Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
Customer Experience (Cx) Trends Customer Service Insights In The Genai Era
Sponsored by: ServiceNowDiscover in this e-book 5 revelations about today’s customer service experience that CX leaders need to prepare for in the GenAI era.
-
Containers and storage 101: The fundamentals of container storage
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.
-
Guide to building an enterprise API strategy
Sponsored by: TechTarget ComputerWeekly.comToday's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
-
CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?
Sponsored by: TechTarget ComputerWeekly.comAccording to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
-
Augmented analytics tools: a complete guide
Sponsored by: TechTarget ComputerWeekly.comAugmented analytics tools are designed to simplify the BI and analytics process for business users and citizen data scientists. They've become featured elements in new software releases from BI vendors. This e-guide offers insights into the technology's potential uses and critical issues.
-
A Computer Weekly Buyer's Guide to Internet of Things Security
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
-
10 Steps to Enhance the Agility, Security and Performance of Active Directory
Sponsored by: One IdentityMicrosoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.
-
Harden Your Systems Using CIS and DISA STIGs Benchmarks
Sponsored by: Progress Software CorporationOrganizations face the challenge of securing complex multi-cloud environments. Chef Compliance automates system hardening and compliance with CIS Benchmarks and DISA STIGs. This guide illustrates how you can use Chef Compliance to achieve system hardening by mapping CIS and DISA benchmark standards to automated controls. Dive into the guide here.
-
IT Project: Internet of Things
Sponsored by: TechTarget ComputerWeekly.comThe internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.
-
Public Sector Leaders Discuss IT Infrastructure
Sponsored by: Red HatIn this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.