ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"

  • Discover the business benefits of Red Hat Enterprise Linux on Microsoft Azure

    Sponsored by: Red Hat

    In this e-book, you'll discover the benefits of running Red Hat Enterprise Linux on Microsoft Azure for a security-focused hybrid cloud environment. Read on now to learn how you can simplify migration, enhance security, and optimize costs during your cloud journey.

  • Robotic Process Automation blends into AI for thoroughly modern ERP

    Sponsored by: TechTarget ComputerWeekly.com

    Robotic Process Automation has emerged in recent years as one way to modernise the ERP systems that run the entire gamut of business processes for many organisations. Download this e-guide and read more about how the advance of the robots continues.

  • Case study: Using pre-fab datacentres to meet Norway's growing demand for colocation space

    Sponsored by: TechTarget ComputerWeekly.com

    Datacentre operator Green Mountain embraces Schneider Electric's pre-fabricated datacentre designs to ensure it is positioned to respond to the growing demand from the hyperscale and HPC communities for colocation capacity in Norway

  • MicroScope – June 2021: A hybrid working world

    Sponsored by: MicroScope

    With hybrid working set to become the norm as the world starts to return to a more normal footing post-Covid, we look at how businesses are preparing for the new world of work. Also discover how to tackle the sustainability challenge, and have some key questions answered around handling bottlenecks caused by large volumes of data

  • How manufacturing organisations can build agile and cyber resilient supply chains

    Sponsored by: Vodafone

    In this eBook, you’ll learn about what issues manufacturing organizations are facing, key trends that are impacting them and how technology can help these firms build resilient supply chains against operational risks. Read the eBook.

  • Brought to you by: Veeam Microsoft 365 Backup

    Sponsored by: Veeam Software

    Protecting Microsoft 365 data is essential to any modern cybersecurity strategy, since the suite’s applications are so commonly used in businesses of all sizes and industries. Read this e-book for 10 steps you can take to build a more proactive approach to security.

  • Data discovery: how to pick the right software

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.

  • Five AWS data migration methods to consider

    Sponsored by: New Relic

    More organizations than ever are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data to the cloud isn't always straightforward. This exclusive e-guide reveals five data migration methods to move storage to AWS.

  • Time to Print

    Sponsored by: MicroScope

    In this e-guide, we discuss the ever-evolving world of print within the digital age. We look at how major print vendors are planning on using the channel to help them grow, how 3D printing is having an impact andwhy cloud-based solutions are increasing.

  • Endpoint security: Hybrid work changes the game

    Sponsored by: TechTarget ComputerWeekly.com

    A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not.  In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.