ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=10"

  • A Computer Weekly buyer's guide to anti-ransomware

    Sponsored by: TechTarget ComputerWeekly.com

    The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.

  • CW APAC, July 2020: Trend Watch: Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.

  • CW Middle East Oct to Dec 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.

  • CW ASEAN: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

  • GEP Outlook 2024

    Sponsored by: GEP

    Recent years have had businesses struggling with a myriad of challenges, risks, and concerns, especially for procurement and supply chain leaders. So, how are companies transforming? What trends can you expect going into the new year and how can you best keep up? Browse the report to learn more.

  • Jargon Buster Guide to Unified Communications

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.

  • The DevSecOps Playbook Practical Steps for Producing Secure Software

    Sponsored by: Veracode, Inc.

    What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

  • Transforming software development with generative AI Develop faster and more securely with Amazon CodeWhisperer

    Sponsored by: AWS

    The eBook “Transforming Software Development with Generative AI” addresses the challenges faced by development teams as organizations make greater use of software to transform their businesses. The solution for many dev teams is Amazon CodeWhisperer, the real-time generative artificial intelligence (AI) coding companion.

  • Artificial intelligence in ITSM: Finding the right tools for you

    Sponsored by: TechTarget ComputerWeekly.com

    AI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.