ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • Computer Weekly Buyer's Guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at the effects on the IT department of technology commoditisation, open source and software as a service, the trend of insourcing IT, and the concept of service integration and management for outsourced services.

  • CW Benelux - February-April 2022: Unesco members adopt AI ethics recommendation

    Sponsored by: TechTarget ComputerWeekly.com

    Unesco member state have adopted an AI ethics recommendation that seeks to define a common set of values and principles to guide the development of ethical AI globally. Also read about a large-scale national cyber exercise in the Netherlands.

  • CW Nordics February 2019

    Sponsored by: TechTarget ComputerWeekly.com

    In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.

  • Arctic Wolf Security Operations 2024 Report

    Sponsored by: Arctic Wolf

    This report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.

  • The growth of cloud-based networking: What to expect in 2022 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    By upgrading to advanced network infrastructure, firms can deliver mission-critical services through cloud providers and through their own cloud resources. These increased capacity need has seen deployment of optical networking and advanced network solution such as software-defined wide area network (SD-WAN). Read more in our exclusive e-guide.

  • Guide to Environmental Sustainability Metrics for Data Centers

    Sponsored by: Schneider Electric

    To find out how your organization can improve both the accuracy of your sustainability tracking in the data center and the utility of your ESG reports, download this essential guide to environmental sustainability metrics.

  • Guide to Environmental Sustainability Metrics for Data Centers

    Sponsored by: Schneider Electric

    In this deep-diving white paper — designed for companies in the data center industry or wishing to report on their data center operations — discover why there 5 often-misunderstood categories for environmental sustainability reporting metrics that need to be at the core of your sustainability strategy.

  • Managing the invisible risk of non-human identities

    Sponsored by: One Identity

    As non-human identities (NHIs) proliferate, securing them is critical to avoid breaches and compliance issues. This white paper outlines the risks of unsecured NHIs and best practices for managing them, including identity discovery, risk assessment, and privileged access controls. Learn how to gain visibility and control over your NHIs.

  • A network automation roadmap to reap tech's best benefits

    Sponsored by: TechTarget Networking

    A network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.

  • SAP GRC Framework Integration with One Identity Manager

    Sponsored by: One Identity

    Built in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.