ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"

  • Identity security buyer’s guide

    Sponsored by: SailPoint Technologies

    Leaders across industries are recognizing that digital identities and their access across the organization today are essential to securing the business. This guide is designed as a blueprint for your journey to a future-proof and successful identity security program. Read on to learn more.

  • Top 10 cyber security stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

  • Computer Weekly - 22 June 2021: A new three-year plan for digital government

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.

  • Suffocating to Optimize Time with Patients?

    Sponsored by: ModuleMD

    As respiratory, allergy, and ENT conditions rise, providers face burnout and inefficient workflows. This whitepaper explores how AI-powered solutions from ModuleMD can streamline administrative tasks, enhance patient engagement, and improve care coordination to boost efficiency and patient outcomes. Read the full whitepaper to learn more.

  • A Computer Weekly e-guide to WAN & applications services

    Sponsored by: TechTarget ComputerWeekly.com

    One of the key technology trends of the last five years, if not longer, has been the migration from networks based on multiprotocol label switching (MPLS) to the more agile and affordable alternative, wide-area networking (WAN) technologies and in particular software-defined (SD-WAN).

  • Identity Governance & Administration Solution Buyer’s Guide

    Sponsored by: Saviynt

    Over the last few years, cloud acceleration, security threats, and constant technology transformation have bombarded enterprises. IGA is fundamental to modern enterprise security. Importantly, IGA builds a foundation for Zero Trust across cloud, hybrid, and on-prem environments. Read on to learn more.

  • Digital Experience platforms intensify customer engagement programmes

    Sponsored by: TechTarget ComputerWeekly.com

    Digital Experience Management platforms are developing and becoming more sophisticated as companies seek to intensify relationships with customers in order to gain competitive advantage against their peers. Improving customer experience will only become evermore important as companies endeavor to navigate an increasingly turbulent economy.

  • 2024 global threat report

    Sponsored by: CrowdStrike

    The advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.

  • Identifying Use Cases For Ai In Procurement Turning Vision Into Reality

    Sponsored by: GEP

    By 2026, Gartner predicts, over 80% of businesses will have leveraged generative AI–powered application program interfaces or models. So, what will this massive adoption mean for procurement organizations? In this 15-page white paper, discover AI use cases for procurement leaders.

  • Chapter 1: Security and Risk Management

    Sponsored by: McGraw Hill

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.