ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.

  • Top 10 cloud stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.

  • Build An Efficient IT Foundation For Modern Business Success

    Sponsored by: Red Hat

    This Red Hat white paper outlines a five-step approach to modernize your IT infrastructure. The first step? Standardize your IT for consistency. Discover the next 4 steps in this white paper.

  • The Business Value of Google Cloud IaaS

    Sponsored by: Google Cloud & AMD

    In this IDC white paper, discover how Google IaaS can help your organization realize significant business value and a 318% 5-year return on investment.

  • The Business Value of Google Cloud IaaS

    Sponsored by: Google Cloud And Intel

    In this IDC white paper, discover how Google IaaS can help your organization realize significant business value and a 318% 5-year return on investment.

  • Enterprise Buyer’s Guide for Secrets Detection

    Sponsored by: GitGuardian

    This buyer's guide outlines 10 key considerations for choosing a secrets detection platform to secure your software supply chain. Learn how to gain complete visibility, implement effective detection, streamline remediation, and empower developers. Read the full guide to strengthen your secrets security posture.

  • CW ANZ: Trend Watch - communications infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how Australia's bushfires impacted its telecoms networks and the increase in SD-WAN adoption in Asia-Pacific

  • Getting Cloud Security Right

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

  • Gamma International: The Macedonia files

    Sponsored by: TechTarget ComputerWeekly.com

    This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

  • MicroScope – September 2022: The green agenda

    Sponsored by: MicroScope

    Sustainability is now seen as a necessity for business to have on their agenda, so read about how the channel is turning green to capture customer attention. Also discover how the pandemic has changed sales forever and boosted the importance of relationships, as well as learn about how to handle currency fluctuations, rises and inflation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.