ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"

  • The Growing Importance of Graph Databases for AI

    Sponsored by: Amazon Web Services

    This white paper aims to guide customers on how they improve the quality of GenAI applications using graphs to significantly enhance the capabilities of GenAI applications, ultimately driving competitive advantages and innovation.

  • Data governance more important now than ever

    Sponsored by: TechTarget ComputerWeekly.com

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

  • Public Cloud 101: A Complete Guide to Services, Benefits, and Best Practices

    Sponsored by: TechTarget Cloud Computing

    A public cloud is a third-party managed platform offering global access to resources and services. TechTarget's comprehensive guide explores its history, benefits, challenges, and top services, plus insights on cost reduction, security, and comparisons with private and hybrid clouds.

  • Disaster recovery has never been so easy or important

    Sponsored by: TechTarget ComputerWeekly.com

    Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.

  • Identity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

  • Scaling Threat Detection & Response

    Sponsored by: Coalition

    As organizations continue to search for new ways to reduce costs while staying better protected, many IT leaders have turned to building their active threat mitigation strategies, including managed detection and response (MDR) tactics. But what exactly is MDR? Browse this guide to learn more.

  • Unified Communication: “It should work as easily as a telephone call!”

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

  • Time to rekindle the Digital Transformation drive

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic has shone a spotlight on the importance of joined up processes where manual intervention is kept to a minimum. In this e-guide we explore how IT spending is shifting to support post coronavirus digital transformation initiatives that connect internal business units and external partners to reduce manual intervention.

  • Time to rekindle the Digital Transformation drive

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic has shone a spotlight on the importance of joined up processes where manual intervention is kept to a minimum. In this e-guide we explore how IT spending is shifting to support post coronavirus digital transformation initiatives that connect internal business units and external partners to reduce manual intervention.

  • Strategic IT Management: Balancing Innovation and Operations with the Help of an MSP

    Sponsored by: Advanced

    How do operational and strategic IT differ? Along with exploring how the approaches are unique, this e-book highlights the importance of balancing them—and how an MSP can support your business with that endeavor.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.