ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated

    Sponsored by: TechTarget ComputerWeekly.com

    This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.

  • Hyper-converged infrastructure vs traditional: the pitfalls and benefits of a storage move

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we give an overview to buying hyper-converged in which we dig into its benefits, such as ease of deployment, resource efficiency, low Opex costs and reduced use of datacentre space. But we also look at the potential pitfalls that include the difficulties of troubleshooting in a tightly-layered environment.

  • Decentralising datacentres: The new challenges of security at the edge

    Sponsored by: TechTarget ComputerWeekly.com

    In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

  • A Cloud Services Cheat Sheet for AWS, Azure and Google Cloud

    Sponsored by: TechTarget Cloud Computing

    Navigating AWS and other providers' services can be daunting, with each platform offering hundreds of uniquely named options. Our Cloud Services Cheat Sheet simplifies this, giving you a quick reference to identify and compare similar services across providers.

  • Why high-performing organizations prioritize flexible delivery

    Sponsored by: ServiceNow

    In this analyst report, find out why hybrid approaches have become king in the modern workplace… and why flexible delivery is becoming the difference maker for leading organizations.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Unlocking value in the railway network's data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.

  • Unlocking value in the railway network's data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.

  • Why Modernizing With SAP S/4HANA Cloud Makes Business Sense

    Sponsored by: NTT & SAP

    Modernizing to the cloud-based SAP S/4HANA suite can deliver resilience, agility, and productivity benefits. Learn about the process, data migration considerations, and innovations that can help your organization through this white paper.

  • Artificial Intelligence (AI) And The Future Of Application Security Testing

    Sponsored by: Veracode

    With advances in AI capabilities, hackers have leveraged the evolving technology in order to perform more sophisticated attacks at scale. If actual attacks are using AI, then simulated attack testing that is performed at scale using AI is as close of a simulation to the real thing as one could hope for. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.