Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
In-Building Wireless Solution Guide
Sponsored by: PanduitWireless connectivity continues to make meaningful penetration into networks, unlocking performance and transforming the way your people work.Dive into this Panduit solution guide for an overview of in-building wireless solutions, including:Panduit Fault Managed Power SystemThe SmartZone Uninterruptible Power SupplyThe SmartZone G5 iPDUs
-
How AI is Impacting Healthcare
Sponsored by: XtelligentMedia HealthcarePresident Biden's executive order focuses on the importance of secure and reliable Artificial Intelligence (AI) in various sectors, including healthcare.
-
Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
Sponsored by: XtelligentMedia HealthcareThe collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.
-
Identifying Use Cases For Ai In Procurement Turning Vision Into Reality
Sponsored by: GEPBy 2026, Gartner predicts, over 80% of businesses will have leveraged generative AI–powered application program interfaces or models. So, what will this massive adoption mean for procurement organizations? In this 15-page white paper, discover AI use cases for procurement leaders.
-
AI For Cyber Defense
Sponsored by: CyberMaxxFor a deep dive on the relationship between AI and cyber defense, check out this 14-page e-book by SVP of Security Operations at CyberMaxx, Gary Monti.
-
A Computer Weekly Buyer's Guide to Converged Infrastructure
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how the technology cuts the numbers of discrete skills and associated costs while demanding that those who remain retrain to ensure they know how to manage all parts of the stack – and the organisation implements it with care and an understanding of the risks.
-
The Secure Access Maturity Model
Sponsored by: StrongDMIn order to provide an action-oriented approach to reducing the threat posed by all of those credentials, StrongDM built the Secure Access Maturity Model (SAMM).Download this white paper to unlock the full model and use it as a framework to evaluate your identity security systems, and guide you toward secure access maturity.
-
Top trends shaping APAC's tech landscape in 2024
Sponsored by: TechTarget ComputerWeekly.comWhile GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.
-
A Computer Weekly Buyer's Guide to Next-Generation Storage
Sponsored by: TechTarget ComputerWeekly.comStorage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.
-
Computer Weekly - 23 February 2021: Computers in space - managing a datacentre on the ISS
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the International Space Station gets a datacentre upgrade, we look at the challenges of system maintenance in space. As nation states increase their cyber attacks, we assess the risk for businesses. And our latest buyer's guide looks at the colocation market. Read the issue now.