Search Results for "Gartner computer weeklystart=10start=30start=30"
-
Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
Sponsored by: TechTarget ComputerWeekly.comLast year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
-
Executive Interview: Unleashing blockchain's potential
Sponsored by: TechTarget ComputerWeekly.comLabrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
-
Aws For Migration Migrate And Modernize With Effectual
Sponsored by: AWS & EffectualThis e-book explores how organizations are migrating and modernizing on Amazon Web Services (AWS) to achieve business advantages like higher productivity and faster time to market. Read on now to learn about Effectual's streamlined approach to AWS migration, including assessment, mobilization, and migration phases.
-
Deep learning for countering energy theft – a hybrid long-short term memory approach
Sponsored by: TechTarget ComputerWeekly.comEnergy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
-
Top Priority IT Tasks: Risk Management and Regulatory Compliance
Sponsored by: Dell SoftwareIn this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
-
Backup deduplication: a complete guide
Sponsored by: TechTarget ComputerWeekly.comThere are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
-
CW APAC: Trend Watch - Internet of Things
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at how APAC firms are putting the internet of things to good use in an increasingly connected world, yet technology integration and security concerns are holding back widespread adoption.
-
APAC 2021 Salary Survey Results
Sponsored by: TechTarget ComputerWeekly.comInside this guide, you'll find an overview of the career and salary trends we're seeing in APAC as well as a breakdown of the results from ANZ, ASEAN and India so you can see for your location which job functions are getting paid what, what IT professionals are thinking in terms of career, and their salary expectations for the next 12 months.
-
A Guide for Providers Healthcare Underpayments
Sponsored by: MD ClarityExplore the common sources of healthcare underpayments and learn how to detect, recover, and resolve them. Discover strategies to automate your revenue cycle and improve transparency with payers. Download this comprehensive guide to optimize your revenue and strengthen financial resilience.
-
Artificial intelligence, for real
Sponsored by: TechTarget ComputerWeekly.comThis e-guide features some of our coverage of AI: showing it realised for business benefit, interacting with the containerisation trend and cyber-security and cogitated upon with scholarly seriousness.