ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=20start=10start=30start=20start=20"

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • A Computer Weekly buyer's guide to optimising storage

    Sponsored by: TechTarget ComputerWeekly.com

    The implementation of effective storage optimisation has becomean important factor in business. In this 12-page buyer's guide,Computer Weekly looks at cost implications, the hyper-convergedinfrastructure minefield and the alternatives to shared storage

  • CW Benelux May 2018

    Sponsored by: TechTarget ComputerWeekly.com

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

  • Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.

  • The State of ‘Security by Design’

    Sponsored by: Brivo

    Is security an afterthought in building design? In order to answer this question and understand the state of security by design, Brivo commissioned a study involving 800 decision-makers deeply entrenched in the realms of architectural or engineering processes. Read on to learn more.

  • EU data protection: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.

  • Preparing For 2027: Driving Health Equity With Inclusive Member Education

    Sponsored by: Wolters Kluwer

    As healthcare shifts to address equity, payers must collect data, engage members, and collaborate with providers to meet new CMS Health Equity Index requirements by 2027. Learn strategies to prepare and drive better outcomes in this white paper.

  • Optimizing Your Architecture for AI Innovation

    Sponsored by: InterSystems

    Read on to discover the essential strategies to overcome the AI skills gap, and find out how InterSystems can help you uncover what may be holding your AI initiatives back.

  • Enterprise Buyer’s Guide for Secrets Detection

    Sponsored by: GitGuardian

    This buyer's guide outlines 10 key considerations for choosing a secrets detection platform to secure your software supply chain. Learn how to gain complete visibility, implement effective detection, streamline remediation, and empower developers. Read the full guide to strengthen your secrets security posture.

  • MicroScope – May 2023: Vendors need to listen and learn

    Sponsored by: MicroScope

    In this month's MicroScope ezine, we look at why it is vital that vendors listen to partners and act on the feedback. We also look at what's next for HP's advancing sustainability programme, Amplify Impact. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.