Search Results for "big data computer weeklystart=20start=20start=30start=20"
-
Containers and storage 101: The fundamentals of container storage
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.
-
Jargon buster guide to hybrid cloud storage
Sponsored by: TechTarget ComputerWeekly.comIn this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.
-
Fujitsu Technology and Service Vision 2024
Sponsored by: FujitsuDownload this e-book to find out what to do when your organization is at the AI and sustainability tipping point.
-
CW ASEAN: Time to dial up defences
Sponsored by: TechTarget ComputerWeekly.comIn this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
-
How TDCX is building a people-centric business
Sponsored by: TechTarget ComputerWeekly.comEvery digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.
-
KLAS Research Patient Engagement Ecosystem Report 2023
Sponsored by: Gozio HealthDownload the KLAS Research Patient Engagement Ecosystem Report 2023 today to get the latest insights on digital health tools and vendor capabilities.
-
Backup deduplication: a complete guide
Sponsored by: TechTarget ComputerWeekly.comThere are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
-
Innovate With Automation A Red Hat Customer Success Series
Sponsored by: Red HatThis collection of customer success stories explores how organizations across industries used Red Hat Ansible Automation Platform to address challenges, boost efficiency, and drive innovation. Learn how automation can help your organization unify people, processes, and technology. Read the success stories.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
How to achieve container security best practice
Sponsored by: TechTarget ComputerWeekly.comIn a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.