Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
TechTarget's Complete Guide to Cloud Migration: Step-by-Step Strategies
Sponsored by: TechTarget Cloud ComputingCloud migration can boost flexibility and efficiency, but it requires a clear strategy. TechTarget's guide explains what cloud migration is, the key methods, and best practices to ensure security and success. Discover the path to a smooth transition in the cloud.
-
Data protection, a live issue that affects us all
Sponsored by: TechTarget ComputerWeekly.comDefined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.
-
The CISO's guide to supply chain security
Sponsored by: TechTarget ComputerWeekly.comSupply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
-
How best to put collaboration tools to work for your team
Sponsored by: TechTarget ComputerWeekly.comThis collection of recent expert advice aims to make your quest for the best option a bit easier. Read on and learn the latest on what collaboration tools now offer, including advanced technology like AI and speech recognition.
-
Navigating Toward Tomorrow: The Visionary CFO’s Leap Into a Future-Proof IT Ecosystem
Sponsored by: Spinnaker SupportAs organizations continue to struggle to keep up with changes that generative AI, economic uncertainty, and global conflicts bring on, many CFOs and other leaders are looking for new ways that they can modernize their operations without forcing downtime or going over budget. Access this white paper to learn more.
-
Towards software-defined and cloud-native networking
Sponsored by: TechTarget ComputerWeekly.comAs networking equipment rapidly evolves to being software-defined and cloud-native, there is pronounced interest in products and services to accelerate service delivery, improve end-user experiences, and reduce infrastructure and operational costs in service delivery applications. Read more in this e-guide.
-
Data discovery: how to pick the right software
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.
-
A Computer Weekly e-guide to SASE
Sponsored by: TechTarget ComputerWeekly.comCovid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
-
Application Performance Management: Improving service availability
Sponsored by: TechTarget ComputerWeekly.comIf it can't be measured, it can't be managed. Telemetry on applications and IT infrastructure are key to keeping applications running optimally and reducing unplanned downtime. Beyond using telemetry data to respond to abnormal events, historical data analysis can reveal more systemic issues. In this e-guide we look at trends in APM.
-
DRaas and the key decision points in DR-as-a-service
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.