ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Multimedia

  • Continuous Delivery on Multi-Cloud-Predicting the Unpredictable

    Sponsored by: Digital.ai

    Releasing software is a complex and risky process, especially in today's fast-paced and competitive market. This video examines how to leverage data and analytics to optimize your release management and achieve higher release success rates.

  • 3 tips to unclog your application pipeline and accelerate your releases

    Sponsored by: Digital.ai

    Application development is a hectic process, and simple bottlenecks in your application pipeline can lead to reductions in release speed that cost your organization time and money. In this webcast, Digital.ai’s Matthias Zieger and Silvia Davis present 3 tips to unclog your application pipeline and accelerate your releases. Watch now to learn more.

  • Innovations in Next Generation Firewalls

    Sponsored by: Palo Alto Networks

    To deepen your understanding of the operational and financial benefits of a next-generation firewall, tune into this webcast that features subject-matter experts from Forrester.

  • ServiceNow Video

    Sponsored by: ServiceNow

    Automation exists to help organizations refine their workflows to save time and resources. But what good is automation if your automation process itself is fragmented and inefficient? Watch this explanatory video now to see how Automation Center serves as the modern IT leader’s single source of truth for automation across the enterprise.

  • How Leading Manufacturers are Building Factories of the Future

    Sponsored by: Tulip

    Today, the manufacturing industry is seeing rapid growth and evolution in its technology, tools, strategies, and landscape. However, keeping up with these changes is easier said than done. So, how can organizations ensure that they thrive? Tune into this webinar to learn more.

  • Moving AI from Innovation to Impact

    Sponsored by: Red Hat

    While organizations are experienced with more traditional AI technologies, generative AI (GenAI) is opening the door to what many believed AI could accomplish. In order to explore the affect GenAI has had on innovation initiatives experts from Red Hat and Forrester sit down to discuss the topic and share insights. Watch now to learn more.

  • Hybrid Cloud Demo Series From the Edge to the Data Center Cisco UCS X-Series Direct

    Sponsored by: Cisco

    Fragmented technology has forced modern IT into a difficult position. Reduced visibility is only the beginning of the consequences for data centers that don’t rapidly evolve. This webcast looks at data center modernization, and how Cisco UCS X-Series Direct presents the future of data center technology. Watch now to learn more.

  • Help your workers connect seamlessly and remain productive where work happens.

    Sponsored by: T-Mobile for Business

    Dialpad from T-Mobile provides one, unified AI-powered workspace for your calls, messages, and meetings. Watch these two videos for a brief run-through on how Dialpad works and how the platform modernizes your meetings.

  • Using AI to Stop AI-Based Attacks

    Sponsored by: F5 Inc.

    generative AI is allowing hackers to deploy more creative and difficult-to-detect attacks at much lower costs. So how can you secure against generative AI? Watch this webcast to unlock expert guidance from F5 and learn how leading security experts are using AI to stop AI-based attacks.

  • Securing Apps and APIs Across Hybrid and Multicloud

    Sponsored by: F5 Inc.

    Microservices trends have critically fragmented the traditional monolith approach to application usage. In less than thirty minutes, F5 Regional Solutions Architect, Keiron Shephard, provides a succinct breakdown of the current application and API security landscape in the age of cloud. Watch now to learn more.

  • The Smart Hotel

    Sponsored by: Comcast Business

    To remain competitive in the crowded hospitality market, hotels need visibility into their customer data. Enter IoT and AI. In this webcast, subject-matter experts from IDC and MachineQ, a Comcast Company, map out how hospitality organizations can leverage the technologies for success. Watch now to unlock the 30-minute presentation.

  • Phishing - resistant frictionless consumer experiences with passkeys

    Sponsored by: Okta

    81% of hacking-related breaches are caused by weak or stolen passwords. In this joint FIDO Alliance and Okta webinar, Okta’s Salman Ladha joins FIDO Alliance’s Megan Shamas to discuss the phishing-resistant security benefits of passkeys, as well as how they fuel superior customer experiences. Watch the webcast now to learn more.

  • Software Escrow: What it is & why it matters

    Sponsored by: NCC Group

    As decision makers become more aware of the risks associated with the supply chain, they are increasingly turning to software escrow as a solution. In this Techstrong TV webcast, Techstrong Group’s Michael Vizard, joins Escode’s Wayne Scott, to discuss software escrow, and its impact on the tech landscape. Watch now to learn more.

  • A Day in the Life of a Ransomware Attack

    Sponsored by: Comcast Business

    The average cost of a ransomware attack is $5.13 million, according to the “IBM Data Breach Report 2023.” To help you defend your organization against such financial loss, in this webcast a security expert from Comcast Business breaks down the ransomware attack lifecycle and prevention strategies. Tune in now to access 16 minutes of insights.

  • Connected World: Unveiling the Latest in Small Business Connectivity

    Sponsored by: T-Mobile for Business

    Traditional broadband can limit your business’s potential. Don’t let obsolete functions and outdated features hold you back. In this webcast, experts from CIO Marketing Services, T-Mobile for Business, and IDC Research, come together to discuss the importance of connectivity for modern businesses. Watch now to learn more.

  • Introduction to Change Risk Prediction

    Sponsored by: Digital.ai

    The circumstances of the modern business world force today’s organizations to embrace constant change. This video introduces Digital.ai’s Change Risk Prediction (CRP) product, which uses predictive AI to help organizations account for and deal with risk as they manage change. Watch the brief video now to learn more about CRP.

  • How GenAI Powers Cutting Edge Healthcare Innocation and Experiences

    Sponsored by: Comcast Business

    By 2026, IDC forecasts, 60% of global healthcare organizations will double their GenAI investments. To unpack that prediction and more, watch this webcast featuring Research Director at IDC Health Insights, Jennifer Eaton.

  • Study of the economic impact of Palo Alto Networks Cloud-Delivered Security Services

    Sponsored by: Palo Alto Networks

    Security budgets are growing tighter while threats are escalating. In this webcast, Palo Alto VP of Product Management, Scott Fanning, is joined by Forrester Research Analysts, David Holmes, and Adi Sarosa, as they walk through the findings of Forrester’s recent Total Economic Impact Report of Palo Alto security. Watch now to learn more.

  • GoSecure Titan Vulnerability Management as a Service (VMaaS) Explainer Video

    Sponsored by: GoSecure

    GoSecure Titan VMaaS helps defend against the constantly changing threat landscape by continuously identifying critical assets, threats and vulnerabilities and working quickly to remediating threats as they arise allowing businesses to get more value from their security and IT operations. Watch this explainer video to learn more.

  • Intelligence Powered DNS

    Sponsored by: Centripetal Networks

    More and more enterprises are implementing AI to safely navigate the never-ending waves of breaches and attacks storming their infrastructure. AI has even found a place in the DNS space, detecting data-driven patterns to carefully select which connections are safe and which are not. Watch this video from Centripetal to learn more.

  • How Preventative Cloud Security Actually Works

    Sponsored by: Checkpoint Software Technologies

    For cloud security professionals, it’s time to start preventing attacks before they happen, lowering the risk to you and your organization.Watch this video to learn how Check Point CloudGuard platform is changing cloud security.

  • GoSecure Titan Managed Security Information and Event Monitoring (SIEM) Explainer Video

    Sponsored by: GoSecure

    Modern security teams face an onslaught of threats, hiding within day-to-day traffic. In order to stay secure, they need a solution that can help them monitor, find, and eliminate these potential attacks. Watch this explainer video to learn more about GoSecure Titan SIEM.

  • Advanced monitoring strategies for peak trading systems performance

    Sponsored by: ITRS Group Limited

    According to a recent survey, 78% of leaders struggle with applications insights, underscoring a critical need for improved visibility. So, how can your organization transition from monitoring to observability to operational resiliency? Tune in now to discover how an advanced monitoring platform can help elevate your trading systems.

  • Explore the State of Software Delivery with AWS and CircleCI

    Sponsored by: CircleCI

    This webinar, “How to achieve high throughput. Is GenAI what’s missing in DevOps?” features Dr. James Bland, AWS and Ron Powell, CircleCI, as they review the State of Software Delivery Report from CircleCI. Watch the webinar now!

  • Building cyber-resilient data storage with IBM Storage FlashSystem

    Sponsored by: IBM

    IBM Storage FlashSystem emerges as a crucial solution for enterprise data protection and ensuring seamless recovery. The video discusses the importance and features related to enhancing cybersecurity and cyber resilience in data storage, specifically focusing on IBM Storage FlashSystem. Watch now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.