Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
Aws For Migration Migrate And Modernize With Effectual
Sponsored by: AWS & EffectualThis e-book explores how organizations are migrating and modernizing on Amazon Web Services (AWS) to achieve business advantages like higher productivity and faster time to market. Read on now to learn about Effectual's streamlined approach to AWS migration, including assessment, mobilization, and migration phases.
-
The Managed Detection And Response Landscape, Q1 2023
Sponsored by: BitdefenderOrganizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
A Computer Weekly Buyer's Guide to Containers and Microservices
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
-
CW Middle East - October-December 2021: Middle East hospitals accelerate take-up of healthcare technologies
Sponsored by: TechTarget ComputerWeekly.comThe Middle East is accelerating its take-up of digital healthcare technologies following lessons learned during the Covid-19 pandemic, with regional government turning to technology to track disease trends and monitor treatment.
-
Preventing identity theft in a data breach
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
The top 5 generative AI questions on every executive’s mind
Sponsored by: AWSGenerative Al is changing daily, making it increasingly critical for every business to learn what it can do and how it fits into their operations. View “The Top 5 Generative AI Questions on Every Executive’s Mind,” an infographic from AWS, to quickly build your understanding & accelerate adoption at your organization.
-
Digital Experience platforms intensify customer engagement programmes
Sponsored by: TechTarget ComputerWeekly.comDigital Experience Management platforms are developing and becoming more sophisticated as companies seek to intensify relationships with customers in order to gain competitive advantage against their peers. Improving customer experience will only become evermore important as companies endeavor to navigate an increasingly turbulent economy.
-
A Computer Weekly buyer's guide to satellite broadband
Sponsored by: TechTarget ComputerWeekly.comHigh-speed internet connectivity has become an essential utility for much of the world's population. In this 16-page buyer's guide, Computer Weekly looks at what makes the industry largely recession-proof, the obstacles 5G's roll-out must overcome and how reductions in satellite costs have boosted space-borne projects and services' popularity.
-
Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.