ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"

  • The AI Philosophy Powering Digital Resilience

    Sponsored by: Splunk

    As organizations embrace dispersed architecture, grapple with an evolving threat landscape and rely on digital systems, AI steps in as a promising solution to control IT chaos. Delve into 3 strategies that form Splunk’s AI philosophy and learn more.

  • Data quality emerges from Covid-19 more critical than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Understanding IT Buyers’ Behaviors: Insights to improve sales and marketing performance

    Sponsored by: TechTarget

    A crowded market challenges the sales and marketing teams of IT solutions to stay competitive. By understanding IT buyer behaviors, teams can gain the edge that they need to set their organizations apart. Achieve that understanding by reviewing this TechTarget report, which answers questions like “Where do IT buyers conduct their research?”

  • Mastering Recruitment Metrics An In-Depth Guide

    Sponsored by: GEM

    Discover how to leverage recruitment metrics to transform recruiters into talent acquisition authorities, debug hiring funnels, forecast progress, and demonstrate recruiting's impact on the business. Download the in-depth guide to learn more.

  • MicroScope – June 2023: Take a balanced approach to security

    Sponsored by: MicroScope

    In this issue, read about how to help customers manage their security portfolios in a world of increasingly complex systems, discover how insights are providing more opportunities for partners, and learn whether being an MSP is enjoyable or not

  • Evolving the Next Generation Telco with AWS

    Sponsored by: AWS

    Forward-thinking CSPs adopting cloud solutions have begun to transform their operations, leveraging the cloud's elasticity, scalability, agility, and security to enhance efficiency, productivity, and customer value. Download the eBook Now and start your journey towards an agile and efficient telecom operation with AWS.

  • Data protection: Not just about personal data and compliance

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • Powerful DDoS Attacks & Recovery for Enterprises

    Sponsored by: Arbor Networks

    A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.