Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"
-
CW Middle East: UAE faces IT recruitment challenge
Sponsored by: TechTarget ComputerWeekly.comWith a tolerant professional culture, the UAE is becoming the technological hub of the Middle East, but lacks a strong technological workforce. Access this expert e-zine to see how these Middle Eastern organizations are bringing in new employees, and see what similar tactics your organization could use in your recruitment efforts as well.
-
A Computer Weekly Buyers Guide to 5G
Sponsored by: TechTarget ComputerWeekly.comDespite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
-
Taking stock of database technologies
Sponsored by: TechTarget ComputerWeekly.comDatabase technologies have evolved over decades, from relational databases to NoSQL databases that make it easier to store & handle data in the cloud. In this e-guide, how organisations are addressing database management challenges & how Alibaba is using cloud-native databases to reduce downtime in its annual Singles' Day sales.
-
Computer Weekly – 6 September 2022: Out with the old at Asda
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.
-
MicroScope – April 2023: The benefits of security accreditations
Sponsored by: MicroScopeIn this month's MicroScope ezine, we look at how industry-recognised certifications can strengthen business defences. We also see how ChatGPT offers the channel a chance to level the playing field. Read the issue now.
-
Jargon Buster Guide to Container Security
Sponsored by: TechTarget ComputerWeekly.comThe definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
-
IAM: Key to security and business success in the digital era
Sponsored by: TechTarget ComputerWeekly.comAs more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
-
A Guide to Writing Great B2B Email Copy
Sponsored by: TechTargetLearn how to write effective B2B email copy that resonates with your target audience. This TechTarget guide covers best practices for crafting compelling subject lines, email body copy, and calls-to-action. Read the full white paper to enhance your email marketing strategy.
-
The Total Economic ImpactTM Of Veeam with AWS
Sponsored by: Veeam SoftwareThe purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Veeam with AWS on their organizations.
-
A Computer Weekly buyer's guide to compliance, risk and governance
Sponsored by: TechTarget ComputerWeekly.comManaging data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach