Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"
-
Security 360: Annual Trends Report 2024
Sponsored by: JAMFJamf's annual security report analyzes the evolving threat landscape, evaluating device, application, malware, and web-based risks. It provides best practices to improve security posture, including managing vulnerabilities, implementing defense-in-depth, and aligning with compliance standards. Read the full report to secure your modern workplace.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: TechTarget ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
2024 Talkdesk global contact center KPI benchmarking report
Sponsored by: TalkdeskToday’s organizations are constantly looking for new ways that they can enhance their contact center processes in order to make operations more efficient. To do so, many have turned to generative AI and other automation tools. However, does this technology actually live up to the hype? Dig into this report.
-
A Computer Weekly e-guide to WAN & applications services
Sponsored by: TechTarget ComputerWeekly.comOne of the key technology trends of the last five years, if not longer, has been the migration from networks based on multiprotocol label switching (MPLS) to the more agile and affordable alternative, wide-area networking (WAN) technologies and in particular software-defined (SD-WAN).
-
Enabling autonomous identity security as a modern approach to IGA
Sponsored by: SailPoint TechnologiesManaging identities was simpler when you only had to worry about user profiles, but What if machine identities could manage themselves, without presenting a risk for security? Autonomous identity security combines automation with IGA practices to create a system that manages access without the need for human input. Read on to learn more.
-
CW Buyer's Guide to 5G mobile networking
Sponsored by: TechTarget ComputerWeekly.com5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.
-
Computer Weekly – 21 May 2024: Can AI supercharge human creativity?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Getty Images about the challenges of balancing human creativity with the risks and opportunities of GenAI. Our latest buyer's guide examines the best desktop IT management practices in a world of flexible working. And we review the benefits of open source software in the enterprise. Read the issue now.
-
A Computer Weekly buyer's guide to edge datacentres
Sponsored by: TechTarget ComputerWeekly.comEdge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.
-
CIO Trends #7: Nordics
Sponsored by: TechTarget ComputerWeekly.comThis e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.
-
The generative AI advantage: A leader’s guide to using your data as a differentiator
Sponsored by: AWSWhile general large language models can be used “out of the box” for some use cases, when you want to build generative AI applications that are unique to your business needs, your organization’s data is your strategic asset. Read on to uncover next steps for using data to create generative AI applications that know your customers deeply.