Search Results for "Gartner computer weeklystart=10start=30start=30start=30"
-
Managing Data Bias, Privacy, And Drift: The Importance Of Holistic Data Management
Sponsored by: OpenTextDiscover how to effectively manage data bias, privacy, and drift in the age of data sprawl. Learn five strategic best practices to ensure comprehensive data oversight, foster trust, and drive data-driven outcomes. Read the full e-book to learn more.
-
Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.
-
CW Benelux - November 2022 - January 2023: Heineken finds the right brew for digital
Sponsored by: TechTarget ComputerWeekly.comHeineken's data management director has revealed some of the ways the company is using information technology to transform digitally. Also read how a PhD student in the Netherlands is detecting hidden messages on the internet by exploring the practice of steganography.
-
Fail to prepare quality data, prepare to fail
Sponsored by: TechTarget ComputerWeekly.comFail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".
-
The long march of S/4 Hana
Sponsored by: TechTarget ComputerWeekly.comS/4 Hana, the ERP system built on SAP's in-memory, columnar database Hana has been on a long march through the enterprise since its launch in February 2013. In this e-guide, we discuss the pros and cons of upgrading to S/4 Hana, what the future has in store for the system and how its users are feeling about C/4 Hana integration.
-
Full visibility and real-time threat response: Helping retailers achieve proactive IT Security
Sponsored by: TaniumHackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.
-
Computer Weekly – 28 February 2023: The race to net zero
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the role of green tech in helping businesses contribute to the government's 2050 net-zero targets. We also talk to Spotify about the importance of open source for the music streaming service and how hybrid working is evolving as the post-pandemic workplace continues to change. Read the issue now.
-
Why zero trust is IT security's best hope
Sponsored by: TechTarget ComputerWeekly.comThis guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.
-
2024 ServiceNow Insight and Vision Report
Sponsored by: ServiceNow and NTT DataThe 2024 ServiceNow Insight and Vision Report shows digital progress is stagnant, with 73% of businesses achieving less than 50% of their digital goals. ServiceNow offers a solution to break this deadlock, enhancing operations, security, and customer experiences. Download the report now to find out how you can drive your digital transformation.
-
A 7-Step Risk Assessment Framework For Cybersecurity Professionals
Sponsored by: VikingCloudCybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.