Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"
-
CW Europe – September 2018: Costs stack up for Dutch government IT projects
Sponsored by: TechTarget ComputerWeekly.comIn this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.
-
Shore up your cybersecurity resilience: A guide for ANZ businesses
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
-
CW Nordics - November 2021-January 2022: Could Iceland be the best place in the world for HPC?
Sponsored by: TechTarget ComputerWeekly.comMost of Iceland's cheap, sustainable energy is used by aluminium smelters, but the country's Landsvirkjun power company is now promoting other uses for it, including high-performance computing. Also read in this issue how IoT collaboration in Norway is reaching beyond industries such as mining and shipping to include fish farming.
-
Can’t Choose Between Public And Private Cloud? You Don’t Have To With IaaS
Sponsored by: FCNIn this Forrester report, discover why organizations are adopting infrastructure-as-a-service (IaaS), the features they consider essential in an IaaS model, and the business benefits that such a model can deliver.
-
MicroScope – October 2020: Get in touch with remote network security
Sponsored by: MicroScopeIn this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption
-
Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
Sponsored by: TechTarget ComputerWeekly.comLast year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
-
A Practical Guide to Zero Trust Implementation in Multicloud Environments
Sponsored by: PC ConnectionExplore a practical guide to implementing a Zero Trust architecture in multicloud environments. Learn how to progress your Zero Trust maturity, select the right technologies, and work with a trusted partner. Read the full e-book to secure your modern IT ecosystem.
-
Zero Trust Is Not Enough for Backup
Sponsored by: Cobalt IronTraditional security approaches like zero-trust may not be enough to protect critical backup environments from modern cyber threats. In this white paper, you'll discover how the Zero Access model in Cobalt Iron Compass can provide advanced cyber resilience to safeguard your backup data. Read the full white paper now to learn more.
-
The Future of CX: Navigating an AI-Driven Landscape for Mid-Market Operations Directors
Sponsored by: BroadvoiceToday, customers and employees expect more when it comes to experiences. To meet these new standards, 57% of leaders report that they plan to increase their AI investments by at least 25% to improve the customer service journey for all. But how effective is AI, really? Browse this white paper to learn more.
-
Advanced Analytics Enable Process Manufacturers To Achieve Sustainability Goals
Sponsored by: SeeqFor manufacturers, the solution to achieving sustainability goals lies in leveling up data analytics to adjust processes with an eye on minimizing emissions. However, is it possible to do so while maintaining profitability? Read this white paper to ascertain how this is possible and how to get started with advanced analytics in your company.