ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=20start=10start=30start=20start=20"

  • Are you one eDiscovery away from a budgetary meltdown?

    Sponsored by: TechTarget ComputerWeekly.com

    Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

  • Best practices for remote data backups

    Sponsored by: TechTarget ComputerWeekly.com

    This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.

  • SAP Global Templates

    Sponsored by: Basis Technologies

    Learn how global templates can standardize SAP deployments across your organization to achieve faster rollouts, reduced complexity, improved compliance, and enhanced data consistency. Download the full guide to discover best practices for implementing and managing global templates.

  • A Computer Weekly buyer's guide to secure and agile app development

    Sponsored by: TechTarget ComputerWeekly.com

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

  • Computer Weekly – 26 September 2017: Building on legacy IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.

  • Backup Compliance: Everything You Need To Know

    Sponsored by: Scalepad Software

    In the event of a data breach or cyberattack, you never want a client to lose their valuable data. That’s why backup monitoring is crucial for maintaining security and compliance. Read on to learn about best practices for meeting compliance standards and mitigating risk for your clients and your organization.

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

  • A Computer Weekly Buyer's Guide to Wireless Networks

    Sponsored by: TechTarget ComputerWeekly.com

    Mobile devices are increasing the pressure on wireless networks. In this 13-page buyer's guide, learn about the latest developments in wireless networks, the challenges of wireless local area networking, and how to deploy the 802.11ac Wave 2 wireless standard.

  • Computer Weekly - 23 November 2021: Can the tech community show how to save the world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.

  • Jargon Buster Guide to Voice over IP (VoIP)

    Sponsored by: TechTarget ComputerWeekly.com

    In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.