ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • Improve security and compliance

    Sponsored by: Red Hat

    Secure your Linux environment with Red Hat's effective approach to vulnerability identification, remediation, and compliance management. Learn best practices and explore integrated tools like Insights and Satellite. Read the full e-book to boost your security and compliance.

  • CW Nordics - November 2021-January 2022: Could Iceland be the best place in the world for HPC?

    Sponsored by: TechTarget ComputerWeekly.com

    Most of Iceland's cheap, sustainable energy is used by aluminium smelters, but the country's Landsvirkjun power company is now promoting other uses for it, including high-performance computing. Also read in this issue how IoT collaboration in Norway is reaching beyond industries such as mining and shipping to include fish farming.

  • Computer Weekly - 11 January 2022: How Pepsi is taking digital to the max

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to PepsiCo's digital director about delivering innovation in customer experience. Our first buyer's guide of 2022 examines hybrid cloud storage. And we find out how Arkwright and Granville from the BBC sitcom Open All Hours are inspiring retailers 40 years on. Read the issue now.

  • Cost of a Data Breach Report 2024

    Sponsored by: IBM

    The Cost of a Data Breach Report 2024, delivers essential insights to help security and IT teams better manage risk and limit potential losses. Among the top results in this year's research, conducted by Ponemon Institute and analyzed by IBM, you will find insights and new ways you can mitigate risk. Dig into the report to learn more.

  • Understanding Gmail And Yahoo’s New Standards For Senders

    Sponsored by: Sinch

    Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.

  • Zencore Smart Analytics Assessment

    Sponsored by: Zencore

    Zencore's Smart Analytics Assessment reviews your data platform, offering a detailed report, proposed Google Cloud architecture, and migration plan. Utilizing BigQuery and Looker, it aims to cut costs and boost productivity. Discover more in the full product overview.

  • CW Innovation Awards Telecommunications Winner: Telekom Malaysia

    Sponsored by: TechTarget ComputerWeekly.com

    Telekom Malaysia has been driving automation efforts across the company, not only to serve customers more efficiently, but also to improve a slew of back office functions. Learn more about why they are the telecommunications project of the year.

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

  • CW ASEAN: Preparing for 5G

    Sponsored by: TechTarget ComputerWeekly.com

    As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.

  • Zero Trust Is Not Enough for Backup

    Sponsored by: Cobalt Iron

    Traditional security approaches like zero-trust may not be enough to protect critical backup environments from modern cyber threats. In this white paper, you'll discover how the Zero Access model in Cobalt Iron Compass can provide advanced cyber resilience to safeguard your backup data. Read the full white paper now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.