ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • CW APAC April 2023 – Trend Watch: Business applications

    Sponsored by: TechTarget ComputerWeekly.com

    Tech's role in the workplace continues to grow. In this handbook, focused on business applications in the Asia-Pacific region, Computer Weekly looks at industry cloud platforms, how microservices improve customer experience, what automation brings to banking and Rimini Street's approach to third-party support

  • CVE-2021-2035 and RDBMS Scheduler Security

    Sponsored by: Spinnaker Support

    This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.

  • The UK manufacturing sector needs a digital upgrade

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the UK manufacturing sector is lagging behind on digital technology – we examine the challenges for the industry in becoming a global leader. Our buyer's guide looks at enterprise social media and collaboration tools. And we find out how data science is helping to boost cyber security strategies. Read the issue now.

  • Computer Weekly – 10 March 2020: Is technology innovation broken?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, despite its reputation for fresh thinking the tech sector is stuck in old ways that prevent true innovation – an expert explains why. Our buyer's guide examines how networking is affected by the growth of cloud-native applications. And we look at the key tech-related compliance issues for SMEs. Read the issue now.

  • A Network Perspective on SASE and SD-WAN

    Sponsored by: Titan One Inc.

    Today, direct cloud connectivity, integrated security, and enhanced experiences are driving SD-WAN adoption. As a result, the line between security and networking is becoming thinner. This this Enterprise Strategy Group (ESG) e-book explores how SASE strategies are fueling the convergence of network and security teams. Download to learn more.

  • Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.

  • 10 Properties Of Secure Medical Systems

    Sponsored by: Wind River

    This white paper outlines 10 key security principles for designing secure medical systems, including data encryption, secure boot, hardware partitioning, and input validation. Implementing these principles can help protect against cyberattacks and safeguard patient health. Read the full white paper to learn more.

  • CW ASEAN – September 2018: Time to clear DevOps hurdles

    Sponsored by: TechTarget ComputerWeekly.com

    ASEAN organizations are generally aware of the benefits of DevOps, but lesser known are the pathways to success. What would an organization that has successfully implemented DevOps look like?

  • CW APAC - October 2019: Expert Advice on storage

    Sponsored by: TechTarget ComputerWeekly.com

    The creation of ever-increasing volumes of data is posingescalating problems for storage. In this issue of Expert Advice, Computer Weekly looks at how APAC firms are dealing with storage management issues in the cloud age. Read the issue now.

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Sponsored by: TechTarget ComputerWeekly.com

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.