ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • Three Key Ingredients Every Modern Enterprise Needs In Their Outsourced It Service Provider

    Sponsored by: Zadara Storage

    Explore three strategic elements - Collaboration, Competitiveness, and Compatibility - essential for IT providers to tackle cloud cost, data sovereignty, and performance issues. Discover how Zadara Edge Cloud offers the foundation for modern applications in our White Paper.

  • Designing Customer Conversations: Best Practices

    Sponsored by: Talkdesk

    To design customer conversations, it’s crucial to consider the user experiences and not just the artificial intelligence that’s behind the processes. However, to do this, companies need to know the dos and don’ts for successful virtual agents, as well as the basics for creating proper customer conversations. Access the guide to learn more.

  • The Secure Access Maturity Model

    Sponsored by: StrongDM

    In order to provide an action-oriented approach to reducing the threat posed by all of those credentials, StrongDM built the Secure Access Maturity Model (SAMM).Download this white paper to unlock the full model and use it as a framework to evaluate your identity security systems, and guide you toward secure access maturity.

  • The Future of Manufacturing with Generative AI

    Sponsored by: Amazon Web Services

    Discover how Amazon Web Services (AWS) can help your industrial organization harness the transformative power of generative artificial intelligence (AI)

  • MicroScope: The digital transformation

    Sponsored by: MicroScope

    The phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.

  • Computer Weekly – 15 October 2024: A future of virtual collaboration

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how immersive technologies such as augmented and virtual reality are set to transform workplace collaboration. We look at how AI is helping to deliver improvements in customer experience. And we analyse the problems in the Post Office project to replace its troubled Horizon IT system. Read the issue now.

  • The Race To Stay Ahead How Leading Asset Managers Are Modernizing The Investment Research Process

    Sponsored by: S&P Global

    Asset managers face industry challenges like AUM declines and margin pressures. To thrive, they must modernize their investment research process using new technologies like cloud, automation, and AI. Learn how leading firms are transforming their data and technology stacks in this report.

  • A Computer Weekly buyer's guide to applications of next-generation networking

    Sponsored by: TechTarget ComputerWeekly.com

    The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses

  • CW APAC: Expert advice on zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

  • Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule

    Sponsored by: XtelligentMedia Healthcare

    The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.