Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"
-
Choose High Data-Efficiency Technology for Lower Storage TCO
Sponsored by: Dell TechnologiesDownload this analyst report to discover how data-efficient storage platforms can help you require fewer drives, less administration time, and less power to store the same amount of data.
-
Computer Weekly - 21 September 2021: The cities planning for ethical use of AI
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.
-
Executive Interview: Juergen Mueller on SAP's tech strategy
Sponsored by: TechTarget ComputerWeekly.comSAP CTO Juergen Mueller offers a glimpse into the company's thinking around delivering business applications as microservices, among other areas and updates in its technology strategy.
-
Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
-
Key Considerations for Securing Different Non-human Identities
Sponsored by: CyberArkToday's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.
-
Zscaler ThreatLabz State of Encrypted Attacks Report
Sponsored by: ZscalerEncrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.
-
Computer Weekly – 17 April 2018: Can China's Alibaba successfully take on the US public cloud giants?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as Chinese cloud provider Alibaba grows its presence in Europe, we ask if it can compete with the US public cloud giants. A government plan to move data policy has caused controversy among Whitehall digital experts – we find out why. And we assess the use of cloud for disaster recovery. Read the issue now.
-
Secure Efficient and Flexible Capacity Tier for Veeam Backups
Sponsored by: DataCore Software CorporationPH
-
6 key steps to take on your generative AI journey
Sponsored by: AWSThis AWS eBook outlines a proven path to GenAI success—from taking the first step to measuring results—with insights from Amazon best practices and its experience helping thousands of customers realize their own initiatives. Read the eBook here.
-
How to Choose a Background Check Provider for Hiring at Scale
Sponsored by: CheckrIn a tight labor market, choosing the wrong background screening provider could be a costly mistake. This guide shares five ways the best background check partner can help you get ahead in your hiring market—plus the questions you need to ask and must-have solutions when choosing a provider.