7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER:
Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006
|
|
|
Managing Storage: Trends, Challenges, and Options
sponsored by EMC Corporation
WHITE PAPER:
With the explosion of data, storage environments are becoming more complex. Poorly designed storage infrastructures are putting companies at risk. Download this study to learn how storage managers built stronger storage management teams and environments.
Posted: 31 Jul 2006 | Published: 01 Jul 2006
|
|
|
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server
sponsored by Veritas
WHITE PAPER:
Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...
Posted: 19 Nov 2007 | Published: 01 Mar 2007
|
|
|
Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER:
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008
|
|
|
The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER:
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008
|
|
|
UI Health Case Study Snapshot
sponsored by Panduit
CASE STUDY:
Discover in this case study how Panduit’s Overhead Power Distribution System helped UI Health overcome the power distribution and server hardware challenges that many data centers are facing today.
Posted: 08 Mar 2024 | Published: 08 Mar 2024
|
|
|
Smartbear BugSnag
sponsored by SmartBear Software
PRODUCT OVERVIEW:
Ensure seamless customer experiences in financial apps with comprehensive observability. BugSnag provides actionable insights into real-time errors and performance issues, helping you prevent business-critical problems, maintain security while scaling, and increase developer productivity. Read the full product overview to learn more.
Posted: 05 Nov 2024 | Published: 06 Nov 2024
|
|
|
AI tools for software developers: Part One
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?
Posted: 08 Feb 2021 | Published: 11 Jun 2019
|
|
|
A guide to developing modern mobile applications
sponsored by TechTarget ComputerWeekly.com
EBOOK:
A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.
Posted: 08 Feb 2022 | Published: 08 Feb 2022
|
|
|
Decoupled Applications and Composable Web Architectures
sponsored by Storyblok GmbH
WHITE PAPER:
As organizations continue to adopt and develop their cloud technology, many are focusing on updating their web architectures and applications from monolithic software to something more composable. However, this is easier said than done. Browse this report to learn more.
Posted: 19 Oct 2023 | Published: 19 Oct 2023
|
|
|
Develop train test and deploy ML across the hybrid cloud
sponsored by Red Hat
PRODUCT OVERVIEW:
Discover in this product overview how Red Hat OpenShift AI can help your team develop, train, test, and deploy ML across the hybrid cloud without being dragged down by limited architectural choices.
Posted: 24 Apr 2024 | Published: 24 Apr 2024
|
|
|
Upgrade or rework: Pathway to application modernisation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
If there is one certainty in IT, it is that at some point, every shiny new application will become legacy. The tech sector is driven by a fast cadence of innovation, which means that last year's "must have" phenomenon quickly becomes stale and out-of-date. In this e-guide, we explore the different approaches to modernising outdated IT systems.
Posted: 27 Jul 2021 | Published: 27 Jul 2021
|
|
|
Securing Identities Across the Software Supply Chain and Development Environments
sponsored by CyberArk
WHITE PAPER:
This whitepaper addresses questions raised by security leaders that want to better understand their organization’s development environments, the risks development tools expose and the best practices and approaches for securing them, across the software supply chain. Download now to learn more.
Posted: 25 Sep 2024 | Published: 25 Sep 2024
|
|
|
Three Proven Tips for Delivering Full-Stack Scalable Apps at Speed
sponsored by AWS
EBOOK:
Full-stack development makes it simple with complete ownership and end-to-end visibility—so your teams can accelerate time to market, increase agility, and realize greater cost efficiency. Speed up the development of mobile and web applications with:Modern tools and frameworksModern APIsModern compute
Posted: 01 May 2024 | Published: 01 May 2024
|
|
|
A Computer Weekly buyer's guide to the future of collaboration
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Businesses are using collaborative software to operate in revolutionary new ways. In this 13-page buyer's guide, Computer Weekly looks at its potential negatives, the improved agility it provides and assesses Chromebooks as collaboration clients
Posted: 08 Feb 2021 | Published: 25 Oct 2018
|
|
|
Next stage of virtualisation: Containers
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.
Posted: 08 Feb 2021 | Published: 03 Apr 2017
|
|
|
Computer Weekly – 19 July 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
|
Driving a Brownfield SAP S/4HANA Transformation with Confidence
sponsored by Basis Technologies
EBOOK:
Discover best practices for driving a successful SAP S/4HANA transformation, especially for enterprises with complex, customized Brownfield landscapes. Learn how to minimize risk, accelerate delivery, and unlock the full potential of your SAP investment. Read the research content to get started.
Posted: 10 Jul 2024 | Published: 10 Jul 2024
|
|
|
Digital Industries Software Digital Execution Manual
sponsored by Siemens
EBOOK:
This 21-page e-book breaks down how to transform your application development practice and accelerate digital transformation. Read on to discover the elements of digital execution – and much more.
Posted: 09 Aug 2024 | Published: 13 Aug 2024
|
|
|
A Smarter Way to Secure Apps: The Power of Veracode Fix
sponsored by Veracode
WHITE PAPER:
While incorporating security into the development process makes sense in theory, the reality is that in the turmoil of development, security is often the first corner cut to save time. Veracode Fix emerges as a critical tool in the arsenal of application development teams and application security managers. Read on to learn more.
Posted: 03 Apr 2024 | Published: 03 Apr 2024
|
|
|
CW Middle East - January-March 2021: $60m venture capital fund targets 120 startups
sponsored by TechTarget ComputerWeekly.com
EZINE:
Countries in the Middle East see technology as an industry of the future and are investing heavily in the sector as part of their economic diversification plans. Read in this issue how the latest development will see a $60m venture capital fund, based in Bahrain, invest in 120 early-stage startups across the Middle East region.
Posted: 08 Feb 2021 | Published: 14 Jan 2021
|
|
|
Computer Weekly - 15 September 2020: How data has helped in the fight against coronavirus
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the Office for National Statistics about the important role data plays in the battle against Covid-19. We also look at the speedy deployment of the Scottish contact-tracing app and report on a discussion about the UK government's delayed response to its digital identity consultation. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Sep 2020
|
|
|
Integrate and simplify production AI with Intel and Red Hat
sponsored by Red Hat and Intel
PRODUCT OVERVIEW:
Despite attractive benefits, a high AI/ML project failure rate remains, with many experiencing real challenges moving projects from concept to production. Download this product overview to understand how Intel and Red Hat can help you face these challenges directly and rapidly operationalize your AI/ML models.
Posted: 19 Mar 2024 | Published: 19 Mar 2024
|
|
|
Enterprise Buyer’s Guide for Secrets Detection
sponsored by GitGuardian
BUYER'S GUIDE:
This buyer's guide outlines 10 key considerations for choosing a secrets detection platform to secure your software supply chain. Learn how to gain complete visibility, implement effective detection, streamline remediation, and empower developers. Read the full guide to strengthen your secrets security posture.
Posted: 10 Oct 2024 | Published: 10 Oct 2024
|
|
|
Computer Weekly – 12 November 2019: The importance of digital accessibility
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine what retailers need to do to make their digital channels accessible for disa-bled people. We look at the rise of alternative desktop productivity tools to Microsoft Office. And our new buyer's guide covers next-generation programming tools such as no-code/low-code development. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Nov 2019
|
|
|
Windows 10: How the client operating system is evolving
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.
Posted: 08 Feb 2021 | Published: 26 Nov 2020
|
|
|
7 Reasons Rancher is the Enterprise Container Management Platform You Need
sponsored by SUSE
EBOOK:
Container adoption is surging, and Kubernetes has become the go-to for managing container workloads. Yet, Kubernetes' complexity at scale is daunting. This white paper delves into how Rancher simplifies Kubernetes deployment and management. Read the white paper for 7 reasons why you should consider Rancher for your container management.
Posted: 30 Apr 2024 | Published: 30 Apr 2024
|
|
|
Our Top 5 Vulnerable Open Source Components
sponsored by Sonatype
WHITE PAPER:
Software dependencies can equal open-source vulnerabilities. To empower your developers in leveraging open-source components while mitigating risk, read this white paper. Inside, Sonatype evaluates the top 5 open-source components, their vulnerabilities, and remediation recommendations.
Posted: 14 Mar 2024 | Published: 14 Mar 2024
|
|
|
Jargon Buster Guide to Container Security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 08 Feb 2021 | Published: 19 Feb 2019
|
|
|
Computer Weekly – 9 October 2018: NHS app marks a new era for UK health service
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the long-awaited mobile app from the NHS and ask what it means for a digital health service. We hear from early experimenters of blockchain to find out what it will take for the technology to be enterprise-ready. And we analyse the impact of M&A on corporate networks. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 Oct 2018
|
|