computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Delta
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • IT leaders 250
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Author profile

Bob Tarzey

Articles by Bob Tarzey

Networks

Cleaning out the data pipes

clock 22 October 2012 • 3 min read

Security Technology

The identity bridge - the extended value of single sign on

clock 05 October 2012 • 4 min read

Corporate

The integrator-MSP and the mid-market

clock 19 September 2012 • 3 min read

Strategy

The long-term future of 'the cloud'

clock 17 September 2012 • 3 min read

Corporate

Compliance in the cloud

clock 30 August 2012 • 3 min read

Security

The highly secure cloud

clock 29 August 2012 • 3 min read

Threats and Risks

Deploying advanced cyber-security intelligence

clock 28 August 2012 • 4 min read

Software

The future is all about SaaS

clock 13 August 2012 • 3 min read

Corporate

Four top use-cases for public cloud

clock 23 July 2012 • 3 min read

Corporate

All hail the private cloud

clock 10 July 2012 • 3 min read
123
Most read
01

Hackers can exploit iPhones' low-power mode to run malware even when device is off, researchers warn

17 May 2022 • 3 min read
02

Head of government GPDPR review opted out of scheme

16 May 2022 • 3 min read
03

Google Russia to file for bankruptcy after accounts seized

20 May 2022 • 2 min read
04

Italian police block pro-Russia attacks during Eurovision

16 May 2022 • 3 min read
05

Microsoft to increase salaries, stock compensation to retain employees

17 May 2022 • 2 min read
  • Contact Us
  • Marketing Solutions
  • About Incisive Media
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
right wallpaper ad

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited,New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration numbers 09177174 & 09178013

DIGITAL PUBLISHER OF THE YEAR
right wallpaper ad