ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • A new class of converged endpoint platforms for a better breed of IT SecOps

    Sponsored by: Tanium

    The endpoint environment has transformed, but the balance between a superior user experience and effective security still needs better support than ever. But the legacy approach of stitching together different point solutions isn’t working. Discover a new class of converged endpoint platforms for a better breed of IT SecOps.

  • A Computer Weekly buyer's guide to operational IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • Cloud Migration: How to do so safely and securely

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.

  • Why you need convergence

    Sponsored by: TechTarget ComputerWeekly.com

    You need convergence today more ever.  Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive.

  • RSA Conference 2020 guide: Highlighting security's human element

    Sponsored by: TechTarget ComputerWeekly.com

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

  • TechTarget's Complete Guide to Cloud Migration: Step-by-Step Strategies

    Sponsored by: TechTarget Cloud Computing

    Cloud migration can boost flexibility and efficiency, but it requires a clear strategy. TechTarget's guide explains what cloud migration is, the key methods, and best practices to ensure security and success. Discover the path to a smooth transition in the cloud.

  • Focus: Private cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The private cloud is often viewed as a stepping stone for enterprises keen to tap into the business agility benefits of cloud without ceding total control over where their applications and workloads run. For some organisations, such deployments act as a test bed environment, where they can work out where best to run their workloads.

  • Benefits of shifting from traditional to condition-based maintenance in electrical distribution equipment

    Sponsored by: Schneider Electric

    Explore in this white paper the power of condition-based maintenance and how it addresses modern electrical infrastructure reliability and availability requirements.

  • Supply chain management balance shifts from efficiency to resilience under Covid

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide explores these matters, beginning with a comprehensive article that ranges over supply chain management, from a macro level through how trading platforms have been flexed to switch suppliers rapidly down to how robots have been quickly deployed to solve problems of scale.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.