ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "big data computer weeklystart=20start=20start=30start=20"

  • A Deep Dive into Shadow IT: Examples, Risks, and Solutions

    Sponsored by: Auvik Networks, Inc.

    Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.

  • Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.

  • Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.

  • A Computer Weekly buyer's guide to CIO leadership

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.

  • Print security: An imperative in the IoT era

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

  • Accelerate growth and improve competitiveness

    Sponsored by: AWS

    It’s time to achieve your own AI success. Grab a copy of this e-book to browse a compendium of case studies in which 10 leading companies are successfully using AI with AWS to drive innovation, improve the customer experience, boost application performance, and automate business operations.

  • Computer Weekly – 28 January 2020: IT must play its part in tackling the climate crisis

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at this year's World Economic Forum and find out how the IT sector is aiming to help tackle climate change. Our buyer's guide assesses onsite, offsite and cloud-based disaster recovery. And IT contractors are up in arms about the government's loan charge policy – we examine the issues. Read the issue now.

  • 5G: APAC guide to next-gen mobile connectivity

    Sponsored by: TechTarget ComputerWeekly.com

    From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.

  • Email Security Buyer's Guide

    Sponsored by: Checkpoint Software Technologies

    Email is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.

  • Essential Guide: How APAC firms can ride out the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, and how they have responded from a technology perspective by driving initiatives spanning digital transformation, business continuity, cloud, cyber security and remote working.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.