ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • The MSP’s Guide to Combatting Shadow IT

    Sponsored by: JumpCloud

    Shadow IT poses serious risks to data security and compliance for MSPs and their clients. This e-book explores the dangers, including data breaches and compliance violations, and provides a 4-step approach to address it. Read on now to learn how to identify, evaluate, manage, and prevent shadow IT.

  • CW APAC May 2023 – Expert advice on security and threat intelligence

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Sponsored by: TechTarget ComputerWeekly.com

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

  • Data Center Facilities Management Strategy Guide

    Sponsored by: Schneider Electric

    Here's the thing about data centers: overheated servers and cooling failures are worse than power failures. This e-guide will help you re-evaluate your data center's physical metrics and update your facilities management strategy.

  • The Essential AI Checklist: Future-proof your Workforce in Six Simple Steps

    Sponsored by: HPI and Intel

    In this infographic, you'll discover a 6-step checklist to future-proof your workforce with AI-enabled PCs. By reading, you'll learn how to assess your current tech, secure the right support, and empower your teams to thrive in the AI era. Tap in now to find out how you can unlock new levels of productivity, collaboration, and creativity.

  • Classifying Domain Generation Algorithm (DGA) Domains With Machine Learning

    Sponsored by: Sealing Technologies

    Domain generation algorithms (DGAs) can help threat actors evade detection by constantly moving between random domain names. So, how can your organization defend against that technique? Dig into this white paper to discover how SealingTech built a neural network model that detects malicious domains with 97% accuracy.

  • Get everyone involved in the diversity drive

    Sponsored by: TechTarget ComputerWeekly.com

    At a Computer Weekly diversity in tech event, more than 100 experts from the tech and employment sectors shared their ideas for improving diversity in the technology industry. Download the full report here.

  • TOP 10 TACTICS To Improve Patient-Reported Outcomes Compliance

    Sponsored by: PatientIQ

    Collecting patient outcomes data is crucial for improving care, but achieving high patient compliance can be challenging. Discover 10 proven tactics to boost patient-reported outcomes compliance, from setting clear goals to automating the process. Read the full eBook to learn more.

  • Accelerate growth and improve competitiveness

    Sponsored by: AWS

    It’s time to achieve your own AI success. Grab a copy of this e-book to browse a compendium of case studies in which 10 leading companies are successfully using AI with AWS to drive innovation, improve the customer experience, boost application performance, and automate business operations.

  • The Race To Stay Ahead How Leading Asset Managers Are Modernizing The Investment Research Process

    Sponsored by: S&P Global

    Asset managers face industry challenges like AUM declines and margin pressures. To thrive, they must modernize their investment research process using new technologies like cloud, automation, and AI. Learn how leading firms are transforming their data and technology stacks in this report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.