ComputerWeekly.com Research Library

Powered by Bitpipe.com

Homeland Security Multimedia

  • IT Priorities 2018 - What are UK IT managers spending their budgets on?

    Sponsored by: TechTarget ComputerWeekly.com

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, talks us through the key areas that IT managers in the UK are planning on spending their budgets on. Results and statistics are taken from Computer Weekly's 2018 IT Priorities survey in which over 250 IT decision makers took part.

  • IT Priorities 2018 - What's happening in security?

    Sponsored by: TechTarget ComputerWeekly.com

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

  • Video: IT Priorities 2023 APAC

    Sponsored by: TechTarget ComputerWeekly.com

    Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.

  • IBM Lotus Complete Collaboration Express Starter Pack

    Sponsored by: IBM

    Check out this software demo to see how the IBM Lotus Complete Collaboration Express Starter Pack works in conjunction with Lotus Domino and other applications to provide excellent collaboration capabilities and numerous other benefits.

  • Lowering Risk by Applying Consistent Security Across All of Your Locations

    Sponsored by: Juniper Networks, Inc.

    Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.

  • MapXtreme Java v4.8.1

    Sponsored by: MapInfo Corporation

    This IT Download, MapXtreme Java, provides a Java mapping engine which facilitates optimized location intelligence on the desktop, over the internet, or through an intranet.

  • Mission Critical Services

    Sponsored by: Hewlett Packard Enterprise

    In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.

  • Oracle Advanced Customer Services: Solution Support Center

    Sponsored by: Oracle Corporation

    The Oracle Solution Support Center, Oracle's most comprehensive Advanced Customer Service, is the best way to protect mission-critical operations and drive business success.

  • Orion Network Configuration Manager (NCM)

    Sponsored by: SolarWinds, Inc.

    Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies.

  • Symantec Protection Suite Enterprise Edition

    Sponsored by: Symantec Corporation

    Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  • The Benefits Of Virtualizing Citrix XenApp with Citrix XenServer

    Sponsored by: Citrix

    Virtualization is now generally recognized as one of the key enablers of these objectives. As organizations explore virtualization solutions, the challenge is to select the right strategic vendor with the best solution set for their business.

  • What Is Cloud Computing?

    Sponsored by: Salesforce.com

    Cloud computing is a better way to run your business. Instead of running your apps yourself, they run on a shared data center. When you use any app that runs in cloud, you just log in, customize it, and start using it.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.