ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"

  • Nordic banking in the digital age

    Sponsored by: TechTarget ComputerWeekly.com

    Read in this e-guide how Nordic banks are working together to make cross border payments in the region seamless. Also find out how Nordic banks are offering customers the opportunity to make payments via wearable devices and how the region's successful mobile payments platform, MobilePay, is futureproofing its business.

  • Your Guide To Adopting Genai: The Three Stages To Getting Data-Ready For Genai.

    Sponsored by: Atos

    In this white paper, you'll discover how to adopt generative AI (GenAI) and build a GenAI-ready hybrid/multi-cloud infrastructure with Atos and Microsoft. Read on to learn about the three stages to getting your data environment ready for GenAI.

  • A Computer Weekly buyer's guide to next-generation programming tools

    Sponsored by: TechTarget ComputerWeekly.com

    All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.

  • Generative AI + Healthcare Guidebook

    Sponsored by: AWS Marketplace

    To improve patient outcomes, healthcare organizations are turning to generative artificial intelligence (GenAI). This guidebook answers six questions to help healthcare organizations in the early stages of their generative AI journey. Download now.

  • Large Language Model (LLM) Security

    Sponsored by: Shakudo Inc.

    In this white paper, you'll learn about the top 10 security risks to LLMs, including training data poisoning and more. You'll also gain specific tips to mitigate those risks as well as best practices for securing your data, models, and infrastructure. Read on now to find out how you can enhance your security measures for LLMs.

  • Cloud Migration: How to do so safely and securely

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.

  • Full visibility and real-time threat response: Helping retailers achieve proactive IT Security

    Sponsored by: Tanium

    Hackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.

  • CW APAC - January 2020: Trend Watch - digital disruption

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on digital disruption in the Asia-Pacific region, Computer Weekly looks at how business and IT leaders can implement a coherent and cohesive approach to digital transformation. Download the handbook now.

  • A Computer Weekly buyer's guide to cyber insurance

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

  • Fujitsu Integrated Report 2023

    Sponsored by: Fujitsu

    What is the Fujitsu Way, and what does it actually look like in practice for organizations looking to promote sustainable transformation? Take a deep dive into Fujitsu’s inner workings in this comprehensive e-book.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.