ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"

  • Enabling autonomous identity security as a modern approach to IGA

    Sponsored by: SailPoint Technologies

    Managing identities was simpler when you only had to worry about user profiles, but What if machine identities could manage themselves, without presenting a risk for security? Autonomous identity security combines automation with IGA practices to create a system that manages access without the need for human input. Read on to learn more.

  • Non-employee Identity Security And Lifecycle Management

    Sponsored by: SailPoint Technologies

    Organizations utilize non-employee workers and services to supplement their workforce, but each of these non-employee entities presents an increase in third-party risk. This white paper explores how non-employee identities present new demands to organizations’ existing authentication systems and protocols. Read on to learn more.

  • Jargon Buster Guide to Post Quantum Cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

  • Top Methods To Modernize and Balance Your Infrastructure

    Sponsored by: Service Express

    According to the latest State of the Data Center Report, 83% of respondents are repatriating workloads from the cloud back to on-premises data centers and colocations, with a close eye on evaluating costs. Discover how to strike a balance between cloud and DC investments by downloading this e-book.

  • Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.

  • A Computer Weekly buyer's guide to multicloud

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise's shift towards multicloud is ever-increasing. Computer Weekly looks at the importance of software-defined wide area networks in successful migration, the complications that come with juggling clouds and Microsoft's journey into multicloud support.

  • CW Middle East – January 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Middle East ezine, we look at how the Middle East, with the poorest road safety record in the world, could benefit most from self-driving cars.

  • Computer Weekly – 23 July 2024: Serving up a GenAI experience at Wimbledon

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at Wimbledon to find out how technology is improving the tennis experience for fans. We talk to Meta's AI research chief about the challenges and opportunities of large language models. And we find out why cloud databases are becoming increasingly popular. Read the issue now.

  • Transform Your Business With A Trusted Cloud Partner

    Sponsored by: Virtusa

    To achieve the desired outcomes of a cloud migration, organizations must create a detailed strategy that identifies the most efficient path to modernization. In this e-book, you’ll discover a streamlined approach to migration designed to ensure a smooth, effective cloud transition. Read on to learn how you can make the most of your migration.

  • Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.