ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Service Providers Research

  • Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.

  • MicroScope – October 2020: Get in touch with remote network security

    Sponsored by: MicroScope

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

  • Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.

  • Essential Guide: Securing hybrid IT infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

  • A Computer Weekly buyer's guide to networks

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at an increasingly complex networking environment and offers advice for IT leaders on managing it in this 10 page Buyer's Guide.

  • Kaspersky Lab’s COVID-19 Relief Initiatives

    Sponsored by: Kaspersky

    Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.

  • 2019 Network Security Predictions: Top Trends & Challenges

    Sponsored by: TBNG Consulting

    Read this expert guide to review predicted networking trends for 2019. Also, learn why network security remains a top challenge and how you can properly manage it.

  • The Touch-Free Future and Current Adoption Trends of SDN

    Sponsored by: Juniper Networks, Inc.

    There's a significant amount of work needed prior to reaching a future in which no-touch technology is in wide use and SDN security is common. Learn why experts say it's time to transform network change management and security to what is suitable for today's business climate and discover the status of SDN adoption and deployment in the enterprise.

  • A Golden Age Dawns for Network Services

    Sponsored by: TechTarget Networking

    Advanced network technology options have expanded, offering enterprises better, cheaper, options for network services. This three part guide is designed to help you understand the ongoing evolution of network services and the connectivity technologies needed to access them.

  • Threat Intelligence Services: An Introduction

    Sponsored by: Cisco Umbrella

    Improve your enterprise security with threat intelligence services, as presented in this e-guide, and learn what you can expect when you hire an incident response provider to handle your ongoing crisis.

  • The Problem Facing Advanced Threat Defense

    Sponsored by: UnitedLex

    The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.

  • MicroScope E-Zine February 2015

    Sponsored by: Kaseya

    An issue highlighting the need for investment in the next generation of skilled staff.

  • Outsourcing Your Network – Lock, Stock, and Barrel or Bite-sized Chunks?

    Sponsored by: Dimension Data

    This whitepaper covers the changing strategy for outsourcing ICT to a service planner. Organizations are now using a multi-or-selective sourcing model instead of an all-in-one approach.

  • 5 Steps to Network Situational Awareness

    Sponsored by: Lumeta Corporation

    This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.

  • Handbook: Architecting the cloud for mobile services

    Sponsored by: TechTarget Networking

    This handbook will offer information on new cloud-based mobile services and provide guidance on architecting the cloud for mobile device management (MDM), location-based services and security requirements. We will also address managing the network to minimize problems in application performance and delivery.

  • Information Security Magazine – July/August 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

  • Wireless Solutions for High Density Wireless

    Sponsored by: Xirrus

    This brief resource outlines a smarter solution for high-density wireless networking that can scale to support thousands of simultaneous users and an ever-increasing range of wireless devices. Read on now to learn about the capabilities that make this solution a perfect fit for high-density environments.

  • The Financial Benefit of Cisco’s Elastic Core

    Sponsored by: Cisco Systems, Inc.

    Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.

  • Cisco® ONE: The Value of Advanced Flow Control

    Sponsored by: Cisco Systems, Inc.

    Discover how utilizing the advanced flow control capability in Cisco Open Network Environment (ONE) can help you overcome the complex monitoring challenges you are facing today.

  • Cisco® ONE: Traffic Visualization and Control

    Sponsored by: Cisco Systems, Inc.

    This resource explores how Cisco ONE's traffic visualization and control capability can help service providers visualize traffic end-to-end across the network and respond to unpredictable network capacity demands quickly, easily, and efficiently.

  • Remote Monitoring and Management Tools Selection Tips for Solution Providers

    Sponsored by: Solarwinds N-able

    This E-Guide from MicroScope.co.UK offers advice that will help MSPs and VARs find the ideal remote monitoring and management (RMM) solution for their organization.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • SharePoint E-Zine Volume 7: Who Is Allowed to Customize SharePoint?

    Sponsored by: TechTarget Search Windows Server

    Find out how to incorporate governance into SharePoint customization to empower users while setting boundaries.

  • Web application firewalls: How they can help protect customers

    Sponsored by: Astaro

    In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.

  • MicroScope - February 2012: A special issue looking at the opportunities for resellers in the networking market

    Sponsored by: MicroScope

    A special eZine looking at the opportunities for resellers in the networking market.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.