ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30"

  • Beyond the hype: How big data projects are delivering

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide collates a group of examples of big data technologies in use, such as how Mercedes-AMG Petronas Motorsport are looking to gain an edge on the competition in the Grand Prix season. Also see how big organisations are managing their big data operations and their data analytics programmes and teams through some high profile case studies.

  • Event recap: VMworld 2018 Europe

    Sponsored by: TechTarget ComputerWeekly.com

    It is the 20th anniversary year for VMware and at the VMware European conference in Barcelona, the company famous for its hypervisor, showcased how it had changed the face of IT, and where it was heading next.

  • How to get the best value from Office 365

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

  • E-government benchmark 2016

    Sponsored by: TechTarget ComputerWeekly.com

    The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.

  • How open source is spurring digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    From Linux to Kubernetes, open source has been key to efforts by organisations across APAC to transform digitally. In this e-guide, read how Malaysia's AmBank is using open source to engineer its software from the ground-up, ANZ Bank's move to Red Hat OpenShift, and what suppliers are doing to support deployments of containerised applications.

  • CW APAC - December 2020: Trend Watch on cloud infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.

  • Top 10 datacentre stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    There is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.

  • Hybrid cloud: Building bridges between the cloud and enterprise datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at how the major cloud providers are making it possible for their users to shift their datacentre-based applications and workloads to the cloud, as enterprise demand for hybrid deployments continues to soar.

  • Critical Gaps in Securing Identities

    Sponsored by: CyberArk

    There are significant challenges in securing applications that sit outside of the protections offered by SSO and MFA. Learn in this report, which surveyed senior cybersecurity professionals, how they are approaching these access security challenges and their best practices.

  • Computer Weekly – 30 August 2016: Get protected

    Sponsored by: TechTarget ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.