ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • Decentralising datacentres: The new challenges of security at the edge

    Sponsored by: TechTarget ComputerWeekly.com

    In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

  • Flexible & Secure Edge Application Infrastructure from SUSE & HPE

    Sponsored by: SUSE

    In today’s app dev climate, long development cycles are no longer a viable option.With organizations operating closer to real-time than ever before, the edge is now paramount. Download this white paper to see how SUSE provides trusted open-source Linux, Kubernetes via Rancher, and security tools.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • A guide to developing cloud applications using PaaS

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.

  • Executive Summary Ransomware Trends 2024 United States Edition

    Sponsored by: Veeam Software

    This year’s report surveyed 400 CISOs, security professionals, and backup administrators whose organizations suffered at least one ransomware attack. Download this report to learn about the targets and impacts of ransomware attacks, the financial impact, cyber insurance, and the cost of team misalignment.

  • Executive Summary Ransomware Trends 2024 North America Edition

    Sponsored by: Veeam Software

    This year’s report surveyed 350 CISOs , security professionals, and backup administrators whose organizations suffered at least one ransomware attack in 2023. Download this report to learn about the targets and impacts of ransomware attacks, the financial impact, cyber insurance, and the cost of team misalignment.

  • Data governance more important now than ever

    Sponsored by: TechTarget ComputerWeekly.com

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

  • Why Your Legacy Credentialing System Isn’t Cutting It

    Sponsored by: QGenda

    Is your healthcare credentialing system costing you time, money, and talent? Discover 5 signs it's time to modernize your credentialing tech to accelerate onboarding, ease administrative burden, and facilitate a healthy revenue cycle. Read the full E-Book.

  • Data is the key to population health: Using advanced analytics to drive health equity

    Sponsored by: AWS Marketplace

    There are many challenges facing healthcare providers who are aiming to promote population health for their communities. In this AWS white paper, learn how to harness complex data on multiple determinants of health to inform clinical and community intervention – and much more.

  • A Chaos of Connectivity is Putting Businesses At Risk

    Sponsored by: webMethods + StreamSets

    Businesses face a "Chaos of Connectivity" as they rapidly expand their technology stacks without integration plans, leading to security, compliance, and productivity risks. Learn how to overcome these challenges and manage the chaos in this white paper.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.