ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • Why Data Centers Must Prioritize Environmental Sustainability: Four Key Drivers

    Sponsored by: Schneider Electric

    Data centers must prioritize environmental sustainability due to customer demands, regulations, business value, and ESG investment. Learn how to secure remote access, reduce emissions, and build user trust by reading this white paper now.

  • Computer Weekly - 6 July 2021: Where to start with Windows 11

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.

  • Computer Weekly – 15 November 2022: How to protect against ransomware attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.

  • Going big: why companies need to focus on operational analytics

    Sponsored by: TechTarget ComputerWeekly.com

    This report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations

  • Legacy PKI Migration

    Sponsored by: Venafi

    52% of the 2500 participants surveyed by the Ponemon Institute reported that their organizations have poor visibility of apps that rely on Public Key Infrastructure (PKI). Along with exploring that obstacle, this white paper considers other challenges that legacy PKI can pose. To unlock those insights and more, read on.

  • Urban Myths About Secure Coding

    Sponsored by: Veracode, Inc.

    Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.

  • Hybrid cloud: Building bridges between the cloud and enterprise datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at how the major cloud providers are making it possible for their users to shift their datacentre-based applications and workloads to the cloud, as enterprise demand for hybrid deployments continues to soar.

  • CIO Trends #2: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs. This guide offers a collection of our most popular articles for IT leaders,

  • Thomson Reuters Institute 2024 State Of The Corporate Law Department

    Sponsored by: Thomson Reuters

    The 2024 State of the Corporate Law Department report explores how law departments can evolve from cost centers to strategic leaders. Inside, you'll learn how to drive efficiency, enable business growth, and manage emerging risks like AI. Read the full report now to discover key insights and best practices.

  • CW500: Key trends for IT leaders in 2017 – skills, careers and recruitment

    Sponsored by: TechTarget ComputerWeekly.com

    A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Chris Chandler, head of executive search at La Fosse Associates, discussing the skills, recruitment and career development issues affecting IT leaders.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.