ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"

  • CW APAC – Trend Watch: CIO trends

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations have plenty of technologies to keep track of when digitising their operations. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at IT predictions for 2024, how India's space missions will propel tech and Australia's advances in cyber security.

  • Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.

  • Outcome-Driven Teams Measuring The Value Your Customers Experience

    Sponsored by: Atlassian

    In order to realize your businesses goals, architecting a strategy is not enough. This e-book looks at how leaders and teams establish a vision and coordinate to deliver that vision, as well as how adaptable and sustainable work and is transforming customer and employee experience. Read on to learn more.

  • AI tools for software developers: Part One

    Sponsored by: TechTarget ComputerWeekly.com

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

  • Addressing Zero Trust for Government: The Role of Identity Security

    Sponsored by: Merlin International

    As governments adopt Zero Trust, identity security is critical. This white paper explores the role of identity security in a Zero Trust architecture, including five key principles and six focus areas to get started. Learn how the CyberArk Identity Security Platform can help you implement a successful Zero Trust strategy.

  • Top 10 datacentre stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    The demand from the hyperscale cloud and internet companies for colocation capacity continued to cast a long shadow over the datacentre sector in 2019, and served to ensure a number of the trends that have influenced the news cycle in previous years continued to play out. Here's a look back over Computer Weekly's top 10 datacentre stories of 2019.

  • Industry Trends and Assets to Watch Based on ASCO 2024

    Sponsored by: Intelligencia AI

    The American Society of Clinical Oncology (ASCO) Annual Meeting ranks as one of the largest and most impactful oncology conferences. The content published during the annual meeting can change established practices, and many of the trends identified reflect the current or future industry landscape in oncology.

  • Secure remote access: More vital than ever thanks to Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

  • The myth of email as proof of communication

    Sponsored by: TechTarget ComputerWeekly.com

    Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.

  • Proactive Security: Software vulnerability management and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.