ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30"

  • From Blockchain to IoT, the latest tech trends in logistics

    Sponsored by: TechTarget ComputerWeekly.com

    Delivering physical products to a customer base that today, for many businesses, spans the globe is a huge industry in itself. In this e-guide we look at the technologies that the businesses that operate in the logistics sector are investing in. As the headline suggests, Blockchain and the Internet of Things technologies are amongst them.

  • IT outsourcing in the digital age

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, discover how cloud computing continues to change the IT outsourcing industry, how Indian staff are making up a larger proportion of the workforces at large western companies, and find out how IT is disrupting the legal firms that support the outsourcing industry.

  • Practical Zero Trust Implementing Protections for High-Value Data

    Sponsored by: Zentera Systems Inc.

    This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.

  • How to Create a SaaS Spend Management Strategy

    Sponsored by: Auvik Networks, Inc.

    In this white paper, unlock a 4-step roadmap for developing a SaaS spend management strategy.

  • Red Hat OpenShift Service On AWS Enables Innovation And Agility For Modern Business

    Sponsored by: Red Hat

    Red Hat OpenShift Service on AWS enables organizations to accelerate application delivery and improve operational efficiency. Key benefits include 65% reduction in development time, 50% less infrastructure management effort, and improved operational efficiency. Read the full study to learn more.

  • Focus: Private cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The private cloud is often viewed as a stepping stone for enterprises keen to tap into the business agility benefits of cloud without ceding total control over where their applications and workloads run. For some organisations, such deployments act as a test bed environment, where they can work out where best to run their workloads.

  • Customer analytics in APAC: trends and best practices

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, learn how organisations in the APAC region are harnessing the potential of analytics and what the future of analytics looks like from an application development and self-service perspective.

  • Object storage: A great fit for large, unstructured data sets

    Sponsored by: TechTarget ComputerWeekly.com

    Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.

  • How best to put collaboration tools to work for your team

    Sponsored by: TechTarget ComputerWeekly.com

    This collection of recent expert advice aims to make your quest for the best option a bit easier. Read on and learn the latest on what collaboration tools now offer, including advanced technology like AI and speech recognition.

  • Microsoft Defender for Business Elevate your Security

    Sponsored by: Arrow MSFT

    Microsoft Defender for Business is an AI-powered endpoint security solution that provides enterprise-grade protection, easy deployment, and cost-effective pricing for small and medium businesses. Learn how this comprehensive security suite can elevate your business' security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.