ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30start=10"

  • 3 Steps to Calculate Total Enterprise IT Energy Consumption Using DCIM

    Sponsored by: Schneider Electric

    Download this white paper for a straightforward, “how to get started” guide that identifies the fundamental data points to start with and gives a simple 3-step framework to start measuring the environmental impact of the IT estate.

  • Cybersecurity for Medical Devices in a Connected Healthcare System

    Sponsored by: Wind River

    As healthcare systems become more connected, cybersecurity for medical devices is critical to mitigate risks. This white paper examines the key considerations for implementing an effective security strategy throughout the device lifecycle. Read the full white paper to learn more.

  • 10 Properties Of Secure Medical Systems

    Sponsored by: Wind River

    This white paper outlines 10 key security principles for designing secure medical systems, including data encryption, secure boot, hardware partitioning, and input validation. Implementing these principles can help protect against cyberattacks and safeguard patient health. Read the full white paper to learn more.

  • The great IAM - time to modernise?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?

  • CIO Trends #9: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue find out how blockchain is being tried out in Saudi Arabia to enable consumers to use their faces and blockchain-based apps to withdraw money from cash machines, rather than inserting PINs. Also, read how the UAE's Etihad Airways is working to use AI to help it better engage with staff and benefit from their knowledge and ideas.

  • MicroScope - December 2021: Valuing the MSP

    Sponsored by: MicroScope

    In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

  • Cloud backup vs traditional backup

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.

  • How to Evaluate Threat Intelligence Feeds

    Sponsored by: ReversingLabs

    Know When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.

  • Why high-performing organizations prioritize flexible delivery

    Sponsored by: ServiceNow

    In this analyst report, find out why hybrid approaches have become king in the modern workplace… and why flexible delivery is becoming the difference maker for leading organizations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.