Search Results for "CW Special Reportstart=20start=30start=10start=20start=30"
-
The generative AI advantage: A leader’s guide to using your data as a differentiator
Sponsored by: AWSWhile general large language models can be used “out of the box” for some use cases, when you want to build generative AI applications that are unique to your business needs, your organization’s data is your strategic asset. Read on to uncover next steps for using data to create generative AI applications that know your customers deeply.
-
CW Innovation Awards: NUHS taps RPA in Covid-19 swab tests
Sponsored by: TechTarget ComputerWeekly.comIn this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.
-
The evolution of the agile organisation
Sponsored by: TechTarget ComputerWeekly.comThis research by PA Consulting finds that organisations can improve their financial performance as a result of adopting agile techniques.
-
Building a Cyberresilient Data Recovery Strategy
Sponsored by: Veeam SoftwareBuilding a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.
-
The Ultimate Guide to Cyber Hygiene
Sponsored by: TaniumIt’s critical for organizations to deeply understand their risk posture and have tools in place that provide the endpoint visibility and control needed to detect and remediate security breaches. This white paper provides the benchmarks and security strategies that set IT teams up for success in proactively planning defenses against cyber threats.
-
Securing DevOps A Digital-first Imperative for Success
Sponsored by: CyberArkThis IDC InfoBrief commissioned by RedHat and CyberArk looks at the importance of securing identities as businesses embrace a DevOps culture in APAC. A full DevSecOps approach has many facets, and the starting point for a successful DevSecOps approach is around identity and access management controls.
-
Computer Weekly – 24 July 2018: Building intelligent aircraft engines with AI and analytics
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Rolls-Royce about using AI, sensors and data analytics to build intelligent aircraft engines. Our latest buyer's guide examines the next generation of desktop IT. And we ask whether a court ruling in Chile could lead to a worldwide change in Oracle's software licensing practices. Read the issue now.
-
Does Your Integration Strategy Inspire Or Impede?
Sponsored by: Digibee71% of enterprises planned to adopt, supplement or replace their integration technology in 2023, according to research by Digibee. In 2024, is the same true at your own organization? Download this 18-page e-book to compare 2 approaches to IT integration.
-
Cyber security in the Middle East
Sponsored by: TechTarget ComputerWeekly.comAs organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
-
Observability engineering
Sponsored by: HoneycombObservability is critical for managing today's software.This O'Reilly e-book presents 321 pages of expert insights on the state of observability engineering, giving you the information you need to understand the most prevalent trends and strategies. Read on to learn more.