Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=10"
-
Data Modeling Guidebook
Sponsored by: HighByteDigital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.
-
CW ASEAN: European data law - be aware and prepare
Sponsored by: TechTarget ComputerWeekly.comBusinesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
-
CW500: Key trends for IT leaders in 2017 – skills, careers and recruitment
Sponsored by: TechTarget ComputerWeekly.comA look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Chris Chandler, head of executive search at La Fosse Associates, discussing the skills, recruitment and career development issues affecting IT leaders.
-
Explore the CMS interoperability and prior authorization rule
Sponsored by: ZeOmegaThe CMS Interoperability and Prior Authorization final rule is here, with new requirements for Medicare Advantage, Medicaid, and CHIP plans. Learn how ZeOmega's HealthUnity platform can help you comply and streamline payer-provider collaboration. Read the full details.
-
2024 PKI and Post-Quantum Trends Study
Sponsored by: Entrust, Inc.In this report, Ponemon Institute presents the findings based on a survey of 2,176 IT and IT security personnel who are involved in their organizations’ enterprise PKI, distilling the findings in order to provide you with essential guidance. Read now to learn more.
-
Jargon Buster Guide to Container Security
Sponsored by: TechTarget ComputerWeekly.comThe definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
-
A Computer Weekly Buyer's Guide to Converged Infrastructure
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how the technology cuts the numbers of discrete skills and associated costs while demanding that those who remain retrain to ensure they know how to manage all parts of the stack – and the organisation implements it with care and an understanding of the risks.
-
RSA Conference 2020 guide: Highlighting security's human element
Sponsored by: TechTarget ComputerWeekly.comThe theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
-
Digital Transformation In HR: The 10-Step Guide
Sponsored by: SageThis 10-step guide provides a comprehensive approach to digital transformation in HR, from aligning goals to the business, to building a business case, and experimenting with new technologies. Learn how to drive business resilience and create amazing hybrid work experiences. Read the full Buyer's Guide.
-
Object storage: A great fit for large, unstructured data sets
Sponsored by: TechTarget ComputerWeekly.comObject storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.