ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • Defining the datacentre needs of 21st century enterprises

    Sponsored by: TechTarget ComputerWeekly.com

    This guide is designed to provide IT leaders with some insight into how their peers are addressing current problems through the use of cloud and colocation, and shine a light on how the analyst community sees the role of the datacentre changing over time.

  • CW ASEAN: Time to dial up defences

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

  • 2023 Health System Sector Industry Trends

    Sponsored by: The Advisory Board

    In the wake of the worst financial year in recent memory, 2023 was a story of resilience for health systems. On top of that, the entrance of generative AI tools (some valuable, others not), along with value-based care, has encouraged caution when investing in hyped healthcare technology. Learn about these trends, and 7 others, in this report.

  • A Computer Weekly E-Guide to Network Management & Monitoring

    Sponsored by: TechTarget ComputerWeekly.com

    Covid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.

  • Domain Name System (DNS) Security

    Sponsored by: Cisco

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

  • A Strategic Approach To Maintaining PCI DSS 4.0 Compliance

    Sponsored by: Cloudflare

    As PCI DSS 4.0 brings new compliance requirements, organizations need a streamlined approach to address them. This whitepaper outlines how Cloudflare's connectivity cloud can help you meet PCI DSS 4.0 with security, visibility, and automation. Read the full whitepaper to learn more.

  • Essential Guide: Securing hybrid IT infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

  • IT Priorities 2020: India

    Sponsored by: TechTarget ComputerWeekly.com

    As an IT powerhouse, India continues to be the pace setter for growth in Asia-Pacific's IT industry. In this guide to IT Priorities in 2020, find out what 243 Indian IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.

  • The CIO’s Guide to Identity-Driven Optimization

    Sponsored by: Okta

    For a 9-page guide to identity-driven optimization for CIOs, tap into this white paper that explores harnessing a universal control plane, balancing security and usability, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.