Search Results for: Business-Continuity

Focus: Campus local area networks (LAN)
In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.

TechTarget ComputerWeekly.com

Software licensing – battleground or crucible?
Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?

TechTarget ComputerWeekly.com

ITIL and ITSM: How IT is becoming more service-oriented
In this e-guide, we shine the light on the state of IT service management (ITSM) and the framework upon which it is effectively built, the IT Infrastructure Library (ITIL). We explore how ITSM is being changed by machine learning, how it can be used in the cloud and the datacentre, and the role ITIL could play in digital business transformation.

TechTarget ComputerWeekly.com

Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?
The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.

TechTarget ComputerWeekly.com

Advanced analytics meld with machine learning to press more value from big data
In this e-guide we shine the light on a number of case studies taken from around the world of data analytics. We delve into a number of Silicon Valley-based startups that are looking to shake up the data analytics industry as well as glimpsing into the future of AI-based analytics, data visualisation tools and the Australian data analytics market.

TechTarget ComputerWeekly.com

Ensure FFIEC Compliance
Cybersecurity asset management addresses several key requirements found in the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool and plays a crucial role in your compliance efforts. Download this white paper to learn which aspects of FFIEC guidelines cybersecurity asset management solutions address and how.

TOPICS: .NET
Redjack

How to get the best value from Office 365
In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

TechTarget ComputerWeekly.com

Semiconductor Secure Power Solutions
Discover in this white paper how Integrated Schneider Electric solutions can offer your organization a complete electrical system including power monitoring and a resilient architecture to improve subfunction operation, enable optimum use of energy, and save up to 30% on operating energy costs.

TOPICS: .NET
Schneider Electric

Securing DevOps A Digital-first Imperative for Success
This IDC InfoBrief commissioned by RedHat and CyberArk looks at the importance of securing identities as businesses embrace a DevOps culture in APAC. A full DevSecOps approach has many facets, and the starting point for a successful DevSecOps approach is around identity and access management controls.

CyberArk

2024 Technology Spending Intentions Study Highlights
This TechTarget and Enterprise Strategy Group research highlights key technology spending priorities and investment plans. With 46% of organizations increasing budgets, this report offers valuable insights to guide your go-to-market strategy. Read the full 2024 Technology Spending Intentions Study.

Enterprise Strategy Group