ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"

  • Jargon buster guide to database management

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.

  • Computer Weekly –25 April 2017: Blockchain expands reach beyond finance

    Sponsored by: TechTarget ComputerWeekly.com

    Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.

  • Open Your Poss Ibilities with Red Hat and Google Cloud

    Sponsored by: Red Hat

    Learn how Red Hat and Google Cloud can help you build a flexible, secure, and efficient hybrid cloud environment to support your business. Download this white paper to discover strategies for modernizing your IT infrastructure, automating your operations, and accelerating application development.

  • CW Middle East: UAE faces IT recruitment challenge

    Sponsored by: TechTarget ComputerWeekly.com

    With a tolerant professional culture, the UAE is becoming the technological hub of the Middle East, but lacks a strong technological workforce. Access this expert e-zine to see how these Middle Eastern organizations are bringing in new employees, and see what similar tactics your organization could use in your recruitment efforts as well.

  • Apple Device Security

    Sponsored by: JAMF

    A cyberattack or an accidental malware download can mean the difference between a productive day and all work grinding to a halt. At the heart of these security concerns is the employee device, and this white paper outlines a guide to Apple Device Security for beginners so that you can prevent a security incident. Read on to learn more.

  • CW Europe – March 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.

  • VMworld 2019 Europe: Where next for VMware?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, check out ourround-up of some of the biggest announcements VMware made at this year's VMworld US 2019 conference, as part of a countdown towards its European conference in November 2019.

  • The Modern IT Professional’s Guide To Shadow IT

    Sponsored by: Auvik Networks, Inc.

    Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Sponsored by: TechTarget ComputerWeekly.com

    Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Sponsored by: TechTarget ComputerWeekly.com

    Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.