ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async

    Sponsored by: Fabric Health

    Discover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.

  • The Splunk Guide to SIEM Replacement

    Sponsored by: Splunk

    Replacing a SIEM is a major decision for an organization. And now more than ever, best-in-class security operations require a modern SIEM solution that will power the SOC of the future. This e-book will help answer key questions on your SIEM replacement journey. Read on now to learn how you can get started.

  • Security Threats for Apps “In the Wild”

    Sponsored by: Digital.ai

    Download this study to learn how security professionals can safeguard their apps and users from malicious activities by illuminating and quantifying the threats to applications in the wild.

  • CW APAC - December 2020: Trend Watch on cloud infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.

  • Computer Weekly – 5 October 2021: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 50 women chosen as the most influential in UK technology for 2021, and talk to the 10th winner of our annual list – Poppy Gustafsson, CEO of Darktrace. Also, our latest buyer's guide looks at digital customer experience technologies. Read the issue now.

  • Kubernetes Patterns Reusable Elements For Designing Cloud Native Applications

    Sponsored by: Red Hat

    This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.

  • Why Lendlease is embracing digital twin technology

    Sponsored by: TechTarget ComputerWeekly.com

    Find out how Australia-based property developer Lendlease is using digital twins, data analytics and automation to break the bulwark of rising costs and declining productivity in the construction sector.

  • Computer Weekly - 10 August 2021: Real-time data analytics in action

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.

  • CIO Trends #2: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly talks to more IT leaders than any other publication, and our reporters gather in-depth insights into the challenges facing CIOs, CTOs and CDOs. This guide offers a collection of our most popular articles for IT leaders,

  • Building a Cyberresilient Data Recovery Strategy

    Sponsored by: Veeam Software

    Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.