ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"

  • A 4-Step Plan For Denial Prevention

    Sponsored by: Waystar

    What do you do when staff don’t have the time, money, or resources to work denials as thoroughly as they’d like? The technology and tactics to prevent denials is here and you can unlock a proven approach to denial prevention. Get a step-by-step denial prevention plan in this e-book.

  • Benelux: New skills in a digital world

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at some of the technologies being adopted in the Benelux region. This gives a taste of what is in demand. Read about how Dutch organisations and the Netherlands in general are witnessing the rise of technologies like virtual reality, no-code programming platforms, smart neighbourhood, as well as fintech.

  • CIO Trends #7: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.

  • Computer Weekly – 28 November 2023: Datacentres or green belt? Why the UK has to choose

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the minefield around datacentre planning permission across the UK, after government blocked a major development next to the M25. The metaverse is making inroads into the industrial world – is this the real future for the technology? And we analyse the trends changing the app market. Read the issue now.

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

  • Computer Weekly – 6 September 2022: Out with the old at Asda

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.

  • An Inconvenient Truth About Corporate ESG Investments

    Sponsored by: Sedex

    According to a recent environmental social and governance (ESG) survey, there is little agreement among organizations as to the scope and vision of their ESG programs. Download this e-book to unlock key findings on the state of ESG and see how you can optimize your sustainability initiatives.

  • In 2017, the insider threat epidemic begins

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

  • GenAI: Empowering enterprises and engineering for the future

    Sponsored by: Virtusa

    Discover how generative AI (genAI) is transforming enterprises and engineering. Learn about leveraging GenAI to build new revenue streams, boost productivity, and enhance data engineering. Explore the enterprise readiness of AI tools and Virtusa's perspective on empowering the future. Read the white paper to learn more.

  • Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.