ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"

  • Time to rekindle the Digital Transformation drive

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic has shone a spotlight on the importance of joined up processes where manual intervention is kept to a minimum. In this e-guide we explore how IT spending is shifting to support post coronavirus digital transformation initiatives that connect internal business units and external partners to reduce manual intervention.

  • IT Priorities 2020: India

    Sponsored by: TechTarget ComputerWeekly.com

    As an IT powerhouse, India continues to be the pace setter for growth in Asia-Pacific's IT industry. In this guide to IT Priorities in 2020, find out what 243 Indian IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • A Compact Guide to Retrieval Augmented Generation (RAG)

    Sponsored by: DataBricks

    Discover how Retrieval Augmented Generation (RAG) can enhance large language models by providing relevant external information to improve accuracy and reduce hallucinations. Learn the key components and use cases of RAG with vector search. Read the full e-book to learn more.

  • Generative AI + Healthcare Guidebook

    Sponsored by: AWS Marketplace

    To improve patient outcomes, healthcare organizations are turning to generative artificial intelligence (GenAI). This guidebook answers six questions to help healthcare organizations in the early stages of their generative AI journey. Download now.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • Full visibility and real-time threat response: Helping retailers achieve proactive IT Security

    Sponsored by: Tanium

    Hackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.

  • Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.

  • CW ASEAN, November 2018: Blockchain is no 'magic wand' for security

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.

  • Security 360: Annual Trends Report 2024

    Sponsored by: JAMF

    Jamf's annual security report analyzes the evolving threat landscape, evaluating device, application, malware, and web-based risks. It provides best practices to improve security posture, including managing vulnerabilities, implementing defense-in-depth, and aligning with compliance standards. Read the full report to secure your modern workplace.

  • Modernize to Innovate

    Sponsored by: Red Hat

    Download this e-book to explore the value of open, trusted partner ecosystems for telco modernization and highlights key partnerships in 6 essential areas.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.