ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • MicroScope E-Zine: January 2017

    Sponsored by: MicroScope

    Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.

  • Computer Weekly – 28 November 2023: Datacentres or green belt? Why the UK has to choose

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the minefield around datacentre planning permission across the UK, after government blocked a major development next to the M25. The metaverse is making inroads into the industrial world – is this the real future for the technology? And we analyse the trends changing the app market. Read the issue now.

  • A 7-Step Risk Assessment Framework For Cybersecurity Professionals

    Sponsored by: VikingCloud

    Cybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.

  • A Computer Weekly buyer's guide to operational IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.

  • Leading A Lean Portfolio

    Sponsored by: Atlassian

    In this paper, you’ll learn about the five important shifts that portfolio managers must make as they move to a lean approach to planning, funding, and tracking product development work. Read the full paper now.

  • Key Considerations for Securing Different Non-human Identities

    Sponsored by: CyberArk

    Today's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.

  • Fast-track AI innovation with solutions from AWS and NVIDIA

    Sponsored by: Amazon Web Services

    This eBook explores how leveraging the latest advancements from AWS and NVIDIA helps build performant, optimized solutions while controlling costs.

  • E911: The Ultimate Guide To Compliance

    Sponsored by: Sinch

    Today, 80% of 911 calls are made from mobile devices, it can be difficult to pinpoint a caller’s location. So, how can emergency services revamp their telecom while ensuring their compliance with new E911 laws? Access this white paper to learn more.

  • February ezine: Look to the future

    Sponsored by: MicroScope

    An issue with plenty of predictions about what the year ahead holds for the channel

  • A Computer Weekly buyer's guide to secure and agile app development

    Sponsored by: TechTarget ComputerWeekly.com

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.