ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"

  • RSA Conference 2020 guide: Highlighting security's human element

    Sponsored by: TechTarget ComputerWeekly.com

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

  • Cybersecurity for Medical Devices in a Connected Healthcare System

    Sponsored by: Wind River

    As healthcare systems become more connected, cybersecurity for medical devices is critical to mitigate risks. This white paper examines the key considerations for implementing an effective security strategy throughout the device lifecycle. Read the full white paper to learn more.

  • 2024 Threat Hunter Perspectives: Insights From The Front Lines

    Sponsored by: OpenText

    Insights from cybersecurity experts on the evolving threat landscape. Discover the latest adversary tactics, nation-state collaborations, and timing factors that enterprises must prepare for in 2024. Download the white paper to strengthen your security posture.

  • Next Generation Utilization Management Through Ai

    Sponsored by: XSOLIS

    In this white paper, you’ll discover how AI/ML deployed in operational contexts is becoming a valuable tool to meet the challenge of modernizing health systems and maintaining utilization management. Read on to understand how AI/ML-driven automation can dramatically improve traditional workflows for payers, providers, and ultimately, patients.

  • Focus: Enterprise Mobility Management

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

  • How virtual desktops simplify end user computing during lockdown

    Sponsored by: TechTarget ComputerWeekly.com

    While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.

  • Computer Weekly – 17 April 2018: Can China's Alibaba successfully take on the US public cloud giants?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as Chinese cloud provider Alibaba grows its presence in Europe, we ask if it can compete with the US public cloud giants. A government plan to move data policy has caused controversy among Whitehall digital experts – we find out why. And we assess the use of cloud for disaster recovery. Read the issue now.

  • A Computer Weekly buyer's guide to retail technology

    Sponsored by: TechTarget ComputerWeekly.com

    The retail industry is evolving alongside the emergence of new technologies. In this 15-page buyer's guide, Computer Weekly looks at how retailers are using AI, the importance of good digital customer experience and how mobiles have transformed the purchasing process.

  • Elevate your Security with Microsoft Defender for Business

    Sponsored by: Arrow MSFT

    Microsoft Defender for Business brings enterprise-grade security to SMBs with cross-platform protection, endpoint detection and response, and vulnerability management. Learn how this solution can help secure your organization's devices and data.

  • Field Sevice News Essays

    Sponsored by: ServiceNow

    Technicians’ soft skills become vital with increased customer interaction, servitization's success hinges on transparency and collaboration, and data-driven approaches are key. Read this white paper to understand current field service trends, FAQs, and expectations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.