ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • Cloud: A security risk and opportunity

    Sponsored by: TechTarget ComputerWeekly.com

    With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.

  • Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.

  • A Computer Weekly buyer's guide to secure and agile app development

    Sponsored by: TechTarget ComputerWeekly.com

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

  • Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.

  • From Patchwork To Platform

    Sponsored by: Red Hat

    This e-book examines the differences between upstream Ansible and Red Hat Ansible Automation Platform, a hardened and supported enterprise solution. Learn how the platform can enhance security, scalability, and ROI for your organization's automation needs. Read the full e-book to discover the benefits of enterprise-grade automation.

  • White Paper Transform your IT with AWS

    Sponsored by: T-Systems

    Many cloud migrations fail not because of technology, but rather because of established business processes or the corporate culture. The goal of a cloud migration should not be transforming your technology, but rather transforming the business. Read on to learn about best practices you can leverage to successfully tackle your cloud migration.

  • Digital Disruption Index: Aligning strategy, workforce and technology

    Sponsored by: TechTarget ComputerWeekly.com

    Business leaders' confidence in the digital capabilities of new entrants to the workplace has improved in the past six months, according to the Digital Disruption Index by Deloitte.

  • Top 10 cyber security stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.

  • Computer Weekly – 28 February 2017: Navigating software licences

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after SAP won a court case against a major customer, Diageo, over software charges, we look at what this means for users. We talk to the IT consultancy that recruits only autistic IT professionals. And we look at the CIO's big challenges for the year. Read the issue now..

  • It's hyper converged-with-everything in today's datacentre

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the key hyper-converged vendors and their products, as well as hyper-converged tailored to disaster recovery, backup, cloud functionality, and the software-defined hyper-converged products available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.