ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "open group computer weeklystart=20start=10start=30start=10"

  • Red Hat State Of Linux In The Public Cloud

    Sponsored by: Red Hat

    More and more workloads are moving to public cloud environments, sparking a desire to learn why it is seen as beneficial, and what strategies these new cloud adopters are using to ensure success. Explore these discussions further in this Red Hat research report.

  • Key Considerations for Securing Different Non-human Identities

    Sponsored by: CyberArk

    Today's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.

  • Mapping and Reducing Scope 3 Emissions

    Sponsored by: GEP

    Today, procurement organizations face a handful of pressing sustainability issues, the most formidable of them being scope 3 emissions. So, how can companies best address these problems and build an effective, end-to-end emissions reduction framework? Browse this white paper to learn more.

  • Hyperconverged Reference Architecture

    Sponsored by: Panduit

    In this e-book, explore Panduit’s proposals of foundational reference architecture utilizing a Dell Technologies configuration and validated Panduit physical infrastructure components.

  • How To Modernize Your Data For A Resilient And Efficient Manufacturing System

    Sponsored by: T-Systems

    In this whitepaper, you’ll discover how advanced data management and data analysis technologies enable manufacturers to leverage their data treasures to increase the resilience of their manufacturing systems and supply chains and make them safe and secure for the future. Read on to learn how you can make the most of your manufacturing data.

  • Reducing Risk And Improving Security Of Cloud Deployments: Why Choose Vendor-Supported Linux Over Self-Supported Linux

    Sponsored by: Red Hat

    Discover in this IDC white paper how Red Hat Enterprise Linux can support your organization with a performance-rich, secure, and flexible foundational component for your infrastructure stacks no matter where they are deployed

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    Sponsored by: TechTarget ComputerWeekly.com

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

  • Top 10 ASEAN IT stories of 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Despite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.

  • Data protection: Not just about personal data and compliance

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.