ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"

  • Poland's Storage market on the rise

    Sponsored by: TechTarget ComputerWeekly.com

    Poland's storage market has been on a steady rise but what's the reason behind this? We investigate...

  • Real-time analytics expands its business value compass

    Sponsored by: TechTarget ComputerWeekly.com

    As an authority cited in the lead article in this e-guide explains, for many businesses "real time" means more frequent business intelligence reporting or data model updating. And yet, as another article in this e-guide explains, many organisations lack the infrastructure and culture necessary to deliver the required data.

  • Key Considerations for Securing Different Non-human Identities

    Sponsored by: CyberArk

    Today's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.

  • Solving Business Challenges With Data And AI 5 Insights From Telecommunications Leaders

    Sponsored by: Elastic

    Telco leaders struggle with real-time data utilization, data insights, and data maturity. Investing in data, analytics, and AI can drive revenue growth, productivity, and operational resilience. Download the report to discover the key insights and technology priorities for telco organizations.

  • Benefits of shifting from traditional to condition-based maintenance in electrical distribution equipment

    Sponsored by: Schneider Electric

    Explore in this white paper the power of condition-based maintenance and how it addresses modern electrical infrastructure reliability and availability requirements.

  • The rise of edge computing

    Sponsored by: TechTarget ComputerWeekly.com

    The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture

  • Architectural Design Decisions Directly Impact IT Agility For Pure Storage Flasharray And Flashblade Users

    Sponsored by: Pure Storage

    Early thinking about All-flash arrays (AFAs)— "higher performance at a higher price" — is an oversimplification that buyers cannot afford to make. In this white paper, take a close look at Pure Storage's alternative to the forklift upgrade, made possible by Pure's scale-up block and file product FlashArray.

  • Focus: Securing for the future

    Sponsored by: TechTarget ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Top 14 ransomware targets in 2023 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.

  • A Computer Weekly buyer's guide to network cost and bandwidth optimisation

    Sponsored by: TechTarget ComputerWeekly.com

    Coming in under budget for appropriate network performance takes some strategic nous. In this 15-page buyer's guide, Computer Weekly looks at how companies can gain effective global coverage, what can be done to optimise networks in a shift towards hybrid working and why leaders should consider best practices carefully.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.