ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=20start=10start=30start=20start=20"

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.

  • MicroScope: Chart course to Covid-19 recovery

    Sponsored by: MicroScope

    Customers have had to react to changes caused by the pandemic, so what decisions have they made in the past year? In this issue, we explore how businesses have adapted to the new normal, different approaches to remote working, and take a look at the challenge of sustainability

  • A Guide to a BYOD Enabled Conference Room

    Sponsored by: Shure Inc

    Hybrid work remains standard, challenging businesses to ensure their conferencing technology fosters collaboration and smooth experiences. To do so, many businesses are adopting a bring-your-own-device (BYOD) model for their conference rooms. Browse this white paper to access a shopping list for creating a BYOD conference room for your company.

  • Computer Weekly – 4 April 2023: Revitalising UK digital government

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.

  • Computer Weekly – 21 February 2023: Innovation not infestation – digitising pest control

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Rentokil Initial is using digital innovations to improve the age-old task of pest control. Leading experts offer a 15-point plan to improve diversity and inclusion in IT. And with all the excitement around ChatGPT, we ask whether business is ready to use the AI chatbot. Read the issue now.

  • Powering down: Keeping datacentre energy costs in check

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the outside influences that could potentially impact on datacentre power and management costs in the years to come, while also taking a closer look at some of the latest thinking and best practices around datacentre energy efficiency and cooling today.

  • Computer Weekly - 9 August 2022: Eurotunnel's digital journey for the realities of post-Covid travel

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the travel industry was devastated by the pandemic, but we find out how Eurotunnel is turning to digital to better engage customers in the post-Covid world. We examine the impact of the economic slowdown on the tech giants. And we explain all you need to know about data gravity. Read the issue now.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.