ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart=20start=30start=10start=20start=30"

  • 3 STEPS TO MANAGE TECHNOLOGY SPEND AND RISK

    Sponsored by: ServiceNow

    In this e-book, discover a practical, 3-step approach to optimizing technology spend and mitigating risk.

  • The Internet Outage Survival Guide: Unpacking common outages types and how they impact your business

    Sponsored by: Cisco ThousandEyes

    Today, business rely on the Internet more than ever. Yet, the Internet is as unpredictable as it is critical. It's a "best-effort" collection of networks connecting a myriad of providers, and at its very core, the Internet is vulnerable to outages. In this e-book, learn how you can mitigate the risk of an Internet outage.

  • Embrace the potential of cloud cybersecurity with ConvergeSECURITY

    Sponsored by: AWS

    Discover how a robust cloud security framework can help your organization embrace the full potential of cloud cybersecurity and innovate with confidence. Learn about the critical elements of an end-to-end approach to cybersecurity, including visibility, AI-driven analytics, incident response, and more. Read the full white paper.

  • CW APAC, August 2021: Trend Watch on Datacentre Operations

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on datacentre operations in the Asia-Pacific region, Computer Weekly looks at the most innovative methods being adopted to improve datacentre efficiency.

  • Digital Transformation: Part 2

    Sponsored by: TechTarget ComputerWeekly.com

    In this presentation from our CW500 event, digital transformation programme director Richard Philips explains how the AA tackled the challenges of delivering people, cultural and organisational change.

  • A Computer Weekly e-guide to SASE

    Sponsored by: TechTarget ComputerWeekly.com

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

  • Red Hat OpenShift Service On AWS Enables Innovation And Agility For Modern Business

    Sponsored by: Red Hat

    Red Hat OpenShift Service on AWS enables organizations to accelerate application delivery and improve operational efficiency. Key benefits include 65% reduction in development time, 50% less infrastructure management effort, and improved operational efficiency. Read the full study to learn more.

  • Privileged Access Management Maturity in the Cloud Era

    Sponsored by: Saviynt

    It’s estimated that 80% of data breaches involve privilege misuse or compromise. Gartner lists Privileged Access Management (PAM) as a critical infrastructure service and a high-priority cyber defense capability. Read this white paper to learn more.

  • Computer Weekly – 4 July 2023: How data is beating heart disease

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.

  • Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.