Search Results for "Gartner computer weeklystart=10start=30start=30"
-
Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
-
NIS2: Why European Boards Need to Raise Their Cyber-risk Game
Sponsored by: Arctic WolfBy the end of 2024, this report by Enterprise Strategy Group (ESG) explains, the “Network and Information Systems 2 (NIS2) directive of the European Union will significantly affect Union countries and nation-states in its periphery.” So, what will that impact look like? Unlock insights in the report.
-
Computer Weekly – 14 November 2017: How fashion is turning to tech to get closer to customers
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine how the fashion world and clothing retailers are using technology to better understand customers. Brexit continues to dominate conversation in the UK tech sector – we find out the hopes and fears of the industry. And we look at how to use OpenStack in a hyper-converged infrastructure. Read the issue now.
-
Converting CentOS Linux to Red Hat Enterprise Linux
Sponsored by: Red HatLearn how to convert your CentOS Linux systems to Red Hat Enterprise Linux (RHEL) with the Convert2RHEL tool. This overview covers conversion methods, the benefits of RHEL, and how Red Hat Consulting can help with complex migrations. Read the full product overview to get started.
-
Web security: Important but often overlooked
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
-
Six Critical Capabilities of Saviynt’s Application Access Governance
Sponsored by: SaviyntMoving to Zero Trust can improve security while enabling users with right-time, right-level access. The process requires moving from a mindset of implicit trust to the continuous re-evaluation of risk. Read this white paper to learn more about the three key aspects to a successful Zero Trust adoption.
-
Build a Better Webinar: Recruiting and Prepping Speakers
Sponsored by: BrightTALK by TechTargetTo produce a successful webinar, you need an effective speaker. However, presenting key information in a clear, concise, and engaging way can sometimes be easier said than done. Access this guide for essential tips and tricks for prepping and recruiting your webinar speakers.
-
CW APAC - October 2019: Expert Advice on storage
Sponsored by: TechTarget ComputerWeekly.comThe creation of ever-increasing volumes of data is posingescalating problems for storage. In this issue of Expert Advice, Computer Weekly looks at how APAC firms are dealing with storage management issues in the cloud age. Read the issue now.
-
CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
Sponsored by: TechTarget ComputerWeekly.comSwedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
-
2024 global threat report
Sponsored by: CrowdStrikeThe advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.