ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • CIO Trends Q1 2016

    Sponsored by: TechTarget ComputerWeekly.com

    This guide offers a collection of our most popular articles for IT leaders during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.

  • Enterprise mobility management software offerings and use cases

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

  • Leading A Lean Portfolio

    Sponsored by: Atlassian

    In this paper, you’ll learn about the five important shifts that portfolio managers must make as they move to a lean approach to planning, funding, and tracking product development work. Read the full paper now.

  • AIOps for Monitoring

    Sponsored by: LogicMonitor

    IT departments, under increasing pressure to work faster and deliver results while reducing costs, could use the benefits offered by AI. In this eBook, learn how an AIOps approach that builds on observability and automation enables IT to gain the insights they need to work more proactively and perform more effectively.

  • CW APAC, July 2020: Trend Watch: Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

  • Flash hits the cloud while NVMe flash goes mainstream

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will major on NVMe, the stance towards it of the big five storage makers and the varying architectures marketed to the market. We also look at deploying NVMe in the enterprise and in particular for AI use cases. We also look at contemporary scale-out NAS products and flash options offered by the key cloud providers.

  • IT Organizations in a Quandary Over Visibility into Cloud Traffic

    Sponsored by: Gigamon

    Today, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.

  • The Total Economic Impact™ Of Palo Alto Networks NextGeneration Firewalls

    Sponsored by: Palo Alto Networks

    Palo Alto Networks' machine learning-powered Next-Generation Firewalls provide comprehensive security and seamless user experience. Learn how they deliver a 229% ROI through reduced security incidents, improved productivity, and lower breach risk. Download the full Forrester report to explore the benefits.

  • Computer Weekly –18 February 2020: Trust no one – the benefits of zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at zero-trust security and examine how it changes traditional IT risk models. After SAP extended the support deadline for its ECC ERP system, we find out the options for users. And we analyse explainable AI and the ethical importance of understanding algorithms. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.