Search Results for "big data computer weeklystart=20start=20start=30start=20"
-
Optimizing your Microsoft Security
Sponsored by: Orange CyberdefenseIn this e-book, discover an informed, independent viewpoint on top security issues and a guide for security leaders with regards to Microsoft Security, so you can adopt an approach that is both effective and cost-efficient.
-
UCaaS Buyers’ Checklist
Sponsored by: 8x8The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.
-
Migrate from CentOS Linux to Red Hat on Google Cloud
Sponsored by: Red HatStreamline your cloud journey by migrating from CentOS Linux to the production-grade Red Hat Enterprise Linux on Google Cloud. Gain security, efficiency, and support to power your hybrid and multicloud environments. Read the white paper to learn more.
-
The rise and rise of SD-WAN in post Covid-19
Sponsored by: TechTarget ComputerWeekly.comSo much has been up in the air in the wake of the onset of Covid-19 and the lockdowns and stay-at-home orders issued by various governments around the world. But there has been one thing that is pretty fixed: the rise and rise of software-defined wide area networks (SD-WANs).
-
Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting
Sponsored by: Schneider ElectricIn this paper, explore the FAQs of Scope 3 emissions and discover the inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
The Future of Financial Services: Part 2
Sponsored by: TechTarget ComputerWeekly.comIn the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
-
Augmented analytics tools: a complete guide
Sponsored by: TechTarget ComputerWeekly.comAugmented analytics tools are designed to simplify the BI and analytics process for business users and citizen data scientists. They've become featured elements in new software releases from BI vendors. This e-guide offers insights into the technology's potential uses and critical issues.
-
A Computer Weekly buyer's guide to graph databases
Sponsored by: TechTarget ComputerWeekly.comIn this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.
-
CW Innovation Awards: SIA taps blockchain for loyalty app
Sponsored by: TechTarget ComputerWeekly.comIn this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.