ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30"

  • A Computer Weekly buyer's guide to big data architecture

    Sponsored by: TechTarget ComputerWeekly.com

    Big data architecture is increasingly proving its worth in business. In this 14-page buyer's guide, Computer Weekly looks at the storage needs that come with artificial intelligence, how to get the most out of data and what it can do to enhance a company's performance.

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    Enterprises face growing risks and regulatory demands to secure third-party software. Spectra Assure's white paper details how its binary analysis identifies threats like malware and vulnerabilities in commercial software without source code. Discover risk management strategies by reading the full paper.

  • Mainframes - Services and Solutions

    Sponsored by: Ensono, LLC

    Mainframe modernization is gaining momentum, with vendors focused on mergers and acquisitions. Enterprises are also prioritizing replatforming to the cloud to reduce IT spending. Download this analyst report now to gain deeper insights into the state of mainframe modernization.

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • Application Delivery Network Buyers' Guide

    Sponsored by: TechTarget ComputerWeekly.com

    The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.

  • Atlassian Cloud Data Protection

    Sponsored by: Atlassian

    In most industries, the most important asset to an organization is data. The problem is that data is becoming more challenging to protect and secure, and this is no different in the cloud. If your data isn’t protected correctly, the cost of a breach can take down an entire organization. So, what are the challenges? Read on to find out more.

  • CW Innovation Awards: Jio taps machine learning to manage telco network

    Sponsored by: TechTarget ComputerWeekly.com

    In this case study, learn how India's largest telecom operator built its own machine learning platform to meet the growing data and signalling requirements of new networks.

  • Developing A Strategy For Your Network Modernization

    Sponsored by: Cloudflare

    Evaluate the scope of your network modernization project, and consider key use cases like branch connectivity, protecting public-facing infrastructure, simplifying the corporate network, and connecting, and securing public clouds.

  • Top 10 networking stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Until Tuesday 10 December, it would have been absolutely fair to say that 2019 was the year of software-defined networking. And then, on 11 December, Cisco unveiled the basis of what it called the internet for the future. Hardware was very much back to the future. Here are Computer Weekly's top 10 networking stories of 2019.

  • Top Priorities for Evaluating Microsegmentation Solutions

    Sponsored by: Akamai Technologies

    This report from Enterprise Strategy Group (ESG), in partnership with Akamai, offers a detailed explanation of how to prioritize microsegmentation evaluation decisions. It provides the eight key priorities to consider when selecting solutions, as well as research on microsegmentation adoption in the marketplace.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.