ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • CW APAC: August 2023 – Expert advice on storage and backup

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on storage and backup in the Asia-Pacific region, Computer Weekly looks at why 3-2-1 backup is still relevant, how researchers are overcoming restraints found in typical DNA storage systems, Dell's latest offerings and the future of HDDs.

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Computer Weekly – 6 February 2018: How a digital workplace can drive innovation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at some of the latest tools for the digital workplace and find out how they can improve collaboration and innovation. We ask what lessons the demise of Carillion has for IT outsourcing. And the CIO of retailer River Island tells us how technology is changing the high street in fashion. Read the issue now.

  • Computer Weekly – 7 May 2024: Casting a critical eye on HMRC's IR35 checker tool

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we investigate what has been going on with the HMRC's Check Employment Status for Tax (CEST). We also speak to the CIO of Danfoss about making datacentres greener and explore the issue of restoring data and system backups after a ransomware or cyber attack. Read the issue now.

  • Driving Cloud Automation with Observability, AIOps, and NetDevOps

    Sponsored by: Aviatrix Systems

    This report explores how observability, AIOps, and NetDevOps are converging to drive cloud automation. It covers key trends, use cases, and leading vendors in these areas. Download the full White Paper to learn how these technologies can improve cloud infrastructure visibility, management, and efficiency.

  • How to use AI to get work done faster in Confluence

    Sponsored by: Atlassian

    Your business, like most businesses, is likely turning to AI to turbocharge work. As you continue on that journey, what should you watch out for? And what steps can you take to maximize benefits? Tap into this 13-page guide by Atlassian for answers.

  • Akamai Guardicore Segmentation PCI DSS Whitepaper

    Sponsored by: Akamai Technologies

    A new assessment from GRSee indicates how Akamai Guardicore Segmentation can help organizations meet, support, or validate 9 of the 12 high-level requirements of Payment Card Industry Data Security Standard (PCI DSS) compliance. Get the third-party validation you need to start your segmentation project.

  • Recap: Splunk.conf 18

    Sponsored by: TechTarget ComputerWeekly.com

    Download this e-guide for coverage of Splunk.conf 2018, looking into subjects such as security automation, data-driven pre-emptive maintenance and why diversity is so important when developing the technologies of the future.

  • What Does a Good Trace Look Like?

    Sponsored by: Honeycomb

    What does a good trace look like? In this e-book by Honeycomb, learn about 7 key characteristics of a successful trace and review an example of good tracing.

  • Who should get the technology vote in the UK General Election?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.