ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environmentsts

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

  • Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

  • 15 Reasons To Adopt Red Hat OpenShift Virtualization

    Sponsored by: Red Hat

    Red Hat OpenShift Virtualization offers a modern platform for virtual machines and container-based applications. Read this e-book to unpack the remaining reasons to migrate your traditional VMs to Red Hat OpenShift.

  • Computer Weekly: Data Danger

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

  • Safely innovate at speed with low-code technologies

    Sponsored by: Avanade

    Explore how low-code technologies like Microsoft Power Platform can help business and IT teams innovate quickly while maintaining governance and security. Learn how a Center of Excellence approach can unlock business value. Read the full white paper to discover more.

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

  • Top 14 ransomware targets in 2023 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.

  • Jargon Buster Guide to Voice over IP (VoIP)

    Sponsored by: TechTarget ComputerWeekly.com

    In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.

  • Best practices for remote data backups

    Sponsored by: TechTarget ComputerWeekly.com

    This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.

  • Using digital twins to cut costs and improve safety at Shell

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.