ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • Royal Holloway: Information security of the 2016 Philippine automated elections

    Sponsored by: TechTarget ComputerWeekly.com

    We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.

  • Urban Myths About Secure Coding

    Sponsored by: Veracode, Inc.

    Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.

  • Essential Guide: APAC women in cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.

  • Computer Weekly – 3 October 2017: Digitally preserving history

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how cloud technologies are helping Gibraltar to digitally preserve historic documents and safeguard its cultural heritage. We examine progress on the roll-out of the new NHS national network. And our latest buyer's guide looks at cloud-based ERP software. Read the issue now.

  • Reinventing Backup and Recovery With AI and ML

    Sponsored by: Veeam Software

    To gain insight into these AI and ML trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and data professionals familiar with and/or responsible for data protection (including backup and recovery) decisions and data science for their organization. Read this exclusive ESG and Veeam eBook to find out more.

  • Minimum Viable Governance

    Sponsored by: ModelOp

    Enterprises must implement AI governance programs to address risks and prepare for regulations like the EU AI Act. This white paper outlines a "Minimum Viable Governance" framework to inventory AI systems, enforce light controls, and report on AI usage and risks - without stifling innovation. Read the full white paper now to learn more.

  • Computer Weekly - 6 July 2021: Where to start with Windows 11

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.

  • Converting CentOS Linux to Red Hat Enterprise Linux

    Sponsored by: Red Hat

    Learn how to convert your CentOS Linux systems to Red Hat Enterprise Linux (RHEL) with the Convert2RHEL tool. This overview covers conversion methods, the benefits of RHEL, and how Red Hat Consulting can help with complex migrations. Read the full product overview to get started.

  • Going big: why companies need to focus on operational analytics

    Sponsored by: TechTarget ComputerWeekly.com

    This report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations

  • 2024 PKI and Post-Quantum Trends Study

    Sponsored by: Entrust, Inc.

    In this report, Ponemon Institute presents the findings based on a survey of 2,176 IT and IT security personnel who are involved in their organizations’ enterprise PKI, distilling the findings in order to provide you with essential guidance. Read now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.