ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Key trends for IT leaders in 2016 - Part 2

    Sponsored by: ComputerWeekly.com

    Ian Cohen, digital advisor at the Leading Edge Forum, considers the key CIO and IT leadership trends for 2016 in this PowerPoint presentation given at the January 2016 Computer Weekly CW500 Club meeting

  • Automate Management of your VMware Environment

    Sponsored by: Veeam Software

    This white paper outlines a VM automation platform than can simplify the management of virtual machines. Read on to learn about its features and see if it's a good fit for your organization.

  • This is not and Org chart of your company It's a diagram of your security risks

    Sponsored by: Cisco

    This graphic shows you current trends in cyber risk and statistics to what you can do differently. It talks about various new access points hackers have to penetrate your network including the cloud and the Internet of Everything.

  • Choosing a Firewall That's Right for You

    Sponsored by: Palo Alto Networks

    This webcast discusses how to retain the advantages of enterprise apps while minimizing risk with better network security. Learn how to choose a firewall that's right for your business's apps and users.

  • CW Nordics February 2016:Saab's Leviathan Challenge

    Sponsored by: ComputerWeekly.com

    The Nordic region is often described as a region that is leading the way in terms of the use of modern IT. The region needs IT to make up for factors such as having a small population, with many isolated communities. So IT both helps the region punch above its weight in business and enables its residents to receive services effectively.

  • Hadoop Accelerates Earnings Growth in Banking and Insurance

    Sponsored by: Hortonworks

    This resource provides use cases about how different financial institutions met their data analytics challenges with Hadoop, including examples about retail banking, insurance, capital markets and investments, and more. Discover a strategy that can allow you to reduce risk data analysis time from 3 months to 3 hours.

  • AMP in 4 Minutes

    Sponsored by: Cisco

    This video shows you a new advanced malware protection system that provides protection before, during and after an attack. Go beyond point-in-time capabilities and monitor traffic on endpoints, mobile devices and in your network.

  • LA Building and Safety Dept. Streamline Application Delivery to Remote Offices

    Sponsored by: Hewlett-Packard Enterprise

    In this case study, you will discover how LADBS streamlined their remote office support by utilizing a hyper-converged appliance system. Read on to support full app functionality with this converged infrastructure, and ensure business continuity with multisite disaster recovery.

  • CW Europe – Forecast: Cloudy with Dry Spells

    Sponsored by: ComputerWeekly.com

    In Europe cloud is restricted and hybrid setups make use of local compute and storage.

  • The Expert Guide to VMware Disaster Recovery and Data Protection

    Sponsored by: Veeam Software

    This essential guide details how to achieve availability through backups and replication. You'll discover the differences between backup and replication as well as the techniques and strategies offered by each. Also, find out why recovery and restore should be top priorities of any backup solution for the modern data center.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.