Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"
-
Poland's Storage market on the rise
Sponsored by: TechTarget ComputerWeekly.comPoland's storage market has been on a steady rise but what's the reason behind this? We investigate...
-
Real-time analytics expands its business value compass
Sponsored by: TechTarget ComputerWeekly.comAs an authority cited in the lead article in this e-guide explains, for many businesses "real time" means more frequent business intelligence reporting or data model updating. And yet, as another article in this e-guide explains, many organisations lack the infrastructure and culture necessary to deliver the required data.
-
Key Considerations for Securing Different Non-human Identities
Sponsored by: CyberArkToday's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.
-
Solving Business Challenges With Data And AI 5 Insights From Telecommunications Leaders
Sponsored by: ElasticTelco leaders struggle with real-time data utilization, data insights, and data maturity. Investing in data, analytics, and AI can drive revenue growth, productivity, and operational resilience. Download the report to discover the key insights and technology priorities for telco organizations.
-
Benefits of shifting from traditional to condition-based maintenance in electrical distribution equipment
Sponsored by: Schneider ElectricExplore in this white paper the power of condition-based maintenance and how it addresses modern electrical infrastructure reliability and availability requirements.
-
The rise of edge computing
Sponsored by: TechTarget ComputerWeekly.comThe growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture
-
Architectural Design Decisions Directly Impact IT Agility For Pure Storage Flasharray And Flashblade Users
Sponsored by: Pure StorageEarly thinking about All-flash arrays (AFAs)— "higher performance at a higher price" — is an oversimplification that buyers cannot afford to make. In this white paper, take a close look at Pure Storage's alternative to the forklift upgrade, made possible by Pure's scale-up block and file product FlashArray.
-
Focus: Securing for the future
Sponsored by: TechTarget ComputerWeekly.com2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
-
Top 14 ransomware targets in 2023 and beyond
Sponsored by: TechTarget ComputerWeekly.comAccording to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.
-
A Computer Weekly buyer's guide to network cost and bandwidth optimisation
Sponsored by: TechTarget ComputerWeekly.comComing in under budget for appropriate network performance takes some strategic nous. In this 15-page buyer's guide, Computer Weekly looks at how companies can gain effective global coverage, what can be done to optimise networks in a shift towards hybrid working and why leaders should consider best practices carefully.