ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10"

  • Computer Weekly - 25 January 2022: Why watching your remote workers doesn't work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the surge in home working led many firms to mandate use of surveillance software – we look at why it hasn't worked. It's an important year for public sector IT – we examine the trends for 2022. And with robotic process automation (RPA) booming, a Swedish bank explains the benefits. Read the issue now.

  • Computer Weekly Buyer's Guide to services for digitisation and IoT

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.

  • Taking stock of database technologies

    Sponsored by: TechTarget ComputerWeekly.com

    Database technologies have evolved over decades, from relational databases to NoSQL databases that make it easier to store & handle data in the cloud. In this e-guide, how organisations are addressing database management challenges & how Alibaba is using cloud-native databases to reduce downtime in its annual Singles' Day sales.

  • CW APAC - February 2022: Trend Watch - enterprise 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.

  • The CIO’s Guide to Identity-Driven Optimization

    Sponsored by: Okta

    For a 9-page guide to identity-driven optimization for CIOs, tap into this white paper that explores harnessing a universal control plane, balancing security and usability, and more.

  • The Managed Detection And Response Landscape, Q1 2023

    Sponsored by: Bitdefender

    Organizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.

  • Recap: Splunk.conf 18

    Sponsored by: TechTarget ComputerWeekly.com

    Download this e-guide for coverage of Splunk.conf 2018, looking into subjects such as security automation, data-driven pre-emptive maintenance and why diversity is so important when developing the technologies of the future.

  • Hyperconverged Reference Architecture

    Sponsored by: Panduit

    In this e-book, explore Panduit’s proposals of foundational reference architecture utilizing a Dell Technologies configuration and validated Panduit physical infrastructure components.

  • Choose High Data-Efficiency Technology for Lower Storage TCO

    Sponsored by: Dell Technologies

    Download this analyst report to discover how data-efficient storage platforms can help you require fewer drives, less administration time, and less power to store the same amount of data.

  • CW APAC buyer's guide to cloud security

    Sponsored by: TechTarget ComputerWeekly.com

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.