ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • A Compact Guide to Retrieval Augmented Generation (RAG)

    Sponsored by: DataBricks

    Discover how Retrieval Augmented Generation (RAG) can enhance large language models by providing relevant external information to improve accuracy and reduce hallucinations. Learn the key components and use cases of RAG with vector search. Read the full e-book to learn more.

  • Observability for Large Language Models

    Sponsored by: Honeycomb

    “As organizations eagerly embrace the potential of LLMs,” this e-book explains, “the need to understand their behavior in production and use that understanding to improve development with them has become apparent.” Step in observability, here to help you develop and deepen your understanding of LLMs. Read on to learn more.

  • Arctic Wolf Security Operations 2024 Report

    Sponsored by: Arctic Wolf

    This report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.

  • Comprehensive Guide To Security Operations

    Sponsored by: Arctic Wolf

    Despite sizeable budgets and an array of technology solutions at their disposal, most security teams can barely keep up with the bombardment of threats targeting IT environments as the attack surface continues to expand. Access this guide to learn a pragmatic approach to reducing the risk and impact of an attack and improving security resiliency.

  • Getting Cloud Security Right

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

  • A Computer Weekly Buyer's Guide to Internet of Things Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

  • A Computer Weekly buyer's guide to post-Covid-19 supply chain management

    Sponsored by: TechTarget ComputerWeekly.com

    The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.

  • Pay It Forward: Attracting and Retaining Top Agents in South Africa CX Delivery Centres

    Sponsored by: Hinduja Global Solutions

    South Africa is a top offshore customer experience delivery destination, offering a large talent pool, cultural compatibility, and lower costs. Learn how HGS is attracting and retaining top agents in its new South Africa delivery centre. Read the full white paper.

  • The Forrester Wave™: Endpoint Security, Q4 2023

    Sponsored by: Bitdefender

    As organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose. Based on the “must haves” many leaders are looking for in EPP and EDR solutions, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.

  • CIO Trends APAC: Developing a data-driven culture

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.