ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • Building a Sustainable Content Ecosystem

    Sponsored by: Enterprise Strategy Group

    To maximize content ROI, businesses need to think through the whole before they can successfully solve for the major parts.This Enterprise Strategy Group (ESG) white paper will show you how to build a sustainable content ecosystem that drives ROI and engages your target buyers.Read now to unlock breakthrough strategies.

  • CW Middle East - January-March 2022: What does Saudi Arabia's autonomous vehicle agenda mean for the world?

    Sponsored by: TechTarget ComputerWeekly.com

    If all goes according to plan, within a few years, one million people will live in Saudi Arabia's 'city of the future' – and every one of them will depend on a fleet of self-driving cars. Also in this issue, read about the UAE's bid to become a world-leading location for artificial intelligence innovation.

  • Use GenAI-powered Now Assist to empower your employees at every career stage while increasing HR productivity

    Sponsored by: ServiceNow

    Discover how GenAI-powered Now Assist can empower your HR teams to deliver faster, more efficient services. Boost productivity, automate repetitive tasks, and enhance employee experiences. Read the e-book to learn more.

  • Deliver Better HR Services Faster With Now Assist

    Sponsored by: ServiceNow and DXC

    Unlock the power of GenAI to streamline HR service delivery and accelerate app development. Now Assist from ServiceNow empowers employees with self-service, boosts HR agent productivity, and simplifies custom app creation. Read this guide to discover how GenAI can transform your HR and development workflows.

  • Fixing Employee Collaboration in the Era of Distributed Teams

    Sponsored by: Atlassian

    This Analyst Report examines how the rise of hybrid work has led to collaboration tool sprawl and information silos, hindering cross-functional teamwork. The report outlines how consolidating on a unified platform like Atlassian can help organizations boost productivity and collaboration. Read the full report to learn more.

  • Computer Weekly - 22 June 2021: A new three-year plan for digital government

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • Enhancing Teams with Enterprise-Grade Telephony

    Sponsored by: Vodafone

    Your business depends on a robust communications experience to drive innovation, and phone calls are at the heart of that experience. That means having the utmost quality in telephony becomes imperative for optimal performance. This eBook explores what to look for in the best telephony solutions. Read the eBook.

  • Non-employee Identity Security And Lifecycle Management

    Sponsored by: SailPoint Technologies

    Organizations utilize non-employee workers and services to supplement their workforce, but each of these non-employee entities presents an increase in third-party risk. This white paper explores how non-employee identities present new demands to organizations’ existing authentication systems and protocols. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.