ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=20start=30start=10start=30"

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    Sponsored by: TechTarget ComputerWeekly.com

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

  • Tools Designed for Security Could Be Your Biggest Security Threat

    Sponsored by: Tanium

    How can your organization’s cybersecurity tools become cybersecurity threats? Through tool sprawl. In this white paper, learn how to tackle that issue in three steps.

  • Minimum Viable Governance

    Sponsored by: ModelOp

    Enterprises must implement AI governance programs to address risks and prepare for regulations like the EU AI Act. This white paper outlines a "Minimum Viable Governance" framework to inventory AI systems, enforce light controls, and report on AI usage and risks - without stifling innovation. Read the full white paper now to learn more.

  • Focus: Artificial intelligence in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    This special report gives IT leaders a guide to the latest thinking in AI and machine learning, and looks at how these technologies could help in areas such as security, mobile, customer engagement - and even within the IT department itself.

  • CW APAC – Tech Career Guide: Artificial intelligence

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence roles abound in the era of digitisation. In this handbook, focused on AI in the Asia-Pacific region, Computer Weekly looks at AI ethics, how to make it as a machine learning engineer, Accenture's push for tech talent and cyber security research lab advice.

  • Scaling B2B Demand for Authentic Connections

    Sponsored by: BrightTALK by TechTarget

    In this eBook, learn how to effectively reach and convert targets at scale. Download your copy to explore new perspectives and methodologies on how to balance the crucial and competing needs for scale and depth of connections with your audience.

  • CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment

    Sponsored by: TechTarget ComputerWeekly.com

    Business can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.

  • MicroScope – October 2020: Get in touch with remote network security

    Sponsored by: MicroScope

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

  • The future of enterprise IT: Social, social, mobile, analytics and cloud

    Sponsored by: TechTarget ComputerWeekly.com

    Cloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.

  • Why Businesses Must Plan for Succession

    Sponsored by: Paycom

    Succession planning is critical, yet only 21% of companies have a plan in place. This guide offers 7 strategies to prepare, including starting loose, checking egos, and developing talent. Plan now so your business can thrive for decades. Read the full white paper for insights to ensure continuity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.