ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet Access White Papers

  • Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.

  • Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

  • Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.

  • Computer Weekly – 19 September 2017: Can DevOps deliver on its productivity promises?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.

  • Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.

  • Mobile Security Challenges: Solutions and Best Practices

    Sponsored by: BlackBerry

    Today is an era of "mobile-first" everything and companies are transforming their operations by leveraging mobile technology. However, mobility hasn't come without its challenges. Discover solutions to common mobility issues such as identity management, and how to ensure your mobile-first operations are mission critical and IoT optimized.

  • What to Do When You Have an IP Address but No Internet Connection

    Sponsored by: Global Knowledge

    When we have an IP address but can't connect to the Internet, we need basic troubleshooting skills to verify both connections and configuration. Download this resource to learn about the local network, parts of IP addressing, and DHCP basics for resolving these types of connectivity issues.

  • Empowering Cardiologists to Enhance Patient Care

    Sponsored by: GE Healthcare

    Read this white paper to learn how a web-based IT system can meet the changing cardiovascular technology paradigm by offering flexible, streamlined functions.

  • Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition

    Sponsored by: Hewlett Packard Enterprise

    Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.

  • IPv6 Timeline: The Road to a New Protocol

    Sponsored by: Hewlett Packard Enterprise

    This IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today.

  • Prepare Your Network for the Future: Embrace IPv6

    Sponsored by: Hewlett Packard Enterprise

    This E-Guide from SearchEnterpriseWAN.com explores the importance of IPv6 and why it should be on every enterprise's short-term to-do list. View now to uncover how this influential protocol will shape your enterprise now and in the future.

  • Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop

    Sponsored by: SysAid Technologies Ltd

    This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.

  • Mobile Internet 3.0: How Operators Can Become Service Innovators and Drive Profitability

    Sponsored by: Juniper Networks, Inc.

    Mobile operators today have the distinct ability to become service innovators and drive profitability with the advent of Mobile Internet 3.0. Learn how you can expand your data revenue base in this resource.

  • How Will the Change in Internet Addresses Affect Your Business?

    Sponsored by: Brocade

    IP addresses are being nearly depleted due to the immense popularity of the internet and the need to have a unique IP address to identify each device using it. Running out of internet addresses would have disastrous effects.

  • Delivering Secure Guest Access and Mobile Internet Device (MID) Management with HiveOS 4.0

    Sponsored by: Aerohive Networks

    Mobile devices give workers the ability to access critical information anytime, anywhere. Despite the obvious benefits for productivity, network accessibility has also become a serious security concern – especially in the healthcare community. Learn about a cloud-enabled network security approach that helps safeguard confidential patient data.

  • Digital Billboard Advertising - New Life for a Classic Medium

    Sponsored by: Motorola Solutions

    Read this paper to learn more about the emerging trend of digital billboard advertising and how it can enhance responsiveness, flexibility and profits.

  • Enterprise WLAN Infrastructure At-a-Glance

    Sponsored by: Motorola Solutions

    Motorola offers a comprehensive portfolio of wireless LAN (WLAN) infrastructure solutions designed to enable the truly wireless enterprise, regardless of the size of your business. Read this paper to discover how Motorola products provide resiliency, security and performance equal to or greater than that of a wired network.

  • Proactive Service Assurance for Mobile Data Services

    Sponsored by: Infovista Corporation

    Until very recently, customer volume for data services was so low that service providers couldn't justify investment in robust, end-to-end service assurance solutions for mobile data services. Now, with the volume of data services on mobile networks growing, the business case for such an investment is clear. Read on to learn more.

  • Exchange Server 2007: What to Expect

    Sponsored by: Global Knowledge

    Microsoft Exchange Server 2007 has been designed to meet the tough challenges for a corporate communication solution and provides a rich feature set that users can access through a variety of different interfaces and devices.

  • Welcome to Your Internet Future - Mobile Broadband Brought to You by WiMAX

    Sponsored by: Intel Corporation

    WiMAX is a new way of subscribing to mobile Internet access through a wireless connection, direct to your service provider, it gives you reliable, convenient broadband access on the go, for real-time information and entertainment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.