ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "big data computer weeklystart=20start=20start=30start=20"

  • Computer Weekly Buyer's Guide to SD-WAN services

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at howSD-WAN effectively removes telcos' lock-in, the ways hybrid deployment hinges on the network, and the flexibility demanded by cloud-based workloads.

  • Digital drive: The IT backbone behind Lewis Hamilton's British Grand Prix win

    Sponsored by: TechTarget ComputerWeekly.com

    Dive into the world of the Mercedes F1 IT team, where advanced data analytics, real-time telemetry, and state-of-the-art simulations come together to fine-tune every race detail. Uncover how this seamless blend of technology and teamwork gave Lewis Hamilton the edge he needed to triumph at Silverstone.

  • Intelligent Workload Portability for a Modern, Agile Hybrid Cloud

    Sponsored by: Nutanix

    This analyst report explores how intelligent workload portability in a hybrid cloud environment can simplify application deployment and management. It also outlines key factors to consider for workload placement and migration, as well as the benefits of a consistent hybrid multicloud platform. Read on now to learn more.

  • Creating A Culture Of Compassion In Retail Contact Centers

    Sponsored by: Talkdesk

    Let’s face it, no one calls into a contact center to tell employees that they are doing a good job. Your customers call in because they have an issue or need assistance. This is why when your agents are trained in compassion and empathy, your organization can reap the benefits of increased brand loyalty and increased revenue. Read on to see how.

  • Revolutionizing DAST with IAST: A New Era in Application Security

    Sponsored by: Contrast Security

    While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.

  • Multi-Cloud Management

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at how some organisations are overcoming the challenges of multi-cloud, and – in turn – reaping the rewards of expanding the range of suppliers they source services from.

  • Why Physician Leadership is Critical in the Supply Chain

    Sponsored by: Advantus

    A physician supply chain leader acts as a medical director, and these roles must have business savvy, as well as embrace teamwork. Read this paper as Dr. Chung, CMO of Advantus, lends his insight into forming physician resource optimization teams, holding cross-disciplinary trainings, and 3 initiatives that increase value for patients.

  • APAC career guide: Becoming a cyber security pro

    Sponsored by: TechTarget ComputerWeekly.com

    Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.

  • 2024 Workplace Experience Trends & Insights Report

    Sponsored by: Appspace

    What do employees today want from their workplace experience? What’s working? What’s not? And what can you do about it? You don’t have to guess – because the 2024 Workplace experience trends & insights report from Appspace is here. Access this report to learn more.

  • The rise of edge computing

    Sponsored by: TechTarget ComputerWeekly.com

    The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.