ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"

  • 2024 Threat Hunter Perspectives: Insights From The Front Lines

    Sponsored by: OpenText

    Insights from cybersecurity experts on the evolving threat landscape. Discover the latest adversary tactics, nation-state collaborations, and timing factors that enterprises must prepare for in 2024. Download the white paper to strengthen your security posture.

  • AI tools for software developers: Part Two

    Sponsored by: TechTarget ComputerWeekly.com

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

  • Email Security Buyer's Guide

    Sponsored by: Checkpoint Software Technologies

    Email is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.

  • A Computer Weekly buyer's guide to AI, ML and RPA

    Sponsored by: TechTarget ComputerWeekly.com

    In this 16-page buyer's guide, Computer Weekly looks at the evolution of productivity bots, the pros and cons of putting AI and ML applications in the cloud, and the growing number of injustices involving algorithms and automated decision-making

  • A Guide for Providers Healthcare Underpayments

    Sponsored by: MD Clarity

    Explore the common sources of healthcare underpayments and learn how to detect, recover, and resolve them. Discover strategies to automate your revenue cycle and improve transparency with payers. Download this comprehensive guide to optimize your revenue and strengthen financial resilience.

  • Where Does Marketing Stop And Advertising Begin?

    Sponsored by: SAS

    As data deprecation nears, brands must double down on first-party data strategies, use customer understanding and enterprise decisioning, and embrace data-driven omnichannel customer journey activation. Learn how to navigate the new world of tech in this white paper.

  • A Computer Weekly buyer's guide to blockchain technology

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • Arctic Wolf Security Operations 2024 Report

    Sponsored by: Arctic Wolf

    This report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.

  • Focus: Campus local area networks (LAN)

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.

  • Digital Disruption Index – from experimentation to transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations are investing in digital technologies, including artificial intelligence, blockchain and augmented reality, but executives fear they lack skills to implement a digital strategy, Deloitte's Digital Disruption Index reveals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.