ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • Computer Weekly Buyer's Guide to SD-WAN services

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at howSD-WAN effectively removes telcos' lock-in, the ways hybrid deployment hinges on the network, and the flexibility demanded by cloud-based workloads.

  • SAP GRC Framework Integration with One Identity Manager

    Sponsored by: One Identity

    Built in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.

  • NAS meets cloud and unstructured data challenges

    Sponsored by: TechTarget ComputerWeekly.com

    NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.

  • Jargon Buster Guide to Container Security

    Sponsored by: TechTarget ComputerWeekly.com

    The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.

  • Balancing innovation, safety, compliance, and risk in life sciences

    Sponsored by: XtelligentMedia Healthcare

    The life sciences sector is evolving rapidly, collaboration, compliance, and proactive risk management are key to patient safety.

  • 2024 Top Global Security Trends

    Sponsored by: Brivo

    This report presents the findings of Brivo’s recent security study, which gathers data from 850 security professionals across 8 countries. Download the report now to unlock the study’s key findings, including 3 key trends influencing the state of cybersecurity.

  • The Total Economic ImpactTM Of Veeam with AWS

    Sponsored by: Veeam Software

    The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Veeam with AWS on their organizations.

  • What the future holds for cloud management in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we dish out useful tips from APAC organisations that have successfully migrated to the cloud, the thinking behind their approaches to cloud migration and what they are doing to not only keep the lights on, but also raise their game in areas such as cloud data management and cloud security.

  • Artificial intelligence in ITSM: Finding the right tools for you

    Sponsored by: TechTarget ComputerWeekly.com

    AI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.

  • Focus: Private cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The private cloud is often viewed as a stepping stone for enterprises keen to tap into the business agility benefits of cloud without ceding total control over where their applications and workloads run. For some organisations, such deployments act as a test bed environment, where they can work out where best to run their workloads.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.