Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10"
-
A Computer Weekly buyer's guide to graph databases
Sponsored by: TechTarget ComputerWeekly.comIn this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.
-
CW Europe - June-August 2022: Russia escalates cyber war on Ukraine
Sponsored by: TechTarget ComputerWeekly.comMicrosoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.
-
Deployment Approaches to SAP S/4HANA
Sponsored by: LemongrassIn this analyst report, discover the essential technologies industry leaders are using for their SAP S/4HANA deployments, and learn the top strategies SAPinsiders are using for their deployment initiatives.
-
Pure Storage Evergreen Portfolio: Storage for the Digital Era
Sponsored by: Pure StorageAs enterprises undertake digital transformation, their storage infrastructure must evolve. This IDC white paper examines how Pure Storage's Evergreen portfolio helps organizations modernize their IT with flexible, as-a-service storage solutions that enable agility, scalability, and sustainability. Read the full report to learn more.
-
Packaged services – the global shift towards virtual distribution
Sponsored by: MicroScopeIn this month's issue, we cover changes in distribution and the challenges being faced by those aiming to add value.
-
CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment
Sponsored by: TechTarget ComputerWeekly.comBusiness can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.
-
Top APAC security predictions for 2020
Sponsored by: TechTarget ComputerWeekly.comCyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
-
What does cloud computing look like in 2016?
Sponsored by: TechTarget ComputerWeekly.comCloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.
-
Converting CentOS Linux to Red Hat Enterprise Linux
Sponsored by: Red HatLearn how to convert your CentOS Linux systems to Red Hat Enterprise Linux (RHEL) with the Convert2RHEL tool. This overview covers conversion methods, the benefits of RHEL, and how Red Hat Consulting can help with complex migrations. Read the full product overview to get started.
-
Reducing Cloud Costs with Distributed Networking and Network Security Convergence
Sponsored by: Aviatrix SystemsHow can you optimize your cloud while reducing cloud costs? By converging networking and network security in the cloud, this white paper argues. To learn all about this strategy, keep reading.