ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • Focus: Network security

    Sponsored by: TechTarget ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • MicroScope: The digital transformation

    Sponsored by: MicroScope

    The phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.

  • PREVENTING NEXT-GENERATION THREATS THROUGH AI AND INNOVATION

    Sponsored by: Checkpoint Software Technologies

    The current threat landscape is more untenable than ever before. Enter artificial intelligence (AI). By integrating AI into security technologies, organizations can enhance threat prevention. Download this white paper to learn more.

  • 7 & Innovative Trading APPS

    Sponsored by: FD Technologies

    In this e-book, you'll discover 7 innovative trading apps and 7 best practices to boost your trading performance. By reading, you'll learn how to leverage real-time data, machine learning, and generative AI to find alpha opportunities and drive execution analytics. Download the e-book now to learn more.

  • From patchwork to platform

    Sponsored by: Red Hat

    As the complexity of modern infrastructure escalates, IT organizations need an automation strategy. Given the intricate relationships that exist among these complex environments, a unified automation platform is required. Read on to learn about key considerations you should make to ensure you find the platform best fit for your organization.

  • Edge and Industrial IoT at Scale

    Sponsored by: SUSE

    In this 57-page Gorilla Guide you’ll learn how to employ best practices in edge computing that include the use of open source platforms, the integration of information technology (IT) and operations technology (OT) and the use of validated designs. Access the guide.

  • CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits

    Sponsored by: TechTarget ComputerWeekly.com

    Tech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.

  • CW Europe – September 2018: Costs stack up for Dutch government IT projects

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.

  • Link Software Development to Measured Business Value Creation

    Sponsored by: JBS Custom Software Solutions

    PH

  • Boost Hybrid Cloud Security And Consistency

    Sponsored by: Red Hat

    Organizations leveraging hybrid clouds for flexibility and innovation face security and consistency issues. Discover how Red Hat on Google Cloud boosts hybrid cloud security and consistency in this white paper.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.