ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=30start=10start=30start=20"

  • Under new cloud management: What the future holds for AWS

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the challenges facing AWS in greater detail, while also taking a closer look at what the future might hold for AWS under the charge of its new CEO, and how its customers are choosing to consume its technology in 2021.

  • Top 10 information management stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Consolidation and acquisition marked the supplier side of the IT industry in respect of information management in 2019. The question of how modern BI and analytics software shapes up to nonrelational big data is addressed. Here are Computer Weekly's top 10 information management stories of 2019.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: TechTarget ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • Computer Weekly – 3 September 2019: From IT disaster to digital innovation at RBS

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we meet the man brought in to turn around the technology at RBS Group after its catastrophic IT outage. We examine the latest best practice in securing mobile devices in the enterprise. And we look at progress towards "passwordless" security. Read the issue now.

  • Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.

  • Building a Cyberresilient Data Recovery Strategy

    Sponsored by: Veeam Software

    Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.

  • Computer Weekly – 23 July 2024: Serving up a GenAI experience at Wimbledon

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at Wimbledon to find out how technology is improving the tennis experience for fans. We talk to Meta's AI research chief about the challenges and opportunities of large language models. And we find out why cloud databases are becoming increasingly popular. Read the issue now.

  • Automating routine IT tasks smartly

    Sponsored by: TechTarget ComputerWeekly.com

    From simple scripts to programmable infrastructure, automation saves IT admins a huge amount of time repeating tasks. Additionally, machine learning be used to understand normal application behaviour and take actions automatically if things are out of kilter. But sometimes a simpler approach is all that is needed.

  • Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.