Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
The Growing Importance of Graph Databases for AI
Sponsored by: Amazon Web ServicesThis white paper aims to guide customers on how they improve the quality of GenAI applications using graphs to significantly enhance the capabilities of GenAI applications, ultimately driving competitive advantages and innovation.
-
Data governance more important now than ever
Sponsored by: TechTarget ComputerWeekly.comAs organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
-
Public Cloud 101: A Complete Guide to Services, Benefits, and Best Practices
Sponsored by: TechTarget Cloud ComputingA public cloud is a third-party managed platform offering global access to resources and services. TechTarget's comprehensive guide explores its history, benefits, challenges, and top services, plus insights on cost reduction, security, and comparisons with private and hybrid clouds.
-
Disaster recovery has never been so easy or important
Sponsored by: TechTarget ComputerWeekly.comDisaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.
-
Identity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comIdentity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
-
Scaling Threat Detection & Response
Sponsored by: CoalitionAs organizations continue to search for new ways to reduce costs while staying better protected, many IT leaders have turned to building their active threat mitigation strategies, including managed detection and response (MDR) tactics. But what exactly is MDR? Browse this guide to learn more.
-
Unified Communication: “It should work as easily as a telephone call!”
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
Time to rekindle the Digital Transformation drive
Sponsored by: TechTarget ComputerWeekly.comThe pandemic has shone a spotlight on the importance of joined up processes where manual intervention is kept to a minimum. In this e-guide we explore how IT spending is shifting to support post coronavirus digital transformation initiatives that connect internal business units and external partners to reduce manual intervention.
-
Time to rekindle the Digital Transformation drive
Sponsored by: TechTarget ComputerWeekly.comThe pandemic has shone a spotlight on the importance of joined up processes where manual intervention is kept to a minimum. In this e-guide we explore how IT spending is shifting to support post coronavirus digital transformation initiatives that connect internal business units and external partners to reduce manual intervention.
-
Strategic IT Management: Balancing Innovation and Operations with the Help of an MSP
Sponsored by: AdvancedHow do operational and strategic IT differ? Along with exploring how the approaches are unique, this e-book highlights the importance of balancing them—and how an MSP can support your business with that endeavor.