Search Results for "big data computer weeklystart=20start=20start=30start=20"
-
Computer Weekly – 4 June 2019: GDPR one year on – is it working?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.
-
A guide to developing cloud applications using PaaS
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.
-
The 2024 Technology Trends Report
Sponsored by: Upstack, Inc.This report is a powerful glimpse into the future of the changing IT landscape informed by insights gleaned from UPSTACK's leading technology experts.
-
CW Europe: December 2016 - February 2017
Sponsored by: TechTarget ComputerWeekly.comSecurity continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
-
How Audit Compliance and Cloud Adoption Affects IT Security
Sponsored by: Dell SoftwareUse this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
-
File Upload Security: The Missing Category for a Comprehensive Security Posture
Sponsored by: Deep InstinctOrganizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.
-
Supercharging Employee Growth and Development
Sponsored by: ServiceNowBusiness Leaders are finding that focusing on skills, rather than jobs or degrees, strengthens your workforce with modern data and insights. This paper presents four ways that a skills-powered approach can supercharge employee growth and development.
-
Designing Customer Conversations: Best Practices
Sponsored by: TalkdeskTo design customer conversations, it’s crucial to consider the user experiences and not just the artificial intelligence that’s behind the processes. However, to do this, companies need to know the dos and don’ts for successful virtual agents, as well as the basics for creating proper customer conversations. Access the guide to learn more.
-
API Security Study 2024
Sponsored by: FastlyThis report offers crucial insights into companies' API security concerns, providing essential input to shape your cybersecurity strategy and help you establish a secure digital environment.
-
Enterprise Buyer’s Guide for Secrets Detection
Sponsored by: GitGuardianThis buyer's guide outlines 10 key considerations for choosing a secrets detection platform to secure your software supply chain. Learn how to gain complete visibility, implement effective detection, streamline remediation, and empower developers. Read the full guide to strengthen your secrets security posture.