ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • Transform the Complexities of Hybrid Cloud into Business Advantages

    Sponsored by: Digital.ai

    The challenges of hybrid cloud delivery are myriad. And all too often, companies learn about them the hard way. Read on to gain an understanding of the key challenges of hybrid cloud application delivery and learn how you can transform the complexities of hybrid cloud into business advantages.

  • Computer Weekly –11 April 2017: Virtual reality in healthcare

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how virtual reality technology is starting to be used to improve healthcare. We examine the new tax laws that are causing IT contractors to quit government digital projects. And we analyse the software licensing issues arising from SAP's recent court case over indirect access. Read the issue now.

  • Reducing Cloud Costs with Distributed Networking and Network Security Convergence

    Sponsored by: Aviatrix Systems

    How can you optimize your cloud while reducing cloud costs? By converging networking and network security in the cloud, this white paper argues. To learn all about this strategy, keep reading.

  • A guide to continuous software delivery

    Sponsored by: TechTarget ComputerWeekly.com

    Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.

  • Navigating Disruption with Generative AI Strategies

    Sponsored by: Foundever

    Enterprises must adapt to evolving customer expectations and technology disruption. Generative AI offers strategic advantages to help modernize customer experience, optimize operations, and future-proof the business. Download this analyst report to learn how to leverage Generative AI for your CX transformation.

  • Calculating ROI of DCIM Monitoring for Distributed IT Sites

    Sponsored by: Schneider Electric

    In this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.

  • Taking stock of database technologies

    Sponsored by: TechTarget ComputerWeekly.com

    Database technologies have evolved over decades, from relational databases to NoSQL databases that make it easier to store & handle data in the cloud. In this e-guide, how organisations are addressing database management challenges & how Alibaba is using cloud-native databases to reduce downtime in its annual Singles' Day sales.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • Essential Guide to LUN configuration and virtualisation

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide you will find all you need to know about LUNs, LUN configuration and management, including their use in virtualised environments.

  • Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.