ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • The technological evolution of IT industry leaders: Part one

    Sponsored by: TechTarget ComputerWeekly.com

    This first part of this e-guide explores the technological evolution of Oracle, Cisco and Dell throughout the past two decades, including the technologies that have risen to the forefront, from real-time analytics and data management to Cisco's edge computing ambitions.

  • Essential Guide to LUN configuration and virtualisation

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide you will find all you need to know about LUNs, LUN configuration and management, including their use in virtualised environments.

  • Getting Started with OpenTelemetry + Honeycomb

    Sponsored by: Honeycomb

    Discover how Honeycomb and OpenTelemetry work together to power advanced observability. Learn about distributed tracing, data-rich visualizations, and service maps. Get started with instrumentation and maximize insights from your telemetry data. Read the full guide to enhance your observability.

  • How Modern DCIM Helps Multi-Tenant Colocation Data Centers Be More Competitive

    Sponsored by: Schneider Electric

    In this white paper, discover practical examples of how modern commercial DCIM software can make colocation data center operations more competitive by improving resiliency, security, sustainability, transparency, and more.

  • How Modern DCIM Helps Multi-Tenant Colocation Data Centers Be More Competitive

    Sponsored by: Schneider Electric

    In this white paper, explore practical examples of how modern commercial DCIM software makes colocation data center operations more competitive by improving resiliency, security, environmental sustainability, transparency, and operational efficiency.

  • A CIO’s Guide to Modern Analytics

    Sponsored by: Dataiku

    This guide surveyed 200 senior analytics and IT leaders on GenAI, tech stack and tooling, data challenges, and more. Get the full report for the realities of "modern" analytics today to turn blockers into benefits.

  • Optimize your cloud with Automation

    Sponsored by: Red Hat

    Leveraging automation for a strategic edge is now at your disposal with the Red Hat Ansible Automation Platform via Google Cloud Marketplace. IDC reports a 667% 5-year ROI and 10-month payback for Red Hat Ansible users. Discover how enterprise automation can drive better cloud results for your company in this solution overview.

  • Computer Weekly – 30 July 2024: CrowdStrike blue screen bug serves a stark warning

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we analyse the lessons from the global IT outage caused by the blue screen bug in CrowdStrike security software. We talk to the data chief of Barilla, the €4bn pasta maker, about the benefits of asking, "So what?" And we find out how Finland is taking a lead on quantum computing. Read the issue now.

  • A Short Guide to Webinars for Demand Gen

    Sponsored by: BrightTALK by TechTarget

    The content you select for your demand gen programs plays a critical role in progressing potential customers through their buyer’s journey, particularly as B2B buyers defer to a digital-first process that places sales far too late in the game. Access this e-book to learn more.

  • 10 data lake uses for enterprises

    Sponsored by: TechTarget ComputerWeekly.com

    Data lakes have become an essential tool for the modern data management platform. They provide a scalable and cost-effective platform for storing and managing large volumes of data, and they support real-time data analysis and processing. This infographic highlights ten cases in which data lakes are critical for modern data management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.