ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • The changing mobile platform landscape

    Sponsored by: ComputerWeekly.com

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

  • Transform Your Data From a Liability to an Asset

    Sponsored by: Hitachi Data Systems

    Under the new global data privacy laws like GDPR, many of your traditional data uses that have been lawful for decades are (or will soon be) illegal and can open you up to non-compliance issues and fines. Find out how you can transform your data from a liability into an asset by saving it in a compliant manner.

  • Keys to Intelligent Data Governance

    Sponsored by: Hitachi Data Systems

    Attaining pure data governance is crucial – but unfortunately not as simple as it seems it should be. To make your objectives a bit more digestible and clear, you can check out this data governance checklist which lays out 10 benefits that you should be aiming for with your company's data.

  • Artificial Intelligence and Machine Learning: Driving Tangible Value for Business

    Sponsored by: Splunk

    With all the excitement surrounding AI and machine learning (ML), it can be difficult to separate fact from fiction. In this white paper from Harvard Business Review, learn how to apply AI and ML to your business without falling for the hype.

  • Your Last Line of Defense Against Ransomware

    Sponsored by: Quantum Corporation

    From this white paper, you'll learn how to protect your data from ransomware. It thoroughly reviews the types of ransomware, before jumping into how ransomware gets into your environments, how cloud backups can leave you vulnerable to potential attacks, and using tape as your last line of defense.

  • Infographic: Public Cloud

    Sponsored by: ComputerWeekly.com

    All you need to know about Public Cloud in one handy infographic. You're welcome.

  • Leverage Business Content With Hitachi Content Intelligence

    Sponsored by: Hitachi Data Systems

    Big data can mean big trouble. In this white paper, learn how a content intelligence platform can help businesses locate, manage, and leverage vast amounts of data by transforming it into actionable insights.

  • V.Pharma Ensures Healthy Backup Performance with Quantum DXi

    Sponsored by: Quantum Corporation

    V.Pharma's data was put in jeopardy when they were informed they were about to be priced out of their backup solution. Thus they began their search for alternatives, which led them to Quantum's DXi4700 deduplication and replication appliances. To see the benefits they gained—beyond just cost savings—view the study here.

  • SharePoint Migration From Non-Microsoft Platforms

    Sponsored by: Proventeq

    For organizations looking to migrate to SharePoint with non-Microsoft ECM systems, migration can turn out to be more complicated than expected. In this white paper, discover the common challenges non-Microsoft users face when migrating to SharePoint, and learn how you could overcome them with these expert tips.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.