Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=10start=20"
-
Jargon buster guide to GDPR
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
-
Data quality emerges from Covid-19 more critical than ever
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
-
10 realistic business use cases for ChatGPT
Sponsored by: TechTarget ComputerWeekly.comIn the rapidly evolving landscape of AI and natural language processing, ChatGPT has emerged as a powerful tool with myriad potential applications. In a corporate context, it's crucial to determine the most pragmatic and pertinent applications for specific business needs. Consider these 10 business use cases.
-
SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
Sponsored by: Veracode, Inc.If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
-
Generative AI and the contact center of the future
Sponsored by: TalkdeskDiscover how generative AI will revolutionize the contact center of the future. Explore the impact on conversational AI, analytics, knowledge management, and more. Learn how to leverage this powerful technology while addressing key ethical considerations. Read the full e-book to learn more.
-
Hybrid cloud: What enterprises need to know today
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we take a look at some of the latest thinking and trends around hybrid cloud, and shine a light on some of the enterprises who are favouring this IT infrastructure approach.
-
The Hidden Costs of Downtime
Sponsored by: SplunkDowntime and service degradation create a cascade of consequences, costing Global 2000 companies $400B annually. Learn how the most resilient organizations set themselves apart from the rest and Splunk’s recommendations for deterring downtime in this first-of-its-kind report in partnership with Oxford Economics.
-
Deloitte Global CIO Survey 2018 – UK Edition
Sponsored by: TechTarget ComputerWeekly.comFewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
-
Cloud backup vs traditional backup
Sponsored by: TechTarget ComputerWeekly.comCloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.
-
Harden Your Systems Using CIS and DISA STIGs Benchmarks
Sponsored by: Progress Software CorporationOrganizations face the challenge of securing complex multi-cloud environments. Chef Compliance automates system hardening and compliance with CIS Benchmarks and DISA STIGs. This guide illustrates how you can use Chef Compliance to achieve system hardening by mapping CIS and DISA benchmark standards to automated controls. Dive into the guide here.