ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • Streamline Customer Service Experiences With Now Assist

    Sponsored by: ServiceNow and DXC

    Generative AI (GenAI) can streamline customer service, field operations, and app development. Access this guide to learn how Now Assist by ServiceNow can reduce manual effort, improve productivity, and enhance experiences for customers and employees.

  • Quarterly Ransomware Research Report

    Sponsored by: CyberMaxx

    This Q3 2024 ransomware report analyzes the latest trends, including a 2% decrease in attacks compared to Q2 and the rise of the Ransomhub group. The average cost of a data breach continues to grow, highlighting the need for robust security. Read the full report to stay informed on the evolving ransomware landscape.

  • 19 machine learning interview questions and answers

    Sponsored by: TechTarget ComputerWeekly.com

    Aspiring machine learning job candidates should be fluent in varied aspects of machine learning, from statistical theory and programming concepts to general industry knowledge. Read our list of commonly asked machine learning questions and accompanying answers to help you prepare for your interview.

  • CW ASEAN – December 2018: How to make the right cloud infrastructure choices

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's edition of CW ASEAN, we take a look at the considerations when choosing infrastructure as a service, and what needs to be in place for enterprises to get the most out of the cloud computing technology

  • Celestica decreases time-to-hire through remarkable efficiency plays

    Sponsored by: GEM

    Celestica, a leader in design and manufacturing, struggled with brand awareness and sourcing niche engineering roles. By using Gem, they saw a dramatic decrease in time-to-fill, an 87% offer-accept rate, and improved visibility into their recruiting process. Read the full case study to learn how Gem empowered Celestica's recruiting team.

  • Using IT initiatives to save money and reinforce green credentials

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.

  • Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.

  • CW Innovation Awards: NUHS taps RPA in Covid-19 swab tests

    Sponsored by: TechTarget ComputerWeekly.com

    In this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.

  • Multi cloud backup and recovery best practices

    Sponsored by: TechTarget ComputerWeekly.com

    User concerns about data availability and safety continue to grow. And despite being in the early phases of the multi-cloud movement, experts have provided some good guidelines to users to help them implement this additional layer of protection. This guide details multi-cloud backup and recovery best practices, and presents potential pain points.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.