Research Library

Powered by

.NET Multimedia

  • The Complexities of APACs Threat Landscape - Part 1

    Sponsored by: Rapid7

    In the first of a two-part series, join an expert panel as they discuss the challenging and evolving threat landscape in the Asia Pacific region. The panel shares their views as to how Asia Pacific fares up against other global regions in cyber awareness, and the heightened discussions in government policy to combat threat actors.

  • On-Demand Webcast | From Ransomware Defense to Cyber Resilience: Addressing Threats Head-On

    Sponsored by: Cohesity

    Ransomware is evolving, with cybercriminals going after both your IT production and backup data. If you're going to survive and thrive in a data landscape littered with cybersecurity threats, your cybersecurity strategy will need a significant boost. Watch this webcast to hear thought leading CISOs and CIOs.

  • Couchbase Cluster demo with Red Hat OpenShift and Twitter

    Sponsored by: Red Hat and Couchbase

    In this product demo, you will learn how to configure a multi-node Couchbase Cluster and deploy an app that consumes Tweets from Twitter with specific hashtags. Tune in to learn more.

  • RUCKCast #74: RWG - The New Dog On The Block

    Sponsored by: Ruckus Wireless

    For enterprises and service providers, having powerful network services is the key to attracting and retaining more customers. To do that, you need a purpose-built network that offers complete connectivity, robust security and efficient management. Today, there is a new solution that can provide all of that. Listen to this podcast to learn more.

  • RUCKCast #73: The Evolution that is RUCKUS One

    Sponsored by: Ruckus Wireless

    For an introduction to a new AI-driven cloud platform, tune into this episode of Ruckus Networks’ podcast, RUCKCast.

  • Video

    Sponsored by:

    When it comes to marketing platforms, Salesforce has been an industry leader for years. However, your platform experience is only as good as the customer data you feed into it. But with the right integration platform, you can use a bidirectional low-code interface to ensure there are no gaps in your databases. Watch this video to learn more.

  • The Warehouse as a Marketing Engine: The Composable CDP

    Sponsored by: Hightouch

    Tune into this webinar featuring Tajas Manohar, Founder + Co-CEO at Hightouch andGuy Tsror, Data Scientist at Wealthsimple, as they discuss how to use the data warehouse as a marketing engine.You will learn:What makes a composable CDPHow Wealthsimple uses customer dataBenefits of Wealthsimple’s composable approach

  • Backup and DR for Databases on OpenShift with Gaurav Rishi & Michael Courcy

    Sponsored by: Red Hat & Veeam

    This webcast takes a deep dive into backup and disaster recovery for databases on OpenShift, and specifically how Kasten by Veeam can assist in those efforts. Tune in to learn how you can leverage the solution to enhance backup and restore, disaster recovery, and application mobility for your IT environment.

  • RUCKCast #68: Choose Your Own CloudPath

    Sponsored by: Ruckus Wireless

    To learn about augmenting your organization’s network access security, tune into this episode of Ruckus Networks’ podcast, RUCKCast.

  • Google Cloud Video

    Sponsored by: Google Cloud

    Learn in this short video how Google Cloud can help your organization with a suite of tools and services designed help developers quickly build applications on AI-optimized infrastructure.

  • Digital Execution at the Speed of Innovation with Cloud-Native Low-Code

    Sponsored by: Siemens

    While it’s reported that 68% of manufacturers have started their digital transformation and smart factory initiative or will start in the next year, only 30% have achieved success or are seeing business value. But why is this? Tune into this webinar to learn more.

  • Siemens Global Webinar

    Sponsored by: Siemens

    Due to the variability of today’s manufacturing processes, it has become critical for companies to integrate specific solutions into their manufacturing execution systems. So, how can this best be done? Access this webinar to learn more.

  • How Scheffler Group Democratizes App Development with a Low-Code Platform

    Sponsored by: Siemens

    Within the automotive industry as elsewhere, organizations need to be able to adapt and modernize in order to stay competitive against rapidly evolving competition. This webcast explores how the Scheffler Group democratizes app development with a low-code platform. Tune into the full webcast to learn more about the development benefits of low code.

  • Low Code Personalization with Opcenter Mendix

    Sponsored by: Siemens

    Low code implementations allow users a level of customizability that previously required software engineers to unlock. This video showcases Low Code Personalization for Opcenter Execution Foundation with Mendix, a combination of 2 existing Siemens solutions designed to give customers the ability to customize their UI. Watch now to learn more.

  • Reimagining Smart Manufacturing With Low-code Platform

    Sponsored by: Siemens

    To learn about the state of smart manufacturing, and to find out how to empower your organization’s smart manufacturing initiative, view this webcast.

  • Empowering Supply Chain Collaboration in an Unpredictable Marketplace

    Sponsored by: Siemens

    To discover how a manufacturer empowered supply chain collaboration, check out this webcast featuring insights from experts at Mendix and CNH Industrial.

  • Modern & Secure App Transformation with Red Hat OpenShift & Kasten K10

    Sponsored by: Red Hat & Veeam

    As more businesses utilize containerized apps, they also need to deliver the same enterprise-level SLAs and compliance requirements as legacy applications. Tune into this webcast to learn the importance of cloud-native principles in containerized app protection and why complete cluster disaster recovery is vital to maintain app availability.

  • Discussing our first annual cyber extortion report

    Sponsored by: Orange Cyberdefense

    Cyber extortion (Cy-X) is a form of cyberattack in which the security of a digital asset is compromised and exploited in a threat in order to extort payment. This webcast presents the research and findings of the first addition of Orange Cyberdefense’s Cy-Xplorer Cyber Extortion Report. Tune in now to learn more.

  • SAP Video

    Sponsored by: SAP

    How can your organization become an intelligent, sustainable enterprise? In this webinar, you’ll gain an understanding of how SAP Signavio can help you stay ahead of the competition by quickly realigning your business and innovating faster. Tune in to learn how you can maximize the efficiency of your business processes.

  • RUCKCast #72: Why RRM Is Better In The Cloud

    Sponsored by: Ruckus Wireless

    For an introduction to radio resource management (RRM) in the cloud, check out this episode of the Ruckus Networks’ podcast, RUCKCast.

  • Softchoice Video 1

    Sponsored by: Softchoice

    Tune in to this short video for everything you need to know about Enterprise Lifecycle Management, and how it can help your organization reclaim budget and get the best the value of your software entitlements and subscriptions.

  • Softchoice Video 4

    Sponsored by: Softchoice

    Discover in this short video why most IT teams are ready to get to zero-tolerance for wasted cloud spend, and how they just need a little help from the right coach.

  • Converged Defense Webinar

    Sponsored by: Claroty

    Traditional IT monitoring solutions weren’t designed to catch the types of threats that target IoT environments. In this webcast, Claroty Principal Product Manager, Gary Kneeland, talks through the state of converged IoT and OT cybersecurity, as well as how you can bolster your security with the MITRE ATT&CK framework. Tune in to learn more.

  • Detect Risks & Validate Security Controls - Webinar Series Part 3

    Sponsored by: Mandiant

    Collecting and analyzing threat intel is a common task for security teams. However, many teams struggle to use this data effectively due to information overload, data relevancy, and more. Now, there is a solution that helps you understand what threats are most critical to your organization by leveraging AI. Watch this video to see more.

  • Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1

    Sponsored by: Mandiant

    Organizations of all sizes must test and measure the effectiveness of their cybersecurity for compliance reasons, security operations, and more. However, exactly when and how to do it can be confusing for some, which is why this video explains the best practice methodologies to accomplish that task. Watch this video to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.