ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • Computer Weekly – 9 July 2024: How data drives decisions at BAE Systems

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the chief data officer of one of the UK's biggest manufacturers, BAE Systems, about data strategy and diversity. Microsoft's claims over sovereign cloud for government IT are under scrutiny – we examine the issues. And our latest buyer's guide looks at trends in cloud databases. Read the issue now.

  • Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.

  • Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette

    Sponsored by: Cisco

    The 2024 "Cyber Threat Trends Report" by Cisco analyzes the threats crowding the cyber landscape, including information stealers, Trojans and ransomware. It also provides insights on how DNS security can help defend your organization against those growing threats. Read the 18-page report to unlock the full insights.

  • Information Security and Compliance Future Trends 2024

    Sponsored by: Cloudflare

    Explore how regulation, sophisticated attacks, and AI will shape security spending in the near future. Learn about the latest trends in API security, data privacy, identity management, and more. Download this comprehensive analyst report to stay ahead of the evolving cybersecurity landscape.

  • Cloud computing storage key management

    Sponsored by: TechTarget ComputerWeekly.com

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

  • Next step app development: Microservices

    Sponsored by: TechTarget ComputerWeekly.com

    Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.

  • Accelerating Your Business Through Network Readiness: An Innovation Imperative

    Sponsored by: Auvik Networks, Inc.

    Is your network equipped to face the myriad factors complicating modern networking? Along with delving into those factors – such as proliferating IoT devices and enterprise mobility – this e-book maps out how you can prepare for the challenges of the landscape through network innovation. Keep reading to learn more.

  • Brexit and UK tech: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    In the immediate aftermath of the UK's historic referendum vote to leave the European Union, Computer Weekly canvassed the advice and opinion of experts across the technology sector to assess the implications for IT professionals.

  • Top 10 ASEAN IT stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.

  • A Computer Weekly buyer's guide to optimising storage

    Sponsored by: TechTarget ComputerWeekly.com

    The implementation of effective storage optimisation has becomean important factor in business. In this 12-page buyer's guide,Computer Weekly looks at cost implications, the hyper-convergedinfrastructure minefield and the alternatives to shared storage

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.