ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • GDPR Compliance Cheat Sheet

    Sponsored by: Docauthority

    Explore ways these 5 simple steps can achieve effective compliance for your enterprise and assist with GDPR compliance changes.

  • The 2018 Data Value Report

    Sponsored by: SnapLogic UK Ltd

    Research indicates that while data might be a top priority for organizations worldwide, the majority of IT decision makers have not achieved the value they were looking for. Explore key findings from this research and the implications for data management in your organizations.

  • Is Your Enterprise Ready for Hybrid Cloud?

    Sponsored by: Intel

    Accompanied by the latest industry data from Gartner, learn about the key elements that comprise a successful hybrid cloud strategy, including shifting emphasis from infrastructure needs to line-of-business needs, examining and placing workloads for optimal performance, and more.

  • Agile companies and digital transformation: Where iPaaS and APIs come together

    Sponsored by: SnapLogic UK Ltd

    Top-notch data integration goes beyond the integration of legacy systems to cloud technologies. In this white paper, discover top attributes of a data integration platform, key attributes of enterprise leaders in agile companies, essential API capabilities of an integration platform, and more.

  • HPE Nimble Storage All Flash Arrays: Disk Storage Systems

    Sponsored by: Hewlett Packard Enterprise

    Struggling to find the perfect combination of flash storage and predictive analytics? Look no further than this digital data sheet, which illustrates the technical specifications of a flash architecture with predictive analytics that will help you achieve fast, reliable access to data.

  • What Works in Third-Party Risk Assessment: Using BitSight for Continuous Monitoring

    Sponsored by: BitSight

    This Q&A session about third-party risk assessment uncovers how company, KPMG, was able to monitor their third-party vendors and enhance their security measures. Read on to find out more.

  • Using Ansible for Red Hat Enterprise Linux and Microsoft Windows alike

    Sponsored by: Red Hat

    Check out this live play-by-play to learn how to apply Ansible playbooks to Linux and Microsoft Windows, from registering modules to configuring task lists. Plus, get a live demo of the terminal interface to see how these playbooks look in action.

  • HPE Nimble Storage All Flash Arrays Overview

    Sponsored by: Hewlett Packard Enterprise

    This technology overview highlights HPE Nimble Storage All Flash Arrays. Download now for the technical details on its advanced analytics used to diagnose storage health, integrated data protection, scale-out capabilities, and more.

  • Artificial Intelligence for an Autonomous Data Center

    Sponsored by: Hewlett Packard Enterprise

    Whether its holidays, weekends, or the middle of the night, no time is off limits for infrastructure disruptions – and IT has to be ready to manually respond. Click to discover how an AI-based, self-repairing system is freeing up IT's on-call obligations through deep learning and cognitive automation.

  • Taking the Fear Out of Cloud Security

    Sponsored by: UKFast

    Concerned about security in the cloud? Learn how you can alleviate your worries about cloud security with this best practices checklist.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.