ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10"

  • We Solved the Infrastructure Access Problem

    Sponsored by: StrongDM

    In this e-book, you’ll learn how several organizations, from growing startups to established enterprises, solved the access problem using StrongDM. Read now to access their case studies and see how you could follow in the footsteps of their success.

  • March ezine: Making tracks to SD-WAN growth

    Sponsored by: MicroScope

    SD-WAN is a technology on the rise and there are clearly plenty of channel opportunities out there for those that get a firm grip on deployment and installation

  • The Modern IT Professional’s Guide To Shadow IT

    Sponsored by: Auvik Networks, Inc.

    Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.

  • Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule

    Sponsored by: XtelligentMedia Healthcare

    The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.

  • A Computer Weekly Buyer's Guide to Enterprise Open Source

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.

  • Solving Business Challenges With Data And AI 5 Insights From Telecommunications Leaders

    Sponsored by: Elastic

    Telco leaders struggle with real-time data utilization, data insights, and data maturity. Investing in data, analytics, and AI can drive revenue growth, productivity, and operational resilience. Download the report to discover the key insights and technology priorities for telco organizations.

  • A Strategic Approach to Maintaining PCI DSS 4.0 Compliance

    Sponsored by: Cloudflare

    "The shift to the cloud and to hybrid work made PCI compliance more complex in many ways. And with PCI DSS 4.0 rolling out, it is more essential than ever for organizations to find a way to streamline compliance.Download this whitepaper to learn about:

  • Driving Cloud Automation with Observability, AIOps, and NetDevOps

    Sponsored by: Aviatrix Systems

    This report explores how observability, AIOps, and NetDevOps are converging to drive cloud automation. It covers key trends, use cases, and leading vendors in these areas. Download the full White Paper to learn how these technologies can improve cloud infrastructure visibility, management, and efficiency.

  • Endpoint security: Hybrid work changes the game

    Sponsored by: TechTarget ComputerWeekly.com

    A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not.  In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.

  • Three Proven Tips for Delivering Full-Stack Scalable Apps at Speed

    Sponsored by: AWS

    Full-stack development makes it simple with complete ownership and end-to-end visibility—so your teams can accelerate time to market, increase agility, and realize greater cost efficiency. Speed up the development of mobile and web applications with:Modern tools and frameworksModern APIsModern compute

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.