ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.

  • Clouds in the desert as Middle East transforms

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud computing is driving digital transformation across the Middle East, with the take-up of on-demand computing resources surging. Read in this e-guide why technology suppliers are building cloud infrastructures across the region and why businesses crave them.

  • Computer Weekly – 5 June 2018: The bumpy ride to digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.

  • Computer Weekly – 15 May 2018: Will government IT be ready for Brexit?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK government struggles to get new IT systems up and running before Brexit, we examine the challenges ahead. We look at serverless computing and ask why this emerging cloud technology is so important. And we discuss the latest best practice in mobile strategy for SMEs. Read the issue now.

  • Computer Weekly – 30 April 2024: What's it like being the IT chief at Man Utd?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we speak to the chief digital information officer of Manchester United Football Club to discuss the IT that keeps a premiership team running. We also investigate how well prepared the UK is for major semiconductor supply chain disruptions. Read the issue now.

  • Computer Weekly – 23 October 2018: Where next for digital identity?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.

  • A Computer Weekly buyer's guide to modern enterprise resource planning

    Sponsored by: TechTarget ComputerWeekly.com

    The use of modern enterprise resource planning can make a business more agile. In this 14-page buyer's guide, Computer Weekly looks at how to best prepare for modernisation, the opportunity to build sustainably and how to unshackle your firm from unplanned upgrade needs.

  • Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.

  • How To Deploy A Password Policy

    Sponsored by: Specops Software

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

  • How Audit Compliance and Cloud Adoption Affects IT Security

    Sponsored by: Dell Software

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.