ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"

  • Towards software-defined and cloud-native networking

    Sponsored by: TechTarget ComputerWeekly.com

    As networking equipment rapidly evolves to being software-defined and cloud-native, there is pronounced interest in products and services to accelerate service delivery, improve end-user experiences, and reduce infrastructure and operational costs in service delivery applications. Read more in this e-guide.

  • Atlassian Cloud Architecture And Operational Practices

    Sponsored by: Atlassian

    This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.

  • Recommended Inventory for Data Center Scope 3 GHG Emissions Reporting

    Sponsored by: Schneider Electric

    In this paper, explore the FAQs of Scope 3 emissions and discover the inventory of 9 emissions source categories and their data center-specific subcategories for accounting and reporting.

  • Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.

  • Disaster recovery has never been so easy or important

    Sponsored by: TechTarget ComputerWeekly.com

    Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.

  • The Threat Prevention Buyer’s Guide

    Sponsored by: Zscaler

    This Threat Prevention Buyer's Guide explores the evolving security landscape, emphasizing the need for cloud-native sandboxing that can detect and prevent unknown threats inline without disrupting user productivity. Learn how to choose the right cloud sandbox solution. Read the full buyer's guide.

  • Computer Weekly Buyer's Guide to SD-WAN services

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at howSD-WAN effectively removes telcos' lock-in, the ways hybrid deployment hinges on the network, and the flexibility demanded by cloud-based workloads.

  • A Computer Weekly e-guide to SASE

    Sponsored by: TechTarget ComputerWeekly.com

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

  • A Computer Weekly Buyer's Guide to Internet of Things Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.