Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"
-
IT Project: DevOps
Sponsored by: TechTarget ComputerWeekly.com2016 is widely tipped to be the year DevOps goes mainstream, with enterprise IT managers either looking to ramp up or kick-start their efforts in this area, and start realising the benefits it can bring.
-
Mobilizing a Zero Trust Security Model
Sponsored by: OktaAs organizations move towards a distributed workforce, a Zero Trust security model is critical. Learn how SMBs are advancing their identity and access management maturity to secure remote access and build user trust. Read the full white paper to discover the key steps in your Zero Trust journey.
-
3 principles for the equitable use of AI in healthcare
Sponsored by: The Advisory BoardThis market insights report examines 3 principles for the equitable use of AI in healthcare: avoiding bias in model design, emphasizing equitable access and trust in deployment, and embedding affordability in model financing. Read the full report to learn how healthcare organizations and vendors can promote health equity with AI.
-
Why Businesses Must Plan for Succession
Sponsored by: PaycomSuccession planning is critical, yet only 21% of companies have a plan in place. This guide offers 7 strategies to prepare, including starting loose, checking egos, and developing talent. Plan now so your business can thrive for decades. Read the full white paper for insights to ensure continuity.
-
State of Application Security 2024
Sponsored by: CloudflareToday’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.
-
2024 Top Global Security Trends
Sponsored by: BrivoThis report presents the findings of Brivo’s recent security study, which gathers data from 850 security professionals across 8 countries. Download the report now to unlock the study’s key findings, including 3 key trends influencing the state of cybersecurity.
-
Driving Value and Cost Optimization on the Cloud
Sponsored by: AWSAs a finance leader, you seek to mitigate risk, reduce costs, and boost revenue. To successfully achieve these goals, you need to meet customer and market demands efficiently and profitably. In this e-book, explore the value of consumption-based spending models to meet customer expectations, reduce consumer risk, and drive optimum value.
-
Royal Holloway: Protecting investors from cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
-
Computer Weekly Buyer's Guide to services for digitisation and IoT
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.
-
Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.