ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=20start=10"

  • Serving up server hardware

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out why some companies are still hanging on to older hardware, the pros and cons of different types of server hardware, and what one Chinese tech giant is doing in the microprocessor space.

  • Computer Weekly – 30 October 2018: A row is brewing over EU plans to curb datacentre energy use

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a row is brewing over an EU plan to curb datacentre energy use, and the leading server suppliers are not happy. Health secretary Matt Hancock tells us about his new technology vision for the NHS. And we examine the growing popularity of short-term "gig" employment for IT professionals. Read the issue now.

  • HPE Alletra Storage MP For The HPE Nimble Storage Elite

    Sponsored by: Arrow and HPE

    The HPE Alletra Storage MP is the next evolution of primary storage, built on a cloud-native architecture for better performance, scalability, and 100% data availability. With AIOps-based operations and the HPE Timeless Program, it delivers a transformed ownership experience. Read the full solution brief to learn more.

  • Public cloud in India: A guide to building digital resiliency

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the rise of India as a cloud powerhouse, what major suppliers are doing in the market and an expert's take on the importance of having a cloud operating model to drive business outcomes from cloud initiatives.

  • IT Organizations in a Quandary Over Visibility into Cloud Traffic

    Sponsored by: Gigamon

    Today, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.

  • Three Steps to Authentic Connections in B2B

    Sponsored by: BrightTALK by TechTarget

    In today’s B2B marketplace, buyers no longer fall prey to one-size-fits-all marketing campaigns and pushy sales calls. Authenticity is key—and webinars and videos are key to achieving the human touch. They're also consistently ranked as the top performing content marketing tactics. Explore the 3 steps to authentic connections in B2B here.

  • Case Study: M&A in action - How Majestic Wine paired with Naked Wines to fuel cloud-led digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Find out how the acquisition of online-only wine retailer Naked Wines in 2015 has shaped the digital transformation plans of its parent company Majestic Wine

  • Build Your Tech And Balance Your Debt

    Sponsored by: Accenture

    Balancing tech debt is key to reinventing your business with a modern digital core. In this research report, you'll learn how to categorize, trace, and measure tech debt to strike the right balance between remediation and future investment. Read on now to find out how to get started.

  • Object Storage Systems in Demand for Big Data, Archiving

    Sponsored by: Cleversafe

    In this guide, Ellen O'Brien – the Executive Editor for SearchStorage.com – discusses how object storage is in high-demand for archiving and analyzing big data. Discover how metadata capabilities are propelling object storage beyond cloud storage and into a number of new and exciting use cases.

  • Six Considerations When Planning Data Center Network Upgrades

    Sponsored by: Panduit

    Discover in this white paper the 6 secrets data center operators must know to avoid costly maintenance and changes in fiber cable infrastructure for years to come.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.