Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"
-
Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environmentsts
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
-
Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
-
15 Reasons To Adopt Red Hat OpenShift Virtualization
Sponsored by: Red HatRed Hat OpenShift Virtualization offers a modern platform for virtual machines and container-based applications. Read this e-book to unpack the remaining reasons to migrate your traditional VMs to Red Hat OpenShift.
-
Computer Weekly: Data Danger
Sponsored by: TechTarget ComputerWeekly.comIn this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?
-
Safely innovate at speed with low-code technologies
Sponsored by: AvanadeExplore how low-code technologies like Microsoft Power Platform can help business and IT teams innovate quickly while maintaining governance and security. Learn how a Center of Excellence approach can unlock business value. Read the full white paper to discover more.
-
Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
-
Top 14 ransomware targets in 2023 and beyond
Sponsored by: TechTarget ComputerWeekly.comAccording to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.
-
Jargon Buster Guide to Voice over IP (VoIP)
Sponsored by: TechTarget ComputerWeekly.comIn this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
-
Best practices for remote data backups
Sponsored by: TechTarget ComputerWeekly.comThis guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.
-
Using digital twins to cut costs and improve safety at Shell
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.