Issue OverviewIT in Europe - August 2012
Compliance and risk managers have to overcome many challenges as a result of the data protection framework. This exclusive resource discusses some of the difficulties the European Union has to face because of regulations. Access >>>
Premium Content for Free.
Compliance, risk and the coming EU data protection framework: a CISO's perspective
by Warwick Ashford
Compliance and risk managers in Europe are facing one of the biggest challenges for decades as the region moves to a new data protection framework
Data virtualisation on rise as ETL alternative for data integration
by Gareth Morgan, Contributor
The Phone House and Novartis have turned to data virtualisation from Denodo and Composite to gain a single logical view of disparate data sources.
- Compliance, risk and the coming EU data protection framework: a CISO's perspective by Warwick Ashford
The implications for storage of EU data protection regulation
by Mathieu Gorge
EU data protection regulations are set to change, and the implications for data storage are manifold and include far-reaching effects on in-house and external cloud storage.
- The implications for storage of EU data protection regulation by Mathieu Gorge
Law firm's infrastructure overhaul lowers costs, improves productivity
by Archana Venkatraman
A law firm upgrades its legacy systems and deployed a new data back up and disaster recovery strategy. Here’s how it lowered costs and improved IT efficiency.
Are shared private broadband connections the future of Wi-Fi on the go?
by Jennifer Scott
We look at whether the growing trend of software opening up home routers for public Wi-Fi consumption is the future
- Law firm's infrastructure overhaul lowers costs, improves productivity by Archana Venkatraman
More Premium Content Accessible For Free
The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...
The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...
This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...