Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=10start=30start=30start=30"
-
Your guide to disaster recovery strategy and the ways virtualisation can help
Sponsored by: TechTarget ComputerWeekly.comWe take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.
-
Computer Weekly – 3 May 2022: A prescription for digital accessibility at Boots
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer's guide examines communications as a service. And we talk to Trainline's CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now.
-
A Computer Weekly buyer's guide to robotic process automation
Sponsored by: TechTarget ComputerWeekly.comRobotic process automation is making its business value known in a variety of ways. In this 15-page buyer's guide, Computer Weekly looks at how how the market is ever-evolving, the security risks to guard against, and how RPA can spearhead a firm's digital transformation
-
Top 10 enterprise IT in the Benelux region stories of 2019
Sponsored by: TechTarget ComputerWeekly.comThe Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.
-
Automate Google Cloud with Red Hat Ansible Automation Platform
Sponsored by: Red HatExplore how to automate Google Cloud with Red Hat Ansible Automation Platform. Learn about integrated billing, enterprise support, and cloud automation use cases like health checks and VPC management. Read on to see how Ansible can accelerate your organization's cloud automation and the benefits of hybrid cloud automation in general.
-
Email Security Buyer's Guide
Sponsored by: Checkpoint Software TechnologiesEmail is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.
-
A Computer Weekly buyer's guide to big data
Sponsored by: TechTarget ComputerWeekly.comCompanies are switching on to the advantages of big data. In this 13-pagebuyer's guide, Computer Weekly looks at data analytics, how to get value out it and the benefits of process mining.
-
Implementing GenAI: Use cases & challenges
Sponsored by: TechTarget ComputerWeekly.comThe use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: TechTarget ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Cloud Market Report Australia
Sponsored by: TechTarget ComputerWeekly.comWhat is the state of Australia's cloud market? Inside this market report, industry experts share their thoughts on how the key players measure up and find out how Bendigo Bank, Frisk, Pizza Hut, RMIT Online, Unit4 are maximising their cloud investments.