ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=20start=10start=10start=20start=30"

  • Transforming software development with generative AI Develop faster and more securely with Amazon CodeWhisperer

    Sponsored by: AWS

    The eBook “Transforming Software Development with Generative AI” addresses the challenges faced by development teams as organizations make greater use of software to transform their businesses. The solution for many dev teams is Amazon CodeWhisperer, the real-time generative artificial intelligence (AI) coding companion.

  • Smart-UPS Modular Ultra

    Sponsored by: Schneider Electric

    APC's Smart-UPS Modular Ultra offers scalable power in a compact design. Features include 20kW capacity, 2.5x power in half the size, lithium-ion batteries with 3x lifespan, and modularity. Ideal for edge environments and data centers, the next-gen UPS ensures resiliency and uptime. See the full product overview for specs and options.

  • CVE-2021-2035 and RDBMS Scheduler Security

    Sponsored by: Spinnaker Support

    This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.

  • Top 10 datacentre stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    There is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.

  • Converged infrastructure: What enterprises need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we round up some of the latest thinking and use cases for converged and hyper-converged infrastructure systems, as enterprises and hyperscale firms seek to reduce the complexity of their datacentres.

  • A Guide to a BYOD Enabled Conference Room

    Sponsored by: Shure Inc

    Hybrid work remains standard, challenging businesses to ensure their conferencing technology fosters collaboration and smooth experiences. To do so, many businesses are adopting a bring-your-own-device (BYOD) model for their conference rooms. Browse this white paper to access a shopping list for creating a BYOD conference room for your company.

  • The DevSecOps Playbook Practical Steps for Producing Secure Software

    Sponsored by: Veracode, Inc.

    What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

  • Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.

  • Securing DevOps A Digital-first Imperative for Success

    Sponsored by: CyberArk

    This IDC InfoBrief commissioned by RedHat and CyberArk looks at the importance of securing identities as businesses embrace a DevOps culture in APAC. A full DevSecOps approach has many facets, and the starting point for a successful DevSecOps approach is around identity and access management controls.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.