ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"

  • A Computer Weekly buyer's guide to NoSQL

    Sponsored by: TechTarget ComputerWeekly.com

    There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.

  • MicroScope – February 2022: Spotting the hidden security dangers

    Sponsored by: MicroScope

    In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate

  • Focus: Securing for the future

    Sponsored by: TechTarget ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Cloud Security Your Developers Will Love

    Sponsored by: CyberArk

    As organizations move to the cloud, they seek consistent, developer-friendly controls that secure their access to cloud-based workloads and SaaS applications without slowing their productivity down. Access this e-book to learn more.

  • Ebook - Content Synd - Zero Trust Explained: Ultimate Guide to Zero Trust Security

    Sponsored by: StrongDM

    Download this ebook explore Zero Trust security, including its benefits, best practices, and common barriers to implementation. You’ll gain a deeper understanding of Zero Trust models like ZTAA and ZTNA and learn the tools and techniques you need to apply frictionless Zero Trust access control to your infrastructure.

  • 7 Steps to a Stress-Free ERP Roll-Out

    Sponsored by: Aptean

    Ensure a smooth ERP roll-out with this 7-step guide. Learn how to plan, assemble a team, integrate systems, train users, and measure success. Download the e-book to discover expert tips for a stress-free ERP implementation.

  • CW ANZ: Gearing up for 5G

    Sponsored by: TechTarget ComputerWeekly.com

    The potential benefits of 5G are certainly promising in Australia, which is seen as a test bed for 5G services with the country's dense cities and wide open spaces. In this edition of CW ANZ, we look at how Australia is ushering in 5G services and the industries that will get the most out of the technology. Read the issue now.

  • Executive Interview: Unleashing blockchain's potential

    Sponsored by: TechTarget ComputerWeekly.com

    Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.

  • How Extole Exceeded Expectations for Cloud Cost and Resource Optimization with Pepperdata

    Sponsored by: Pepperdata

    In this case study, you'll discover how Extole exceeded cloud cost and resource optimization expectations with Pepperdata. Read on now to learn how they were able to take control of their complex cloud infrastructure costs.

  • A Computer Weekly E-guide to NAS

    Sponsored by: TechTarget ComputerWeekly.com

    In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.