ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Considerations for Implementing Zero Trust for the Workforce

    Sponsored by: Cloudflare

    As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.

  • Zero Trust for the Workforce July 2024

    Sponsored by: Cloudflare

    Cloudflare commissioned Enterprise Strategy Group to survey 200 senior IT security decision-makers about their approach to securing user access to corporate apps and resources, across traditional, digital-native, and public-sector organizations. Download the eBook to see the consensus about Zero Trust for the workforce.

  • Object storage: A great fit for large, unstructured data sets

    Sponsored by: TechTarget ComputerWeekly.com

    Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.

  • CIO Trends #7: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about smart city initiatives in the Gulf Cooperation Council countries as well as why Saudi Arabia has sent a delegation to the bustling tech hub in the US - Silicon Valley. Also find out how a rare fault caused Visa's global payment system to go offline.

  • CHAPTER 13: IT Troubleshooting

    Sponsored by: McGraw Hill

    Download this sample chapter from ITF+ CompTIA IT Fundamentals to learn how to approach IT problems using a standard troubleshooting method, how to troubleshoot common computer problems and more.

  • 15 Reasons To Adopt Red Hat Openshift Virtualization

    Sponsored by: Red Hat

    In this e-book, you'll learn how Red Hat OpenShift Virtualization can simplify IT operations by unifying virtual machines and containers on a single platform. Read on now to discover 15 key benefits, including improved performance, security, scalability, and more.

  • Brexit and UK tech: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    In the immediate aftermath of the UK's historic referendum vote to leave the European Union, Computer Weekly canvassed the advice and opinion of experts across the technology sector to assess the implications for IT professionals.

  • Data classification tools: What they do and who makes them

    Sponsored by: TechTarget ComputerWeekly.com

    Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.

  • The Essential Guide to XDR

    Sponsored by: Palo Alto Networks

    Extended detection and response (XDR) is one of the main solutions cybersecurity professionals have turned to deal with the rise in cyberthreats. Read on for a comprehensive breakdown of XDR, what it is, how it works, and what you can do to get the most out of your XDR tools.

  • Unleash the power of generative AI: build better applications, faster

    Sponsored by: AWS

    The eBook “Unleash the Power of Generative AI: Build Better Applications, Faster” describes how companies and their application developers can overcome the barriers to generative AI adoption by leveraging AWS tools and services.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.