ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • Arctic Wolf Security Operations 2024 Report

    Sponsored by: Arctic Wolf

    This report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.

  • A Computer Weekly buyer's guide to satellite broadband

    Sponsored by: TechTarget ComputerWeekly.com

    High-speed internet connectivity has become an essential utility for much of the world's population. In this 16-page buyer's guide, Computer Weekly looks at what makes the industry largely recession-proof, the obstacles 5G's roll-out must overcome and how reductions in satellite costs have boosted space-borne projects and services' popularity.

  • A Computer Weekly buyer's guide to NoSQL

    Sponsored by: TechTarget ComputerWeekly.com

    There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.

  • Computer Weekly – 5 September 2023: Met Police data platform goes £64m over budget

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal a £64m cost over-run for the Metropolitan Police's new record management system. Our latest buyer's guide looks at the issues around integrating SaaS applications. And a leading flash storage firm says the age of spinning disk drives is almost over – are they right? Read the issue now.

  • What Health System Strategists Will Prioritize In 2024 And Beyond

    Sponsored by: The Advisory Board

    Health systems are recovering from the worst financial year in recent history. The Advisory Board’s annual strategic planners study uncovers what health system strategy leaders are planning for in the next year, and where they are focusing their energy to achieve growth. Read on to explore the top 5 findings from this year's study.

  • How to unlock the true value of data

    Sponsored by: TechTarget ComputerWeekly.com

    With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.

  • The Home Depot Nails Retail Challenges with SailPoint

    Sponsored by: SailPoint Technologies

    As the retail industry undergoes digital transformation, The Home Depot leveraged SailPoint's identity solutions to boost productivity, improve associate experience, and reduce risk. Learn how they addressed compliance, consolidated disparate technologies, and enhanced security controls in this case study.[Read the full case study]

  • A How-To Guide: Increase IT Efficiency & Reduce Cost With Identity Security

    Sponsored by: SailPoint Technologies

    Discover how to streamline identity security and maximize IT efficiency with automation. This how-to guide explores steps to automate user access, reduce costs, and drive business results with unified identity security. Read the full white paper to learn more.

  • FACTORY FORWARD: NAVIGATING NEXT-GEN SUPPLY CHAIN OPERATIONS

    Sponsored by: LeanDNA

    This e-book offers a comprehensive guide to navigating modern supply chain challenges, drawing insights from real-world case studies. Dig into the e-book to discover how data-driven decision-making, enhanced visibility, and resilience strategies can transform your supply chain operations in the digital age.

  • What is Zero Trust?

    Sponsored by: Trend Micro

    This e-book, What is Zero Trust? (Really), teaches you exactly what Zero Trust really is. Dive into the e-book here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.