All resources sponsored by:

ComputerWeekly.com

1 - 25 of 2409 Matches
A Computer Weekly buyer's guide to on-site, off-site and cloud-based disaster recovery
sponsored by ComputerWeekly.com
EGUIDE:With businesses becoming increasingly dependent on data to function, being able to recover quickly from an IT systems failure is critical. In this 14-page buyer's guide, Computer Weekly looks at the various options available when implementing disaster recovery.
Posted: 18 Feb 2020 | Published: 18 Feb 2020
Get This Now


Salary Survey 2019/20 ASEAN
sponsored by ComputerWeekly.com
EGUIDE:Over half of IT professionals in ASEAN received a pay rise in 2019, underscoring the growing demand for tech talent in the region. In this e-guide, we look at salary and benefits expectations, how skills shortages are driving the buoyant IT market, and why there's still room for improvement when it comes to women in IT.
Posted: 17 Feb 2020 | Published: 18 Feb 2020
Get This Now


Computer Weekly –18 February 2020: Trust no one – the benefits of zero-trust security
sponsored by ComputerWeekly.com
EZINE:In this week's Computer Weekly, we take an in-depth look at zero-trust security and examine how it changes traditional IT risk models. After SAP extended the support deadline for its ECC ERP system, we find out the options for users. And we analyse explainable AI and the ethical importance of understanding algorithms. Read the issue now.
Posted: 14 Feb 2020 | Published: 18 Feb 2020
Get This Now


CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
sponsored by ComputerWeekly.com
EZINE:Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
Posted: 14 Feb 2020 | Published: 27 Feb 2020
Get This Now


The future of SAP ECC - Make an informed decision about your ERP roadmap
sponsored by ComputerWeekly.com
EGUIDE:Standard support is being extended to 2027, while SAP will continue to offer extended support until 2030, in a bid to get businesses to migrate to S/4 Hana. Should you run legacy business software for 15 more years? Following SAP's decision to extend ECC support, that is a question many CIOs will ask.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


CW APAC, February 2020: Expert Advice: Container Storage
sponsored by ComputerWeekly.com
EZINE:In this handbook, focused on storage in the Asia-Pacific region, Computer Weekly looks at how container applications can make companies more agile, the cost benefits of data storage and the most common data storage myths that need to be debunked.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Infographic: How blockchain works
sponsored by ComputerWeekly.com
EGUIDE:To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Artificial intelligence in ITSM: Finding the right tools for you
sponsored by ComputerWeekly.com
EGUIDE:AI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


IAM: Managing identity remains key to cyber security
sponsored by ComputerWeekly.com
EGUIDE:IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


A Computer Weekly buyer's guide to data protection
sponsored by ComputerWeekly.com
EGUIDE:Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Cyber attackers exploiting poor cloud security
sponsored by ComputerWeekly.com
EGUIDE:More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Case Study: French national research centre insources with Rubrik backup
sponsored by ComputerWeekly.com
CASE STUDY:France's national research organisation wanted to insource IT back from Atos and built its private cloud on VMware across two locations with Rubrik appliances for backup.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Case Study: Hop jumps to Pure Storage
sponsored by ComputerWeekly.com
CASE STUDY:Air France short-haul and regional brand Hop jumps to Pure Storage after coming up against Dell EMC, NetApp and HPE, which all tried to sell it solutions ill-suited to its needs.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Infographic: Comparing the leading SD-WAN vendors
sponsored by ComputerWeekly.com
EGUIDE:This SD-WAN vendor comparison chart is a useful starting point to get information about SD-WAN deployment options, pricing, cloud connectivity options and more.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Security analytics: Enabling organisations to get ahead of attackers
sponsored by ComputerWeekly.com
EBOOK:In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


How to unlock the true value of data
sponsored by ComputerWeekly.com
EGUIDE:With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


IBM Cloud: No shift, Sherlock
sponsored by ComputerWeekly.com
EGUIDE:OpenShift is a key ingredient in the latest shift in IBM's long-running cloud strategy. We look at what it means...
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Infographic: Which 5G applications will transform your business?
sponsored by ComputerWeekly.com
EGUIDE:The UK's operators have started work on their 5G network roll-outs, but what are the applications that are most likely to gain enterprise traction for the new standard?
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


What makes a great managed security service provider?
sponsored by ComputerWeekly.com
EGUIDE:With an increasingly challenging threat landscape, being a successful MSSP can be a struggle. Making sure customers stay safe is critical to the success of your business, which is why understanding what makes a great MSSP is crucial for you to be able to make informed choices that will prove beneficial to the company.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


A Computer Weekly Buyer's Guide to Enterprise social networking
sponsored by ComputerWeekly.com
EGUIDE:Companies are discovering the many advantages of communicating through social networking platforms. In this 14-page buyer's guide, Computer Weekly looks at how they can revolutionise collaboration, the options available for retailers and the pitfalls of communication overload
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE:Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


CIO Trends #9
sponsored by ComputerWeekly.com
EBOOK:In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Gartner: Five pitfalls for a new CIO to avoid
sponsored by ComputerWeekly.com
EBOOK:Incoming CIOs have around 100 days to set themselves up with a smooth runway to success. The good news is that countless CIOs have already gone through the rigmarole and made the mistakes so that you don't have to. Here are five common mistakes a new CIO should try to avoid.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


Email security: Never more important
sponsored by ComputerWeekly.com
EBOOK:In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


86 million reasons to support No More Ransom
sponsored by ComputerWeekly.com
EGUIDE:Anti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
Get This Now


1 - 25 of 2409 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info