ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • CW Middle East - January-March 2021: $60m venture capital fund targets 120 startups

    Sponsored by: TechTarget ComputerWeekly.com

    Countries in the Middle East see technology as an industry of the future and are investing heavily in the sector as part of their economic diversification plans. Read in this issue how the latest development will see a $60m venture capital fund, based in Bahrain, invest in 120 early-stage startups across the Middle East region.

  • Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.

  • How Does Your Sales Development Program Measure Up?

    Sponsored by: TechTarget

    To understand the factors leading to poor SDR retention, TechTarget, Tenbound and RevOps Squared surveyed 218 sales leaders. Review the findings in this report, “How Does Your Sales Development Program Measure Up?”

  • Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.

  • Taking Linux in the enterprise to a new level

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.

  • CHAPTER 15: Working with the Command-Line Interface

    Sponsored by: McGraw Hill

    Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.

  • Computer Weekly – 6 September 2022: Out with the old at Asda

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.

  • Disaster recovery has never been so easy or important

    Sponsored by: TechTarget ComputerWeekly.com

    Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.

  • Securing DevOps

    Sponsored by: Veracode, Inc.

    Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.

  • Amplifying Your Webinar Reach with Social Media

    Sponsored by: BrightTALK by TechTarget

    Access Amplifying Your Webinar Reach with Social Media for tips on how to effectively utilize social content before, during, and after your webinar to create a scalable social media promotion plan that improves the ROI of your webinar programs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.