ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet Services Research

  • Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.

  • CW Middle East ezine October 2018

    Sponsored by: TechTarget ComputerWeekly.com

    It's still early days for the Middle East when it comes to artificial intelligence and robotic process automation, but things are picking up.

  • CW Middle East ezine July 2018

    Sponsored by: TechTarget ComputerWeekly.com

    What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.

  • CW ASEAN: SD-WAN helps find best route to cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.

  • CW Middle East Oct to Dec 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.

  • CW Benelux August 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

  • Using Wi-Fi for Primary Enterprise Access

    Sponsored by: TechTarget Networking

    Should a Wi-Fi Internet service become your enterprise's means for primary online access? This guide reviews the issue and factors that must be considered first.

  • MicroScope June 2014

    Sponsored by: MicroScope

    We investigate the current state of the independent software vendor market and the measures being taken to protect intellectual property and reveal the ACEs winners

  • Strategies for Managing Social Networking & Personal Web Use in the Workplace

    Sponsored by: Total Defense

    Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.

  • Mobile Internet 3.0: How Operators Can Become Service Innovators and Drive Profitability

    Sponsored by: Juniper Networks, Inc.

    Mobile operators today have the distinct ability to become service innovators and drive profitability with the advent of Mobile Internet 3.0. Learn how you can expand your data revenue base in this resource.

  • What Enterprises Should Do About IPv6 in 2011

    Sponsored by: Cisco Systems, Inc.

    The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.

  • Dual Stack Network

    Sponsored by: Cisco Systems, Inc.

    In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.

  • IPv6: The Next IP Standard

    Sponsored by: AT&T Corp

    With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.

  • KPN Automates with Parallels Automation to Maintain Hosting Leadership in the Netherlands

    Sponsored by: Parallels, Inc.

    KPN was looking to add features such as database support, automated scripting, and applications to their shared hosting environment. Learn how KPN came to select Parallels Automation to provide distributed architecture

  • Presentation Transcript: Meeting the Demand for Multi-Screen Experience

    Sponsored by: Alcatel-Lucent

    Consumers today tend to use a wide variety of communications devices and are expecting to get video content delivery to any screen. This presentation transcript discusses a new multi-screen solution and how it can support these market needs.

  • Proactive Service Assurance for Mobile Data Services

    Sponsored by: Infovista Corporation

    Until very recently, customer volume for data services was so low that service providers couldn't justify investment in robust, end-to-end service assurance solutions for mobile data services. Now, with the volume of data services on mobile networks growing, the business case for such an investment is clear. Read on to learn more.

  • Migration to DOCSIS 3.0

    Sponsored by: Motorola Solutions

    Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.