Search Results for: Business-Continuity

Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal
In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.

TechTarget ComputerWeekly.com

Remotely Accessing Client Files Securely and Confidentially
Legal firms are bound by ethical and legal regulations to protect and secure confidential data files. So what does a legal firm do when it needs to access client files remotely? Discover how TruGrid’s SecureRDP helps provide remote file access without impacting security and confidentiality in this case study.

TOPICS: .NET
TruGrid

The CISO's guide to supply chain security
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Next-Generation Storage
Storage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.

TechTarget ComputerWeekly.com

A CISO's Guide to AI in 2024
While generative AI has garnered much attention, it only represents a fragment of the rapidly evolving AI landscape. Security teams have recognized the potential AI has to transform cybersecurity, highlighted by the 92% of organizations that intend to use AI and machine learning to support cyber security. Download this e-book to learn more.

TOPICS: .NET
Checkpoint Software Technologies

The rise of edge computing
The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture

TechTarget ComputerWeekly.com

7 trends shaping the future of tax
This e-book explores 7 key trends shaping the future of tax, including the explosion in data sharing, use of AI against tax agencies, and the need to get tax right the first time. Inside, you’ll discover how tax agencies can leverage data and analytics to tackle these challenges and more. Read the full report now to learn more.

TOPICS: .NET
SAS

Top 10 ASEAN IT stories of 2017
In this review of the top 10 Computer Weekly articles on IT in ASEAN, we look at what countries across the region are doing to drive adoption of emerging technologies such as artificial intelligence (AI) and the internet of things (IoT), raise their cyber security capabilities amid growing cyber threats, and draw more women into the IT industry.

TechTarget ComputerWeekly.com

Transform your Applications
Azure Red Hat OpenShift provides a unified, cloud-based application platform to modernize apps, build cloud-native services, and accelerate innovation. Unlock new business possibilities with expert-managed hybrid cloud services. Read the full white paper to learn more.

Red Hat

Transform your applications with Red Hat OpenShift Service on AWS
Discover how to modernize your applications and IT operations with a hybrid cloud platform. Learn to rapidly build, deploy, and manage cloud-native apps across on-premises and cloud environments. Read the e-book to unlock new business possibilities.

Red Hat