Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"
-
Preventing identity theft in a data breach
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
Building a Sustainable Content Ecosystem
Sponsored by: Enterprise Strategy GroupTo maximize content ROI, businesses need to think through the whole before they can successfully solve for the major parts.This Enterprise Strategy Group (ESG) white paper will show you how to build a sustainable content ecosystem that drives ROI and engages your target buyers.Read now to unlock breakthrough strategies.
-
CW Middle East - January-March 2022: What does Saudi Arabia's autonomous vehicle agenda mean for the world?
Sponsored by: TechTarget ComputerWeekly.comIf all goes according to plan, within a few years, one million people will live in Saudi Arabia's 'city of the future' – and every one of them will depend on a fleet of self-driving cars. Also in this issue, read about the UAE's bid to become a world-leading location for artificial intelligence innovation.
-
Use GenAI-powered Now Assist to empower your employees at every career stage while increasing HR productivity
Sponsored by: ServiceNowDiscover how GenAI-powered Now Assist can empower your HR teams to deliver faster, more efficient services. Boost productivity, automate repetitive tasks, and enhance employee experiences. Read the e-book to learn more.
-
Deliver Better HR Services Faster With Now Assist
Sponsored by: ServiceNow and DXCUnlock the power of GenAI to streamline HR service delivery and accelerate app development. Now Assist from ServiceNow empowers employees with self-service, boosts HR agent productivity, and simplifies custom app creation. Read this guide to discover how GenAI can transform your HR and development workflows.
-
Fixing Employee Collaboration in the Era of Distributed Teams
Sponsored by: AtlassianThis Analyst Report examines how the rise of hybrid work has led to collaboration tool sprawl and information silos, hindering cross-functional teamwork. The report outlines how consolidating on a unified platform like Atlassian can help organizations boost productivity and collaboration. Read the full report to learn more.
-
Computer Weekly - 22 June 2021: A new three-year plan for digital government
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.
-
Computer Weekly – 4 October 2022: Putting APIs to work
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
-
Enhancing Teams with Enterprise-Grade Telephony
Sponsored by: VodafoneYour business depends on a robust communications experience to drive innovation, and phone calls are at the heart of that experience. That means having the utmost quality in telephony becomes imperative for optimal performance. This eBook explores what to look for in the best telephony solutions. Read the eBook.
-
Non-employee Identity Security And Lifecycle Management
Sponsored by: SailPoint TechnologiesOrganizations utilize non-employee workers and services to supplement their workforce, but each of these non-employee entities presents an increase in third-party risk. This white paper explores how non-employee identities present new demands to organizations’ existing authentication systems and protocols. Read on to learn more.