ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • Cloud backup vs traditional backup

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.

  • Powerful DDoS Attacks & Recovery for Enterprises

    Sponsored by: Arbor Networks

    A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.

  • Maximize your data insights with AI

    Sponsored by: Dell Technologies

    In this e-book, explore how organizations are innovating to drive business outcomes, what's blocking them, and how they can take advantage of new technologies like generative AI as an innovation accelerator.

  • MicroScope – March-April 2024: Is cloud the best option?

    Sponsored by: MicroScope

    In this issue, find out why cloud may not always be the right course of action for businesses to take. Also discover the growing threat artificial intelligence brings to the cyber security market, as well as read predictions on what areas will grow over the course of the year

  • The Total Economic Impact™ Of Basis Technologies ActiveControl

    Sponsored by: Basis Technologies

    This Forrester Total Economic Impact report finds that Basis Technologies' ActiveControl solution can provide a 245% ROI by increasing deployment speed, reducing errors, and streamlining compliance. Read the full report to see how ActiveControl can boost your SAP change management.

  • How to be Resilient Against Cybersecurity Issues in Higher Education.

    Sponsored by: Schneider Electric

    Increasing ransomware attacks, shrinking IT teams: These are two of the many challenges that higher education institutions encounter on the road to stronger cybersecurity. Along with digging into those factors and their implications, this white paper explores how to level up a school’s security posture. Read on to unlock these insights.

  • A Computer Weekly buyer's guide to communications as a service

    Sponsored by: TechTarget ComputerWeekly.com

    As communications needs evolve, organisations must keep pace with the latest services available. In this 15-page buyer's guide, Computer Weekly looks at how we arrived at current-day comms systems, the growing popularity of CPaaS and the advantages of cloud-based offerings in the new normal of hybrid working.

  • The Business Transformation Management Playbook: Combining Business And IT For Successful Transformation

    Sponsored by: SAP

    The business transformation playbook explores a 5-stage methodology for successful business transformation. Discover your current state, analyze dependencies, design your target state, implement changes, and operate your transformed business. Read the full e-book to learn how to drive effective business transformation.

  • Data Center Facilities Management Strategy Guide

    Sponsored by: Schneider Electric

    Here's the thing about data centers: overheated servers and cooling failures are worse than power failures. This e-guide will help you re-evaluate your data center's physical metrics and update your facilities management strategy.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.