ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:TechTarget ComputerWeekly.com

  • Which DRaaS approach is best

    Managed DRaaS, Assisted DRaaS, or self-service DRaaS, which approach is the best for you? Let's drill into these three major DRaaS provider options, what they offer and points to ponder with each approach.

  • CW Benelux November 2019-January 2020: Dutch banks fight money laundering

    Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.

  • Nordics are leading the datacentre revolution

    The Nordic region has space, access to renewable energy, a cool climate and a well-educated workforce. All these things make it a great place to build a datacentre. Read in this e-guide how the Nordic region is leading the datacentre revolution.

  • Government insists 'nothing sinister' about web user data gathering

    Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.

  • The ultimate guide to data preparation

    Poor data equates to wrong decisions, bias in the AI algorithm and flawed decision-making. What's more, data that personally identifies an individual can only be used in very specific ways, as stipulated by GDPR. Read about data preparation in this e-guide.

  • Amsterdam datacentre industry at a moment of reckoning

    The Netherlands is a fast growing datacentre location, as you can also read in this e-guide, and these constructions are taking up a lot of space and putting pressure on the local electricity grid. Read more about this and more in this e-guide.

  • Computer Weekly – 22 October 2019: Microsoft vs Google – who's winning the cloud email race?

    In this week's Computer Weekly, there's a two-horse race for dominance in the cloud email market between Microsoft and Google, but they are not alone – we examine the runners and riders. Our latest buyer's guide looks at governance, risk and compliance solutions. And we assess the progress of public cloud in the banking sector. Read the issue now.

  • Application security: best practices and risks

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

  • NHS transformation, IR35 tax reforms, and using digital tech for staff training

    In this episode, we look at NHS transformation, IR35 tax reforms, and using digital tech for staff training.

  • A Computer Weekly buyer's guide to blockchain technology

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • European colocation growth trends: Under the microscope

    In this e-guide, we'll take a close look at how the European colocation market is performing as a whole, as well as looking ahead to some of the challenges the sector's biggest players face when it comes to ensuring the growth they have enjoyed in recent years continues despite the instability caused by political, environmental and economic events.

  • Multi cloud backup and recovery best practices

    User concerns about data availability and safety continue to grow. And despite being in the early phases of the multi-cloud movement, experts have provided some good guidelines to users to help them implement this additional layer of protection. This guide details multi-cloud backup and recovery best practices, and presents potential pain points.

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

  • Computer Weekly – 8 October 2019: Showcasing the potential of 5G

    In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.

  • CW APAC - October 2019: Expert Advice on storage

    The creation of ever-increasing volumes of data is posingescalating problems for storage. In this issue of Expert Advice, Computer Weekly looks at how APAC firms are dealing with storage management issues in the cloud age. Read the issue now.

  • SAP S/4HANA: Cloud vs on-premises

    When it comes to SAP S/4HANA Cloud vs. on-premises, issues such as functionality and customization are paramount. In this e-guide we take a look at where each shines and where each falls short.

  • How to prepare your network for IoT data challenges

    This e-guide outlines how business requirements will affect your IoT network build, takes a deep dive into specific IoT network architecture and explores IoT topology options.

  • Infographic: The state of data preparation in 2019

    As data preparation tools become increasingly self-service-oriented and cloud-based, more enterprise users are employing them -- and recognizing their importance in their organizations' business intelligence strategies. This infographic shows the state of data preparation in 2019.

  • VMs vs. containers: Which is better for security?

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • Benelux: New skills in a digital world

    In this e-guide, we look at some of the technologies being adopted in the Benelux region. This gives a taste of what is in demand. Read about how Dutch organisations and the Netherlands in general are witnessing the rise of technologies like virtual reality, no-code programming platforms, smart neighbourhood, as well as fintech.

  • IDC: SD-WAN market spend to top $5B in 2023

    Discover the current vendors' share of the SD-WAN market, and why the market will grow an average of nearly 31% annually through 2023.

  • VMworld 2019 Europe: Where next for VMware?

    In this e-guide, check out ourround-up of some of the biggest announcements VMware made at this year's VMworld US 2019 conference, as part of a countdown towards its European conference in November 2019.

  • Infographic: Mapping adoption of artificial intelligence in the enterprise

    This infographic breaks down the complex data into noteworthy insights from enterprise leaders, including bottlenecks to AI development, budget allocation and what parts of their company see the most AI.

  • CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs

    Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.