ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Cloud computing computer weeklystart=40"

  • Computer Weekly - 11 January 2022: How Pepsi is taking digital to the max

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to PepsiCo's digital director about delivering innovation in customer experience. Our first buyer's guide of 2022 examines hybrid cloud storage. And we find out how Arkwright and Granville from the BBC sitcom Open All Hours are inspiring retailers 40 years on. Read the issue now.

  • Network Evolution December 2012

    Sponsored by: TechTarget Networking

    This edition of "Network Evolution" focuses on this progression, talking about the transition by organizations to 10 and 40 GbE switches, as well as the prospect of 100 and even 400 GbE switches. Read on to learn where this technology is going - and what it means for your business.

  • ISM December 2012

    Sponsored by: TechTarget Security

    In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.

  • Video: Dell Networking S6000

    Sponsored by: DellEMC and Intel®

    Optimizing your network speeds is a top priority of all IT departments. This video highlights Dell's 1 ru 10/40 gigabit ethernet switch, the s6000.

  • CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT

    Sponsored by: TechTarget ComputerWeekly.com

    The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.

  • A Disaster Recovery/Business Continuity Plan for the Data Breach Age

    Sponsored by: QuorumLabs Inc.

    Our increasing use of social media, internet of things (IoT), mobile computing and the cloud has increased our data dependence. While this has improved accessibility, it has also made us more vulnerable to cyber-attacks - 40% of businesses hit never recover. In this eGuide, find 10 best DR/BC practices DR/BC that will help you avoid fatal attacks.

  • Next Generation Network Management Techniques

    Sponsored by: TechTarget Security

    The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!

  • Computer Weekly – 28 April 2015

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CIO of the National Trust, Sarah Flannigan, about her £40m IT strategy to transform one of the UK's favourite charities. We examine best practice in how to set up applications on Amazon Web Services. And we talk to a UK challenger bank about how technology will shake up the sector. Read the issue now.

  • Computer Weekly - 15 May 2012: Overhauling banking IT

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital?

  • How to get the best value from Office 365

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.