ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule

    Sponsored by: XtelligentMedia Healthcare

    The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.

  • The ultimate guide to identity & access management

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.

  • AI Starter Kit: 5 Strategic Steps

    Sponsored by: SAS

    In this e-book, you'll learn how small and midsize businesses can get started with AI in 5 strategic steps. By reading, you'll discover how to build the business case, identify AI use cases, update your talent strategy, manage data, and start experimenting. Access the full e-book now to prepare your organization for the AI wave.

  • The Top 5 Generative AI questions on every Chief Product Officer’s mind

    Sponsored by: AWS

    This AWS infographic, Top 5 Generative AI Questions on Every Product Team’s Mind, will further your understanding of this new technology and help you guide your customers to greater success with generative AI.

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

  • CW APAC - February 2022: Trend Watch - enterprise 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.

  • Computer Weekly – 5 December 2023: Technologies to support hybrid working

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at technologies to support hybrid working – even when your business is as unique as farming. Read the issue now.

  • Computer Weekly – 16 January 2024: All eyes are on the Post Office scandal – at last

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.

  • THE IT MANAGER’S GUIDE TO RECLAIMING YOUR FREE TIME

    Sponsored by: Checkpoint Software Technologies

    When IT teams are bogged down by tedious tasks and endless tickets, the time crunch affects employee well-being. With Harmony SASE, a cloud-based converged networking solution, you can eliminate and outsource tasks so that your IT team isn’t only putting out fires and is free to focus on managing IT operations. Read on to learn more.

  • Computer Weekly – 2 April 2019: The nightmare driving test – making driverless cars safe

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to AI experts about the challenges of teaching autonomous vehicles how to drive safely in often extreme environments. Our latest buyer's guide looks at business intelligence and analytics. And we examine the implications of the EU's controversial new copyright laws. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.