Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
MicroScope E-Zine: January 2017
Sponsored by: MicroScopeIs the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.
-
Computer Weekly – 28 November 2023: Datacentres or green belt? Why the UK has to choose
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the minefield around datacentre planning permission across the UK, after government blocked a major development next to the M25. The metaverse is making inroads into the industrial world – is this the real future for the technology? And we analyse the trends changing the app market. Read the issue now.
-
A 7-Step Risk Assessment Framework For Cybersecurity Professionals
Sponsored by: VikingCloudCybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.
-
A Computer Weekly buyer's guide to operational IT
Sponsored by: TechTarget ComputerWeekly.comIn this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.
-
Leading A Lean Portfolio
Sponsored by: AtlassianIn this paper, you’ll learn about the five important shifts that portfolio managers must make as they move to a lean approach to planning, funding, and tracking product development work. Read the full paper now.
-
Key Considerations for Securing Different Non-human Identities
Sponsored by: CyberArkToday's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.
-
Fast-track AI innovation with solutions from AWS and NVIDIA
Sponsored by: Amazon Web ServicesThis eBook explores how leveraging the latest advancements from AWS and NVIDIA helps build performant, optimized solutions while controlling costs.
-
E911: The Ultimate Guide To Compliance
Sponsored by: SinchToday, 80% of 911 calls are made from mobile devices, it can be difficult to pinpoint a caller’s location. So, how can emergency services revamp their telecom while ensuring their compliance with new E911 laws? Access this white paper to learn more.
-
February ezine: Look to the future
Sponsored by: MicroScopeAn issue with plenty of predictions about what the year ahead holds for the channel
-
A Computer Weekly buyer's guide to secure and agile app development
Sponsored by: TechTarget ComputerWeekly.comAs apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding