Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"
-
Time to rekindle the Digital Transformation drive
Sponsored by: TechTarget ComputerWeekly.comThe pandemic has shone a spotlight on the importance of joined up processes where manual intervention is kept to a minimum. In this e-guide we explore how IT spending is shifting to support post coronavirus digital transformation initiatives that connect internal business units and external partners to reduce manual intervention.
-
IT Priorities 2020: India
Sponsored by: TechTarget ComputerWeekly.comAs an IT powerhouse, India continues to be the pace setter for growth in Asia-Pacific's IT industry. In this guide to IT Priorities in 2020, find out what 243 Indian IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.
-
A Compact Guide to Retrieval Augmented Generation (RAG)
Sponsored by: DataBricksDiscover how Retrieval Augmented Generation (RAG) can enhance large language models by providing relevant external information to improve accuracy and reduce hallucinations. Learn the key components and use cases of RAG with vector search. Read the full e-book to learn more.
-
Generative AI + Healthcare Guidebook
Sponsored by: AWS MarketplaceTo improve patient outcomes, healthcare organizations are turning to generative artificial intelligence (GenAI). This guidebook answers six questions to help healthcare organizations in the early stages of their generative AI journey. Download now.
-
Security analytics: Enabling organisations to get ahead of attackers
Sponsored by: TechTarget ComputerWeekly.comIn the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.
-
Full visibility and real-time threat response: Helping retailers achieve proactive IT Security
Sponsored by: TaniumHackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.
-
Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
-
CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
Sponsored by: TechTarget ComputerWeekly.comBlockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
-
Security 360: Annual Trends Report 2024
Sponsored by: JAMFJamf's annual security report analyzes the evolving threat landscape, evaluating device, application, malware, and web-based risks. It provides best practices to improve security posture, including managing vulnerabilities, implementing defense-in-depth, and aligning with compliance standards. Read the full report to secure your modern workplace.
-
Modernize to Innovate
Sponsored by: Red HatDownload this e-book to explore the value of open, trusted partner ecosystems for telco modernization and highlights key partnerships in 6 essential areas.