Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=10"
-
Secrets from 100,000 Demand Gen Campaigns Presentation-EMEA
Sponsored by: TechTargetTap into TechTarget's insights on creating highly engaging content in this e-book, and take a dive into the secrets gleaned from over 100,000 demand gen campaigns.
-
Computer Weekly – 21 March 2023: The risks of an imbalance in AI
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.
-
Legacy PKI Migration
Sponsored by: Venafi52% of the 2500 participants surveyed by the Ponemon Institute reported that their organizations have poor visibility of apps that rely on Public Key Infrastructure (PKI). Along with exploring that obstacle, this white paper considers other challenges that legacy PKI can pose. To unlock those insights and more, read on.
-
The Frightening Realities of Your SDR Program ... and What to Do About Them
Sponsored by: TechTargetTo compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.
-
Computer Weekly – 4 August 2020: The UK's $500m space technology gamble
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
-
Computer Weekly – 4 August 2020: The UK's $500m space technology gamble
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
-
Computer Weekly - 28 September 2021: Chancellor Rishi Sunak talks tech
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.
-
CW EMEA July 2023: Can we trust AI?
Sponsored by: TechTarget ComputerWeekly.comArtificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
-
Powering down: Keeping datacentre energy costs in check
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we take a look at some of the outside influences that could potentially impact on datacentre power and management costs in the years to come, while also taking a closer look at some of the latest thinking and best practices around datacentre energy efficiency and cooling today.
-
In data privacy we trust: building a strong information protection strategy in the hybrid era
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.