ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"

  • Ransomware Defense And Remediation With Pure Storage

    Sponsored by: Pure Storage

    Download this ESG Technical Validation to explore a detailed evaluation of the Pure Storage solution for ransomware mitigation and recovery, and dive deep into how Pure Storage can work with your organization for comprehensive ransomware protection before, during, and after an attack.

  • SIEM, SOAR or both? Our security experts weigh in

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

  • 5 Use Cases for Audit Professionals Take Back Their Time

    Sponsored by: Alteryx

    Is your audit department overworked? Step away from spreadsheet over-dependence and explore five common audit processes you can modernize so your team can spend more time solving analytic problems and less time wrangling and reconciling data. Discover how Alteryx can help.

  • Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.

  • Top IT Predictions in APAC in 2023

    Sponsored by: TechTarget ComputerWeekly.com

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

  • AI tools for software developers: Part One

    Sponsored by: TechTarget ComputerWeekly.com

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

  • Enabling autonomous identity security as a modern approach to IGA

    Sponsored by: SailPoint Technologies

    Managing identities was simpler when you only had to worry about user profiles, but What if machine identities could manage themselves, without presenting a risk for security? Autonomous identity security combines automation with IGA practices to create a system that manages access without the need for human input. Read on to learn more.

  • Finding Value 
 in Complex Cloud Deployments

    Sponsored by: Emma Technologies

    Explore the challenges of managing complex cloud deployments and discover how to streamline operations and maximize value. Learn how a unified cloud management platform can help your enterprise navigate the new frontier of enterprise technology. Read the full white paper.

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

  • CW Europe – June 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.