6 Results for:CQ

  • Sort by: 

Compare Azure Key Vault vs. Kubernetes Secrets

By Michael Levan 30 Nov 2022

Secrets require a certain level of upkeep such as storage, delivery and management. Compare services in these criteria and learn how to use Key Vault for AKS. Read More

Data management: What does the future hold?

By Bernt Ostergaard 24 Jul 2017

We explore how firms are replacing transactional database management systems with new database architectures Read More

1909 Gets Generic Keys

By Ed Tittel 22 Nov 2019

1909 gets generic keys for all versions: these are helpful during installation because they allow it to proceed to completion without requiring activation (or a valid Windows 10 key). Read More

NIST cybersecurity framework: Assessing the strengths and weaknesses

13 May 2014

Video: Securicon executive consultant Ernie Hayden discusses what the NIST cybersecurity framework got right, and how the document can be improved. Read More

CIO interview: Paul Coby, IT director, John Lewis Partnership

By Angelica Mari 19 Feb 2015

Technology is an essential ingredient to the success of John Lewis, and the retailer is ploughing £100m into IT initiatives in 2015 Read More

WAN/WAFS platform specifications

18 Jan 2007

Product snapshots highlighting key specifications for a cross section of WAFS and WAN optimisation products intended for small, medium, and large organisations. Read More