ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"

  • Reduce Risk by Diversifying Your VMware Environment

    Sponsored by: Nutanix

    As organizations diversify from VMware, Nutanix offers a flexible platform to simplify management, lower TCO, and enable hybrid multicloud operations. Read this e-book now to discover how Nutanix can help you address future business needs.

  • The Rise of Globally Distributed Teams

    Sponsored by: Remote

    Despite continued controversy over remote work, many teams are now looking to another slowly rising trend: distributed work. Organizations are now moving beyond international borders to improve costs, diversity, retention, and more to ensure productivity and employee satisfaction. Dig into this report to learn more.

  • How server virtualisation is evolving to cloud native environments

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discover how, in recent years, server virtualisation has given businesses the ability to abstract applications and the operating system from the underlying hardware. We explore how server virtualisation is gradually evolving towards cloud native environments.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: TechTarget ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

  • A Computer Weekly buyer's guide to API management

    Sponsored by: TechTarget ComputerWeekly.com

    Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.

  • Computer Weekly – 3 October 2023: Where next for quantum computing?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the head of Amazon's Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now.

  • CW ANZ: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

  • 2024 global threat report

    Sponsored by: CrowdStrike

    The advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.

  • CIO Trends Q1 2016

    Sponsored by: TechTarget ComputerWeekly.com

    This guide offers a collection of our most popular articles for IT leaders during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.

  • Jargon Buster Guide to Post Quantum Cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.