ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20"

  • Balancing Security and Agility

    Sponsored by: FinThrive

    Explore effective strategies for healthcare cyber resilience that balance security and agility. Learn how to develop incident response plans, implement continuous monitoring, and partner with the right RCM vendor to enhance data protection and operational continuity. Read the full white paper.

  • CIO Trends #10: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.

  • CW ASEAN: Unlock flash opportunities

    Sponsored by: TechTarget ComputerWeekly.com

    Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.

  • No deal Brexit: Ideal or Ordeal?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

  • AI-Ready Data in Seven Steps

    Sponsored by: AWS & Cloudtech

    Unlock the power of AI with your data. Learn how to make your data AI-ready in 7 steps, from defining objectives to managing change. Partner with experts like Cloudtech and AWS to accelerate your AI journey. Read the Enterprise Strategy Group Showcase for more.

  • Next stage of virtualisation: Containers

    Sponsored by: TechTarget ComputerWeekly.com

    The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.

  • A Guide to a BYOD Enabled Conference Room

    Sponsored by: Shure Inc

    Hybrid work remains standard, challenging businesses to ensure their conferencing technology fosters collaboration and smooth experiences. To do so, many businesses are adopting a bring-your-own-device (BYOD) model for their conference rooms. Browse this white paper to access a shopping list for creating a BYOD conference room for your company.

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

  • DEVSECOPS BUYER’S GUIDE: APPLICATION SECURITY

    Sponsored by: Contrast Security

    Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.

  • Next step app development: Microservices

    Sponsored by: TechTarget ComputerWeekly.com

    Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.