Search Results for: top17

A guide to platform agnostic application delivery
There is no single answer to the question of how to run applications independent of the underlying hardware. In this e-guide, we explore options for application virtualisation.

TechTarget ComputerWeekly.com

Backup still fundamental but the cloud changes things
In this e-guide we round up the key ways backup has changed since tape was king and look at developments such as backup appliances, the use of the cloud as a backup target and even the need for backups to protect your workloads in the cloud.

TechTarget ComputerWeekly.com

How to Build a Proactive Compliance Program with Identity Security
This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.

TOPICS: .NET
CyberArk

CIO Trends #9: Benelux
In this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.

TechTarget ComputerWeekly.com

The Enterprise Chatbot Guidebook
This comprehensive guidebook explores enterprise chatbots and conversational AI, outlining how they can automate customer service, increase sales, and boost efficiency. Learn about the history, key features, and real-world use cases across industries. Download the e-book to discover how AI-powered chatbots can transform your customer experience.

Boost.ai

Key Considerations for Securing Different Non-human Identities
Today's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.

TOPICS: .NET
CyberArk

Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?
In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

TechTarget ComputerWeekly.com

CW Middle East January-March 2020: Digital leads the way at Abu Dhabi oil giant
In this issue of CW Middle East, read how the UAE and the Abu Dhabi National Oil Company have recognised that things will change as oil and gas resources dwindle. Digital technology, such as artificial intelligence, has been identified as a key driver for future industries.

TechTarget ComputerWeekly.com

MicroScope - December 2021: Valuing the MSP
In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.

MicroScope

Implementing GenAI: Use cases & challenges
The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.

TechTarget ComputerWeekly.com