Search Results for: Office

Computer Weekly – 10 October 2017: The most influential women in UK IT
In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.

TechTarget ComputerWeekly.com

Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.

TechTarget ComputerWeekly.com

Empower Your Analytics In The Cloud
In this e-book, you’ll discover how the partnership between SAS and Microsoft can help organisations unlock the potential of the cloud to deliver cost savings and innovation, including 5 real world use cases across a variety of industries. Read on to learn how your organisation can accelerate your cloud analytics and AI journey.

TOPICS: .NET
SAS

Introducing Endace Network History
Though they deliver great power, advancing networks also present monitoring challenges. Endace’s response to these challenges is Network History. How does Network History work? It records copies of the packets that traverse your network, allowing you to gain insights from them when an attack strikes. Learn more about the tool in this overview.

TOPICS: .NET
Endace

Truman Medical Centers/ University Health Charts Big Improvements In Clinician Communication And Satisfaction With Single Mobility Investment
Giving nurses, doctors and other staff one key clinical mobile device has improved care team satisfaction by 35% – and that’s just one of the many benefits realized so far. Explore the benefits of a single mobility investment in this case study.

TOPICS: .NET
Zebra Technologies

Protecting Against Compromised Accounts in Email
In a single month alone, Checkpoint HEC researchers saw 1,345 unique compromised accounts. In this whitepaper, HEC will discuss how to prevent account takeover from taking control of your business by giving you tips and strategies you can implement to improve security. Read on to learn more.

TOPICS: .NET
Checkpoint Software Technologies

Computer Weekly – 5 October 2021: The most influential women in UK technology
In this week's Computer Weekly, we reveal the 50 women chosen as the most influential in UK technology for 2021, and talk to the 10th winner of our annual list – Poppy Gustafsson, CEO of Darktrace. Also, our latest buyer's guide looks at digital customer experience technologies. Read the issue now.

TechTarget ComputerWeekly.com

Case Study: Southern Water's centralised data team geared for silo busting
Southern Water has centralised its data specialists and overhauled its data management and business intelligence technology to support business decision-making at scale

TechTarget ComputerWeekly.com

What DORA Means for Financial Entities in the EU
In January of 2025, the EU will begin enforcing the Digital Operational Resilience Act (DORA). This guide provides a more detailed breakdown of the compliance law and provides you with the information and resources you need to prepare your organization to meet the regulations. Access now to learn more.

TOPICS: .NET
Sonatype

TeamViewer Tensor: A Remote Access And Support Solution For The Modern Campus
Educational institutions must find ways to improve the efficiency, productivity, and cost of their operations, without sacrifices to the student experience. In this white paper, discover the benefits of TeamViewer Tensor, a remote access and support solution, by exploring its uses on a typical campus.

TOPICS: .NET
TeamViewer