Information Security Ezine- Europe
sponsored by SearchSecurity.co.UK
EZINE:
This e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.
Posted: 02 Jun 2011 | Published: 02 Jun 2011
|
|
|
IBM Service Management for the Intelligent Utility Network
sponsored by IBM
WHITE PAPER:
The current utilities environment requires companies to decrease costs while increasing the ability to control utility assets. One key challenge is how to take advantage of new technologies to better manage the delivery of service to customers today and into the future. IBM Service Management for the IUN provides a blueprint for getting started.
Posted: 06 Dec 2010 | Published: 06 Dec 2010
|
|
|
E-Book: NERC Compliance
sponsored by SearchSecurity.com
EBOOK:
SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010
|
|
|
EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by Globalscape
WHITE PAPER:
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012
|
|
|
CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by ComputerWeekly.com
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 23 Oct 2020 | Published: 12 Nov 2020
|
|
|
Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST:
Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020
|
|
|
Oracle License Management & Optimization Services
sponsored by MetrixData 360
WHITE PAPER:
Oracle’s value to many businesses is impossible to understate—as is how much some businesses are spending on their Oracle Licenses. But do you always need to spend so much money? Access this self-assessment to simulate an Oracle internal license audit and start reducing your Oracle budget without sacrificing effectiveness.
Posted: 17 Dec 2020 | Published: 17 Dec 2020
|
|
|
Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre
sponsored by ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.
Posted: 17 Aug 2020 | Published: 18 Aug 2020
|
|
|
The Future of Manufacturing Visibility and Traceability in the Digital Age
sponsored by Sage
WHITE PAPER:
Read this white paper to learn how traceability is key to cutting-edge, successful manufacturing visibility projects that are helping organizations embrace Industry 4.0 and all its benefits including the Internet of Things, big data analytics, and the cloud.
Posted: 14 Apr 2021 | Published: 14 Apr 2021
|
|
|
HPE Ezmeral Software Portfolio Is a Bold Move Into the Container Platform
sponsored by HPE and Intel®
WHITE PAPER:
In this report, IDC analysts dive into HPE Ezmeral – a new brand and software portfolio which covers capabilities like container orchestration and management, AI/ML and data analytics, AI-driven operations, and more.
Posted: 29 Oct 2020 | Published: 29 Oct 2020
|
|
|
|
|