ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "big data computer weeklystart=20start=20start=30start=20"

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

  • A guide to developing cloud applications using PaaS

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.

  • The 2024 Technology Trends Report

    Sponsored by: Upstack, Inc.

    This report is a powerful glimpse into the future of the changing IT landscape informed by insights gleaned from UPSTACK's leading technology experts.

  • CW Europe: December 2016 - February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • How Audit Compliance and Cloud Adoption Affects IT Security

    Sponsored by: Dell Software

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

  • File Upload Security: The Missing Category for a Comprehensive Security Posture

    Sponsored by: Deep Instinct

    Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.

  • Supercharging Employee Growth and Development

    Sponsored by: ServiceNow

    Business Leaders are finding that focusing on skills, rather than jobs or degrees, strengthens your workforce with modern data and insights. This paper presents four ways that a skills-powered approach can supercharge employee growth and development.

  • Designing Customer Conversations: Best Practices

    Sponsored by: Talkdesk

    To design customer conversations, it’s crucial to consider the user experiences and not just the artificial intelligence that’s behind the processes. However, to do this, companies need to know the dos and don’ts for successful virtual agents, as well as the basics for creating proper customer conversations. Access the guide to learn more.

  • API Security Study 2024

    Sponsored by: Fastly

    This report offers crucial insights into companies' API security concerns, providing essential input to shape your cybersecurity strategy and help you establish a secure digital environment.

  • Enterprise Buyer’s Guide for Secrets Detection

    Sponsored by: GitGuardian

    This buyer's guide outlines 10 key considerations for choosing a secrets detection platform to secure your software supply chain. Learn how to gain complete visibility, implement effective detection, streamline remediation, and empower developers. Read the full guide to strengthen your secrets security posture.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.