ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • A Computer Weekly buyer's guide to post-Covid-19 supply chain management

    Sponsored by: TechTarget ComputerWeekly.com

    The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • Disaster recovery and business continuity: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

  • The Future of Financial Services: Part 2

    Sponsored by: TechTarget ComputerWeekly.com

    In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.

  • TMS Technology Value Matrix 2023

    Sponsored by: Blue Yonder

    As the TMS market continues to evolve, it can be difficult for supply chain organizations to navigate the various vendors, and many can have trouble finding a solution that fits their unique needs. Access this report to discover the industry’s top vendors and how they stack up.

  • How Modern DCIM Helps Multi-Tenant Colocation Data Centers Be More Competitive

    Sponsored by: Schneider Electric

    In this white paper, discover practical examples of how modern commercial DCIM software can make colocation data center operations more competitive by improving resiliency, security, sustainability, transparency, and more.

  • How Modern DCIM Helps Multi-Tenant Colocation Data Centers Be More Competitive

    Sponsored by: Schneider Electric

    In this white paper, explore practical examples of how modern commercial DCIM software makes colocation data center operations more competitive by improving resiliency, security, environmental sustainability, transparency, and operational efficiency.

  • How to achieve network infrastructure modernization

    Sponsored by: TechTarget ComputerWeekly.com

    Upgrading to advanced network infrastructure involves firms being able to deliver mission-critical services through cloud providers and through their own cloud resources. Increased network infrastructure capacity need has seen deployment of optical networking and advanced network solutions such as software-defined wide area network (SDWAN).

  • The State of Supply Chain Execution

    Sponsored by: Blue Yonder

    Recent years have seen a lot of stress for supply chain leaders, as organizations struggled to meet customer expectations and now are having trouble handling rising inflation. So, how can supply chain teams combat these hurdles while also improving profitability and future-proofing their operations? Dig into this guide to learn more.

  • DRaas and the key decision points in DR-as-a-service

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.