Search Results for "Gartner computer weeklystart=10start=20start=20start=20"
-
A Compact Guide to Retrieval Augmented Generation (RAG)
Sponsored by: DataBricksDiscover how Retrieval Augmented Generation (RAG) can enhance large language models by providing relevant external information to improve accuracy and reduce hallucinations. Learn the key components and use cases of RAG with vector search. Read the full e-book to learn more.
-
Observability for Large Language Models
Sponsored by: Honeycomb“As organizations eagerly embrace the potential of LLMs,” this e-book explains, “the need to understand their behavior in production and use that understanding to improve development with them has become apparent.” Step in observability, here to help you develop and deepen your understanding of LLMs. Read on to learn more.
-
Arctic Wolf Security Operations 2024 Report
Sponsored by: Arctic WolfThis report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.
-
Comprehensive Guide To Security Operations
Sponsored by: Arctic WolfDespite sizeable budgets and an array of technology solutions at their disposal, most security teams can barely keep up with the bombardment of threats targeting IT environments as the attack surface continues to expand. Access this guide to learn a pragmatic approach to reducing the risk and impact of an attack and improving security resiliency.
-
Getting Cloud Security Right
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
-
A Computer Weekly Buyer's Guide to Internet of Things Security
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
-
A Computer Weekly buyer's guide to post-Covid-19 supply chain management
Sponsored by: TechTarget ComputerWeekly.comThe supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.
-
Pay It Forward: Attracting and Retaining Top Agents in South Africa CX Delivery Centres
Sponsored by: Hinduja Global SolutionsSouth Africa is a top offshore customer experience delivery destination, offering a large talent pool, cultural compatibility, and lower costs. Learn how HGS is attracting and retaining top agents in its new South Africa delivery centre. Read the full white paper.
-
The Forrester Wave™: Endpoint Security, Q4 2023
Sponsored by: BitdefenderAs organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose. Based on the “must haves” many leaders are looking for in EPP and EDR solutions, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.
-
CIO Trends APAC: Developing a data-driven culture
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.