Search Results for "open group computer weeklystart=20start=10start=30"
-
Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.
-
Scaling smart: Leveraging AWS for cost-effective growth
Sponsored by: AWSThe data of a startup offers immense value. Read the new ebook, "Scaling Smart: Leveraging AWS for cost-effective growth" to learn how you can create a cost-effective data strategy on AWS that delivers quantifiable value and supports business growth and innovation.
-
A Computer Weekly buyer's guide to customer and employee experience management
Sponsored by: TechTarget ComputerWeekly.comBusinesses are facing new challenges to meet the expectations of customers and employees. In this 14-page buyer's guide, Computer Weekly looks at the benefits of the experience economy, the customer service implications of always-on mobile users and how digital platforms can engage customers across all channels.
-
A Computer Weekly buyer's guide to applications of next-generation networking
Sponsored by: TechTarget ComputerWeekly.comThe race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses
-
Smart-UPS Modular Ultra
Sponsored by: Schneider ElectricAPC's Smart-UPS Modular Ultra offers scalable power in a compact design. Features include 20kW capacity, 2.5x power in half the size, lithium-ion batteries with 3x lifespan, and modularity. Ideal for edge environments and data centers, the next-gen UPS ensures resiliency and uptime. See the full product overview for specs and options.
-
Computer Weekly – 23 June 2020: How the Chelsea Flower Show blossomed as an online-only event
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the digital team at the Royal Horticultural Society about delivering the first online-only Chelsea Flower Show. With all the talk about the consumer uses of 5G, we look at how it could benefit enterprise IT. And we examine the best practice in managing SAP systems during lockdown, Read the issue now.
-
Computer Weekly – 23 June 2020: How the Chelsea Flower Show blossomed as an online-only event
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the digital team at the Royal Horticultural Society about delivering the first online-only Chelsea Flower Show. With all the talk about the consumer uses of 5G, we look at how it could benefit enterprise IT. And we examine the best practice in managing SAP systems during lockdown, Read the issue now.
-
Top 10 cyber security stories of 2021
Sponsored by: TechTarget ComputerWeekly.comCyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
Hacking the Human Operating System
Sponsored by: TechTarget ComputerWeekly.comCyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.