Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"
-
Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
-
The AI Philosophy Powering Digital Resilience
Sponsored by: SplunkAs organizations embrace dispersed architecture, grapple with an evolving threat landscape and rely on digital systems, AI steps in as a promising solution to control IT chaos. Delve into 3 strategies that form Splunk’s AI philosophy and learn more.
-
Jargon buster guide to GDPR
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
-
Amplifying Your Webinar Reach with Social Media
Sponsored by: BrightTALK by TechTargetAccess Amplifying Your Webinar Reach with Social Media for tips on how to effectively utilize social content before, during, and after your webinar to create a scalable social media promotion plan that improves the ROI of your webinar programs.
-
Hybrid Flash: The Essential guide
Sponsored by: TechTarget ComputerWeekly.comThis guide offers a comprehensive survey of the hybrid flash storage market. We give the lowdown on hybrid flash products from the big six storage vendors and the startups and specialists. Plus, we take a look at what's best for virtual desktops: All-flash or hybrid?
-
Deep Learning Delivers Proactive Cyber Defense
Sponsored by: Deep InstinctAmidst the cybersecurity skills shortage, organizations are hard pressed to find new answers to evolving problems. Deep learning, a subset of machine learning, offers a highly accurate way to identify attack patterns and stop threats before they become attacks, without the need for highly skilled cybersecurity experts. Read on to learn more.
-
From Alteryx to Dataiku: Streamlining Your Data Workflow eBook
Sponsored by: DataikuAs the digital landscape continues to evolve, businesses are finding that traditional data platforms, while powerful, may not be sufficient to meet the growing demand for scalability, collaboration, and advanced analytics. Read this e-book now to learn how you can ensure that your data processing pipelines are primed for future success.
-
Chapter 1: Security and Risk Management
Sponsored by: McGraw HillIn this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
Single-Vendor SASE For Dummies, 2nd Fortinet Special Edition
Sponsored by: Fortinet, Inc.This guide introduces you to Single-Vendor SASE – the delivery of networking and security capabilities from one vendor in a unified solution. Learn how consolidation can help IT network and security teams drive operational efficiency, reduce costs, and more.
-
Healthcare’s Digital Pulse: Elevating Precision in Inventory Management
Sponsored by: Zebra TechnologiesExplore how hospitals use RFID, barcodes, and location tracking to revolutionize inventory management and patient care. Discover the advantages, obstacles, and strategies healthcare leaders employ to enhance materials management in the full Hospital Vision Study.