ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner Computer Weeklystart%3D30start=30start=10"

  • Extending Private Infrastructure with Hybrid Cloud Computing

    Sponsored by: Skytap, Inc.

    The hybrid cloud computing model has particular appeal for businesses interested in moving between public and private cloud freely and securely. Join this informative 45 minute webcast sponsored by Skytap to learn how enterprise IT can quickly gain operational benefits from hybrid cloud computing.

  • Computer Weekly – 30 April 2013: What’s next for mobile IT in the enterprise?

    Sponsored by: TechTarget ComputerWeekly.com

    n this week's Computer Weekly: BlackBerry and Windows have been the mainstay of corporate IT for years, but how do their latest releases stack up? We examine the user response. Communications minister Ed Vaizey talks about broadband and 4G policy. And we ask if Nationwide's £1bn IT plan can increase competition in banking. Read the issue now.

  • Cloud: Practical Advice for Taking the Next Steps

    Sponsored by: Hewlett Packard Enterprise

    By attending this complimentary, interactive, virtual conference, you will receive the latest independent expert insight and best practices to determine how to properly implement cloud at your organization and achieve all the benefits this technology offers...

  • Cloud: Practical Advice for Taking the Next Steps - Americas

    Sponsored by: Hewlett Packard Enterprise

    By attending this complimentary, interactive, virtual conference, you will receive the latest independent expert insight and best practices to determine how to properly implement cloud at your organization and achieve all the benefits this technology offers...

  • How to get the best value from Office 365

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

  • Computer Weekly – 30 September 2014: Hacking IT from the inside

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.

  • Gartner IT Financial, Procurement & Asset Management Summit 2013

    Sponsored by: Gartner

    This brochure outlines the Gartner IT Financial, Procurement & Asset Management Summit 2013, a conference that aims to help you destroy legacy costs and create value from new technologies and trends. View now to learn more!

  • Computer Weekly – 24 May 2022: Set innovation free and make great ideas a reality

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at Gartner's call to innovate – and innovation across retail, the circular economy and the automotive sector. We talk to Verastar's CTO about customer engagement in its small business services. And we examine how poor data quality is frustrating corporate desires to be data-driven. Read the issue now.

  • Datacentre Management: The latest thinking on good datacentre management practice

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we've pulled together some of the latest thinking on good datacentre management practice, while shining a light on the tools and technologies that are on the market (or in the pipeline) that can help enterprises run their facilities with greater ease and agility.

  • Gartner Application Architecture, Development & Integration Summit 2015

    Sponsored by: Gartner

    Access this year's Gartner Application Architecture, Development & Integration Summit for the information you need to reinvent your strategy, renovate legacy applications and infrastructure, architect for agility and speed, and minimize risk exposure in the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.