ComputerWeekly.com Research Library

Powered by Bitpipe.com

White Papers

  • Accelerating Utilities Industry Transformation

    Sponsored by: Nutanix

    Jump into this quick infographic to learn how utility companies can start spreading their roots to become a true digital enterprise.

  • Preparing for CCPA Compliance

    Sponsored by: Namogoo

    Given the financial and reputational damage of failing to comply with data privacy laws, preparation for the CCPA should be the top priority at any company, regardless of where they are based. In this e-book, explore the components of CCPA, how it compares to GDPR, and 7 steps to CCPA compliance. Read on to prepare your business for 2020.

  • Case Study: How Cloudflare’s China CDN helped Udacity improve performance

    Sponsored by: Cloudflare

    Udacity is an online education company focused on making entry-level tech jobs more accessible. As Udacity entered the education market in China they ran into challenges with strict internet regulations and slow internet connection. In this case study, learn how Udacity was able to address these challenges by using Cloudflare’s China CDN.

  • Business Process Management in the Digital Era

    Sponsored by: Red Hat

    Emerging industry processes will require businesses to learn to use automated tools, like low-code platforms, in order to streamline business process management. Download your copy of this business process management whitepaper which dives into the prevalence of low-code and 3 insightful case studies.

  • Online Privacy in a World of Third-Party Services

    Sponsored by: Namogoo

    As companies continue to rely on 3rd party services to enhance the experience of their websites, they risk increasing the vulnerability of customer data. In this e-book, discover the benefits of 3rd party software, how it works, and why it’s critical to take appropriate security measures when considering a vendor. Read on to learn more.

  • Behavioral Biometrics: The Intelligent Safeguard Against Online Fraud

    Sponsored by: Buguroo

    Behavioral biometrics provides a new generation of security solutions for the user, by identifying people by the unique way they interact with different devices, including computers (keyboard and mouse use), tablets or smartphones. Read on to learn more.

  • Transform Oil and Gas with an Intelligent Edge and IoT

    Sponsored by: Nutanix

    Learn about the upstream, midstream, and downstream impacts that intelligent edge computing and IoT deployments can have on oil and gas industry organizations.

  • The Value of Business Automation in a Microservices World

    Sponsored by: Red Hat

    Even microservices may not be enough to effectively replace monolithic applications due to the overly complicated user requirements in modern businesses. Use this whitepaper to learn about the current pitfalls of independent microservices, and how a process automation tool can better help developers meet user requirements.

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • 4 reasons to try Quarkus: a Kubernetes Java framework

    Sponsored by: Red Hat

    Use this whitepaper to evaluate these 4 major considerations of Quarkus’ own Kubernetes-native Java framework, and see how it would run in your own operations

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.