Search Results for "open group computer weeklystart=20start=10start=30start=10"
-
A Computer Weekly buyer's guide to continuous integration and continuous deployment
Sponsored by: TechTarget ComputerWeekly.comContinuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.
-
Spark Muscles Into Big Data Processing
Sponsored by: TechTarget Data ManagementArmed with data processing, streaming and machine learning capabilities, the multitalented Apache Spark architecture is becoming a force in its own right.
-
A Computer Weekly buyer's guide to next-generation retail technology
Sponsored by: TechTarget ComputerWeekly.comCustomers' shopping habits were changing long before the coronavirus pandemic accelerated the e-commerce boom. In this 18-page buyer's guide, Computer Weekly looks at the tech innovations retailers are using to adapt and better serve customers.
-
It's hyper converged-with-everything in today's datacentre
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at the key hyper-converged vendors and their products, as well as hyper-converged tailored to disaster recovery, backup, cloud functionality, and the software-defined hyper-converged products available.
-
How SMEs Can Break Free of AD’s Limitations Without Ditching AD
Sponsored by: JumpCloudDiscover how SMEs can modernize Active Directory without ripping and replacing it. This e-book explores the limitations of AD and Azure AD, and how to integrate a cloud-based directory platform to gain flexibility, security, and the freedom to adapt. Read the full e-book to learn more.
-
6 Steps to AI-Ready Data
Sponsored by: AlteryxIs your data ready for AI? This comprehensive guide will walk you through the six essential steps to ensure your data is clean, consistent, and ready for advanced AI tools. Don’t let your data hold you back from AI. Download the e-book and get your data AI-ready today!
-
Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
Sponsored by: XtelligentMedia HealthcareThe collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.
-
CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?
Sponsored by: TechTarget ComputerWeekly.comAccording to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
Flexible & Secure Edge Application Infrastructure from SUSE & HPE
Sponsored by: SUSEIn today’s app dev climate, long development cycles are no longer a viable option.With organizations operating closer to real-time than ever before, the edge is now paramount. Download this white paper to see how SUSE provides trusted open-source Linux, Kubernetes via Rancher, and security tools.