ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.

  • CW ASEAN – September 2018: Time to clear DevOps hurdles

    Sponsored by: TechTarget ComputerWeekly.com

    ASEAN organizations are generally aware of the benefits of DevOps, but lesser known are the pathways to success. What would an organization that has successfully implemented DevOps look like?

  • The State of Zero Trust Security 2023

    Sponsored by: Okta

    In partnership with Qualtrics, Okta conducted a global study with the help of 860 information security decisionmakers across a range of industry verticals. In the 38 pages of this report, Okta has condensed the findings of this research so that you can extract the most valuable and relevant information. Read on to learn more.

  • CW Benelux May 2018

    Sponsored by: TechTarget ComputerWeekly.com

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

  • CW ASEAN: Time to dial up defences

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

  • Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.

  • CW Nordics August 2019: Copenhagen woos tech startups

    Sponsored by: TechTarget ComputerWeekly.com

    Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.

  • Accelerating Your Business Through Network Readiness: An Innovation Imperative

    Sponsored by: Auvik Networks, Inc.

    Is your network equipped to face the myriad factors complicating modern networking? Along with delving into those factors – such as proliferating IoT devices and enterprise mobility – this e-book maps out how you can prepare for the challenges of the landscape through network innovation. Keep reading to learn more.

  • Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018

    Sponsored by: TechTarget ComputerWeekly.com

    David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.