ComputerWeekly.com Research Library

Powered by Bitpipe.com

IT Asset Management Research

  • Infrastructure Control with Red Hat Ansible Tower

    Sponsored by: Red Hat

    In this paper, discover a framework for controlling, securing, and managing your Ansible automation. Download now to see how this framework provides a single language for DevOps, continuous integration and continuous delivery (CI/CD), and more.

  • Computer Weekly – 24 October 2017: Where will AI take us?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

  • Computer Weekly – 1 August 2017: The fields of Athenry – how Apple's datacentre plans are causing turmoil in a small Irish town

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.

  • CW Middle East July to Sept 2017

    Sponsored by: ComputerWeekly.com

    In this issue of CW Middle East, we find out why the Gulf region must do more to attract women into IT if the region’s countries are to diversify.

  • Managing change

    Sponsored by: ComputerWeekly.com

    A series of inspirational quotes for IT managers. Cut them out, file them, or pin them up to remind you when you are looking for inspiration.

  • CW Nordics May 2017

    Sponsored by: ComputerWeekly.com

    The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.

  • Computer Weekly – 28 March 2017: Making the UK fit for 5G

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the government's new 5G strategy and assess whether it's enough to stimulate development of next-generation mobile networks. We meet some of the Silicon Valley startups hoping to revolutionise big data. And we examine how to prevent the move to DevOps from harming work-life balance. Read the issue now.

  • CW Benelux ezine February 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

  • CW Middle East Oct to Dec 2016

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.

  • First edition of Computer Weekly 1966

    Sponsored by: ComputerWeekly.com

    To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.

  • Tech-Savvy Asean Population Sparks Business IT Shake-Up

    Sponsored by: SearchDataCenter.com

    An increasingly tech-savvy Asean population, especially among the younger, more urban demographics, is driving IT teams to look at challenges in a new way. In this e-zine, explore the obstacles facing IT in Asean nations and markets. Find out what upcoming changes will have the greatest impact on users, IT resources, and revenue.

  • Crossing the Legacy ITSM Chasm

    Sponsored by: ServiceNow

    This exclusive report examines "next-generation ITSM" and its contributions toward optimizing changing IT and business requirements. Download now to compare advances with the risks of staying with legacy ITSM models and evaluate the risks of "doing nothing" and allowing legacy ITSM to persist.

  • Computer Weekly – 7 June 2016: Apple lures open source developers with Swift

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at Apple's plan to woo open source developers to its Swift programming language. DevOps practitioners are warning of growing stress on IT operations staff through the growth of continuous development practices. And Specsavers' CIO tells us why the store is a vital part of digital retail. Read the issue now.

  • CW@50: What was making the news in June

    Sponsored by: ComputerWeekly.com

    The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.

  • IT4IT for Managing the Business of IT

    Sponsored by: ComputerWeekly.com

    IT4IT™ for Managing the Business of IT – A Management Guide, from The Open Group, provides best practice advice and focuses on the data and automated workflows needed to manage IT services in a lean, agile and business-focused way.

  • HCI Appliances Embrace Containers and More Flexible Pricing

    Sponsored by: Hewlett Packard Enterprise

    A handful of startups and top-tier players have introduced container-driven bundles that could determine a new delivery and support approach for hyper-converged infrastructure (HCI). Read this expert guide to see highlighted several HCI appliances built for containerized apps that should be on your radar.

  • Data Center Monitoring Tools and Tips to Keep IT in the Know

    Sponsored by: Hewlett Packard Enterprise

    Data center admins have a seemingly never-ending to-do list when it comes to infrastructure monitoring. From server to equipment monitoring, it's a practice that's often difficult to juggle. Read on to view five tips to fine-tune your data center monitoring, including how to increase security and scalability.

  • Strategize IT Budget and Infrastructure Planning to Secure DevOps Pipelines

    Sponsored by: Red Hat

    Learn how to implement a collaborative, lightweight ITIL approach in your infrastructure, and adapt ITIL to suit your priorities by unifying ITSM and DevOps under one framework. Download now to keep a close eye on DevOps pipelines by strategizing your budget to secure container initiatives, and more.

  • A Hybrid IT Approach to Virtualization & DevOps Management

    Sponsored by: Red Hat

    Here, experts illustrate the evolution of multi-use virtualization tools, and you'll discover how to benefit from a hybrid approach that combines physical, virtual, and application visibility with automation and deep infrastructure analysis. Read on to also learn how DevOps is reshaping IT vendors' offerings.

  • Equipped with the Proper Management Strategies, See IT Downtime Decrease

    Sponsored by: Blue Medora

    This expert e-guide offers three essential strategies to ensure IT workers are proactively managing your IT infrastructure, rather than spending the majority of their time reacting to problems as they arise. Also, learn about the most popular IT performance management infrastructures, and how they can be affecting the service of your enterprise.

  • Manage Your Data Center Operations More Efficiently

    Sponsored by: Hewlett Packard Enterprise

    This expert e-guide offers 10 professional tips to improve the management process of IT assets and IT support in your data center. Walk through these tips and see first-hand how they can improve upon the strategies you already have in your data center while also offering a fresh new perspective.

  • It's Time for DevOps and IT Ops to Work Together and Manage the New Integrated Data Center Trend

    Sponsored by: ServiceNow

    This expert eGuide analyzes the ways in which dev ops and IT ops professionals will have to work in a cross-functional team, the specific skills they will need to adopt as well as some of the challenges they will face during the integration process.

  • As Digital Transformation Drives Innovation, Make Sure Your IT Service Management Doesn't Fall Behind

    Sponsored by: ServiceNow

    This eGuide addresses the growth of ITSM methods, tools, and processes. Also, engage in seven CIO tips for existing and upcoming ITSM changes that are reconstructing IT services, how to manage all of these developments effectively and ways in which you can keep your enterprise relevant.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

  • A New Service Integration and Management Concept for Growing Businesses

    Sponsored by: ServiceNow

    This exclusive eGuide addresses the role of this new concept, service level agreements (SLAs), some of the points of value it can offer your business, as well as number of helpful tips to keep in mind if you are deciding to implement the system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.