Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=10"
-
ITOps & service management: The state of play in APAC
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide on ITSM in APAC, find out how to keep IT operations running to empower a remote workforce, the advantages of cloud-based service management tools and how one Australian company is managing IT incidents amid a shorter development lifecycle.
-
Scaling B2B Demand for Authentic Connections
Sponsored by: BrightTALK by TechTargetIn this eBook, learn how to effectively reach and convert targets at scale. Download your copy to explore new perspectives and methodologies on how to balance the crucial and competing needs for scale and depth of connections with your audience.
-
What distinguishes Medicare Parts A, B, C, and D from one another?
Sponsored by: XtelligentMedia HealthcareMedicare includes four different segments that each insure a wide variety of services and supplies for enrollees.
-
The ultimate guide to identity & access management
Sponsored by: TechTarget ComputerWeekly.comBusinesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
-
The ultimate guide to data preparation
Sponsored by: TechTarget ComputerWeekly.comPoor data equates to wrong decisions, bias in the AI algorithm and flawed decision-making. What's more, data that personally identifies an individual can only be used in very specific ways, as stipulated by GDPR. Read about data preparation in this e-guide.
-
Raspberry PI with Java: programming the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
-
Cloud computing storage key management
Sponsored by: TechTarget ComputerWeekly.comJagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
CW Middle East - October-December 2020: Egypt's datacentre plans take a step forward
Sponsored by: TechTarget ComputerWeekly.comWhile it builds an IT services industry, Egypt is also investing in infrastructure and now plans to develop a datacentre industry. Read in this issue how, as part of this plan, Egypt's parliament has passed a data protection law.
-
The Optum 2024 Revenue Cycle Denials Index
Sponsored by: OptumThis research report analyzes national healthcare claim denial trends, with strategies to help providers decrease their denial rate. Discover actionable insights to identify, prioritize, and prevent denials across the revenue cycle. Read the full report to learn how to improve your organization's performance.
-
Improve security and compliance
Sponsored by: Red HatSecure your Linux environment with Red Hat's effective approach to vulnerability identification, remediation, and compliance management. Learn best practices and explore integrated tools like Insights and Satellite. Read the full e-book to boost your security and compliance.