ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Turning data into actionable insights

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about how companies across Asia-Pacific are turning data into critical assets and overcoming their data management woes. Plus, find out how modern business intelligence shapes up to big data and the value of DataOps in decision-making.

  • Computer Weekly - 19 November 2019: Is facial recognition happening too fast?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.

  • Tanium for Detection and Response: Effectively Address and Remediate Incidents

    Sponsored by: Tanium

    Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.

  • Strengthen your Financial API Security

    Sponsored by: Ping Identity Corporation

    This white paper highlights several areas of concern around API security within your financial enterprise, including access control, data governance and consent management, visibility into the activity of your applications, auditing and forensics. Read on to gain a deeper understanding of API security threats and how to build a solid defense.

  • Cloud-native meets hybrid cloud: A strategy guide

    Sponsored by: Red Hat

    As 2020 begins, it’s time for you to take another look at your IT modernization strategy, keeping in mind the effects of hybrid cloud and cloud-native development on your IT systems. Open this white paper to get started.

  • Consumer Data Right: Open Banking

    Sponsored by: Ping Identity Corporation

    With consumers growing increasingly reliant on digital services and interfaces, the financial industry is evolving to meet these expectations through open banking interfaces. In this solution brief, explore the Ping Identity Platform, designed to meet Australia’s Open Banking requirements while still providing a seamless user experience.

  • Taking Stock of Supply Chain Capacity

    Sponsored by: Mindshare - Sage

    In this white paper, learn how you can optimize inventory management with Sage X3, and explore the implications that inefficient processes could have on your business.

  • The Business Value of an Agile and Flexible Platform for Developing and Running Applications with OpenShift on AWS

    Sponsored by: Red Hat

    In this IDC white paper, learn how running OpenShift on AWS can let containers take advantage of modern, on-demand, robust cloud infrastructure and access the global reach of the AWS cloud.

  • Define Your Role

    Sponsored by: SentinelOne

    To be a successful CISO is to think on a tactical level, balancing day-to-day security concerns with long-term projects to position your organizations to handle future threats. In this e-book, discover the 12 fundamental questions CISOs should be asking themselves on a frequent basis to help define their role. Read on to learn more.

  • BrianMadden.com Podcast 143: The Citrix-Chrome Transformation Assessment

    Sponsored by: Google

    Read through this podcast transcript to hear Jack Madden, Executive Editor of BrianMadden.com, weigh in with his thoughts on the Citrix Chrome Transformation Assessment program and how it can make the move to a Chromebook-based VDI strategy simpler.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.