ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20start=10"

  • A Computer Weekly buyer's guide to digital customer experience

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic has brought on changes to how organisations and their customers interact. In this 15-page buyer's guide, Computer Weekly looks at why firms need to adapt, what customer and employee experience has in common and what companies are doing to update the digital customer experience.

  • A Computer Weekly buyer's guide to asset management for hybrid IT

    Sponsored by: Livingstone Group

    Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.

  • Critical Gaps in Securing Identities

    Sponsored by: CyberArk

    There are significant challenges in securing applications that sit outside of the protections offered by SSO and MFA. Learn in this report, which surveyed senior cybersecurity professionals, how they are approaching these access security challenges and their best practices.

  • Computer Weekly – 20 August 2024: A gold medal for Olympic mobile coverage

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes with Orange, networking partner for the Paris Olympic Games, to discuss the challenges of connecting 120 venues. We talk to a CIO for whom IT accessibility and usability is a very personal concern. And we look at how to keep control of SaaS licensing costs. Read the issue now.

  • CW APAC - December 2019: Buyer's guide to hybrid cloud

    Sponsored by: TechTarget ComputerWeekly.com

    There is no doubt that the world is moving towards cloud, with even the most hardened sceptics having been converted and tentatively taking their first steps on a cloud journey. In this handbook, Computer Weekly offers advice on how best to manage hybrid cloud infrastructure.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • CW EMEA – August 2023: Helsinki's Aalto University: Where ideas take off

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW EMEA, we look at the startup scene in Finland. Every startup needs a starting place, and many Finnish innovators began at Aalto University. We also look at how the Gulf region is seeing some of the heaviest investments in the latest technology as countries diversify their economies to reduce reliance on oil. Read the issue now.

  • A Computer Weekly buyer's guide to sustainable datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation

  • A Computer Weekly buyer's guide to sustainable datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation.

  • CW ANZ: Taming the data beast

    Sponsored by: TechTarget ComputerWeekly.com

    Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.