Search Results for: Master

A Guide for Identity Governance and Administration Programs
Organizations are rapidly accruing new digital identities, leading to a demand for more sophisticated identity security. This white paper presents a guide for IGA programs, showing you how to implement an IGA program from beginning to end. Download the guide now to learn more.

TOPICS: .NET
One Identity

PLM in your pocket handy and smart business processes via app
Discover how manufacturing companies can use app technology to centralize business processes and minimize complexity. Learn how the PRO.FILE FLEX app enables mobile access to PLM functions and information for increased efficiency and flexibility. Read the White Paper to learn more.

Revalize

Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

TechTarget ComputerWeekly.com

Computer Weekly – 2 August 2022: How to create a datacentre capacity plan
In this week's Computer Weekly, planning datacentre capacity is a growing challenge – we ask the experts for the latest best practice. Victims of the Post Office IT scandal explain why they think they were targeted for speaking out. And we look at the digital skills gap in retail and find out how employers can source talent. Read the issue now.

TechTarget ComputerWeekly.com

CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off
Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to graph databases
In this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.

TechTarget ComputerWeekly.com

Dash to Flash
It's time for flash Users have started to move towards flash storage in serous numbers and now is the time for the channel to get behind the technology

MicroScope

CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital
Heineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.

TechTarget ComputerWeekly.com

Enterprise cloud applications – can we trust them?
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.

TechTarget ComputerWeekly.com

Royal Holloway: Corporate under-reporting of cyber crime
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.

TechTarget ComputerWeekly.com