Search Results for "CW Special Reportstart=20start=30start=10start=20start=30"
-
Personal branding in the digital age: How to become a known expert, thrive and make a difference in a connected world
Sponsored by: TechTarget ComputerWeekly.comThis chapter from Francine Beleyi's book Personal branding in the digital age, explains the seven key pillars you need to build a successful personal brand.
-
Anatomy Of Identity Based Attacks
Sponsored by: Okta74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
-
Raspberry PI with Java: programming the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
-
Streamline Customer Service Experiences With Now Assist
Sponsored by: ServiceNow and CRI AdvantageDiscover how ServiceNow's GenAI-powered Now Assist can streamline customer service, field service, and app development. Learn to automate tedious tasks, boost agent productivity, and deliver personalized experiences. Read the e-book to see how GenAI can transform your business.
-
Streamline Customer Service Experiences With Now Assist
Sponsored by: ServiceNow and DXCGenerative AI (GenAI) can streamline customer service, field operations, and app development. Access this guide to learn how Now Assist by ServiceNow can reduce manual effort, improve productivity, and enhance experiences for customers and employees.
-
Computer Weekly – 14 February 2017: Under surveillance – what the Investigatory Powers Act means for business
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the UK government has passed the Investigatory Powers Act, labelled a "snoopers' charter" that expands the scope of state surveillance – but what does it mean for businesses? We find out what digital transformation means in the fire and rescue service. And we examine the public cloud and storage. Read the issue now.
-
Put AI To Work For People Leverage The Power of Artificial Intelligence to Transform Business
Sponsored by: ServiceNowDiscover how generative AI can transform your business processes. Learn to leverage AI for faster summarization, personalization, and better decision-making. Explore the benefits and best practices for implementing AI solutions. Read the full Analyst Report.
-
Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.
-
Full visibility and real-time threat response: Helping retailers achieve proactive IT Security
Sponsored by: TaniumHackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.
-
Cybersecurity for Medical Devices in a Connected Healthcare System
Sponsored by: Wind RiverAs healthcare systems become more connected, cybersecurity for medical devices is critical to mitigate risks. This white paper examines the key considerations for implementing an effective security strategy throughout the device lifecycle. Read the full white paper to learn more.