ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Safely innovate at speed with low-code technologies

    Sponsored by: Avanade

    Explore how low-code technologies like Microsoft Power Platform can help business and IT teams innovate quickly while maintaining governance and security. Learn how a Center of Excellence approach can unlock business value. Read the full white paper to discover more.

  • 15 Reasons To Adopt Red Hat OpenShift Virtualization

    Sponsored by: Red Hat

    Red Hat OpenShift Virtualization offers a modern platform for virtual machines and container-based applications. Read this e-book to unpack the remaining reasons to migrate your traditional VMs to Red Hat OpenShift.

  • Evolving the Next Generation Telco with AWS

    Sponsored by: AWS

    Forward-thinking CSPs adopting cloud solutions have begun to transform their operations, leveraging the cloud's elasticity, scalability, agility, and security to enhance efficiency, productivity, and customer value. Download the eBook Now and start your journey towards an agile and efficient telecom operation with AWS.

  • Jargon Buster Guide to Post Quantum Cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

  • Palo Alto Networks Special Edition: XDR

    Sponsored by: Palo Alto Networks

    With the combination of too many alerts and too little context, you could lose visibility and control. Ultimately, your company becomes even more at risk as a result. Access this e-book, XDR for Dummies, to learn 10 key XDR capabilities and features, XDR use cases and more.

  • IAM: Key to security and business success in the digital era

    Sponsored by: TechTarget ComputerWeekly.com

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

  • Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.

  • Fraud management: A perennial business issue

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

  • Top 10 cloud stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Adopting a hybrid-centric or multicloud strategy is increasingly becoming the favoured approach for many enterprises, including those operating in verticals that were previously sceptical or too tightly regulated to consider moving to the cloud in the past. Here's a look back over Computer Weekly's top 10 cloud stories of 2019.

  • A Computer Weekly buyer's guide to cloud bursting

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud ideas expand. In this 12-page buyer's guide, Computer Weekly looks at the benefits and complexities of cloud bursting and the role of on-premise IT.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.