Search Results for: Master

CHAPTER 15: Working with the Command-Line Interface
Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.

McGraw Hill

Authentication Best Practices: On and Off the Cloud
Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.

HID Global

Containers in the enterprise: Use cases and latest developments
In this e-guide we delve into the world of containers. We discover why many enterprises appear to be intent on using the technology to support the remodelling of their legacy applications in microservices. Also, we take a look at why interest in containers has risen thanks to enterprises moving from hybrid and multi-cloud environments.

TechTarget ComputerWeekly.com

Securing The Entire Software Development Pipeline With Veracode Static Analysis
Developers need security testing solutions that can keep pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.

TOPICS: .NET
Veracode

Reliability Keeping The Trains On Track
In 2018, with the advent of the Commonwealth games, Queensland Rail expected 1.5 million visitors to descend on the state. In response Schneider Electric was tasked with designing a new substation using a range of solutions based on EcoStruxure Power. Download the full case study to learn more.

TOPICS: .NET
Schneider Electric

E-government benchmark 2016
The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.

TechTarget ComputerWeekly.com

Data classification tools: What they do and who makes them
Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.

TechTarget ComputerWeekly.com

Case Study: CIO interview - Stephen Docherty on NHS data sharing
The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

TechTarget ComputerWeekly.com

Spotlight on the Nordics: Artificial Intelligence
In this e-guide we explore how artificial intelligence is going to play a key role in the future of the Nordics. We discuss whether AI is truly a threat to humans in terms of the future of work, how AI can benefit humans in the future and how the Finnish government is backing a national AI development strategy.

TechTarget ComputerWeekly.com

Data protection, a live issue that affects us all
Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.

TechTarget ComputerWeekly.com