ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • Security 360: Annual Trends Report 2024

    Sponsored by: JAMF

    Jamf's annual security report analyzes the evolving threat landscape, evaluating device, application, malware, and web-based risks. It provides best practices to improve security posture, including managing vulnerabilities, implementing defense-in-depth, and aligning with compliance standards. Read the full report to secure your modern workplace.

  • Security Think Tank: Critical National Infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

  • 2024 Talkdesk global contact center KPI benchmarking report

    Sponsored by: Talkdesk

    Today’s organizations are constantly looking for new ways that they can enhance their contact center processes in order to make operations more efficient. To do so, many have turned to generative AI and other automation tools. However, does this technology actually live up to the hype? Dig into this report.

  • A Computer Weekly e-guide to WAN & applications services

    Sponsored by: TechTarget ComputerWeekly.com

    One of the key technology trends of the last five years, if not longer, has been the migration from networks based on multiprotocol label switching (MPLS) to the more agile and affordable alternative, wide-area networking (WAN) technologies and in particular software-defined (SD-WAN).

  • Enabling autonomous identity security as a modern approach to IGA

    Sponsored by: SailPoint Technologies

    Managing identities was simpler when you only had to worry about user profiles, but What if machine identities could manage themselves, without presenting a risk for security? Autonomous identity security combines automation with IGA practices to create a system that manages access without the need for human input. Read on to learn more.

  • CW Buyer's Guide to 5G mobile networking

    Sponsored by: TechTarget ComputerWeekly.com

    5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.

  • Computer Weekly – 21 May 2024: Can AI supercharge human creativity?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Getty Images about the challenges of balancing human creativity with the risks and opportunities of GenAI. Our latest buyer's guide examines the best desktop IT management practices in a world of flexible working. And we review the benefits of open source software in the enterprise. Read the issue now.

  • A Computer Weekly buyer's guide to edge datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.

  • CIO Trends #7: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.

  • The generative AI advantage: A leader’s guide to using your data as a differentiator

    Sponsored by: AWS

    While general large language models can be used “out of the box” for some use cases, when you want to build generative AI applications that are unique to your business needs, your organization’s data is your strategic asset. Read on to uncover next steps for using data to create generative AI applications that know your customers deeply.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.