Skills Your IT Team Should Possess

    Sponsored by: Skillsoft

    This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.

  • The Changing Role of the CIO

    Sponsored by: Hewlett-Packard Enterprise

    This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.

  • Transcript: The Changing Role of the CIO

    Sponsored by: Hewlett Packard Enterprise

    This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.

  • Which Users Should You Virtualize?

    Sponsored by: Dell, Inc. and Intel®

    Examine your desktop virtualization goals and determine which users you want to virtualize in this expert discussion with Brian Madden. Discover how your goals will change the way you implement your desktop virtualization initiative.

  • Why Business Rules?: A Case for Business Users of Information Technology

    Sponsored by: IBM

    This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.