Search Results for: Business-Continuity

CW APAC: Expert advice on zero-trust security
Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

TechTarget ComputerWeekly.com

CW Nordics - May-July 2021: Denmark takes a top-down approach to gender equality in tech entrepreneurship
Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.

TechTarget ComputerWeekly.com

9 essential elements of network security
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

TechTarget ComputerWeekly.com

Digital Transformation: Part I
In this presentation from our CW500 event, director of digital architecture and transformation Chris Boyd explains how Telefonica tackled the challenges of delivering people, cultural and organisational change.

TechTarget ComputerWeekly.com

SHEDDING LIGHT ON OEM STORAGE SUPPORT
If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.

Service Express

Datacentre design: Building leaner, greener server farms
The need for energy efficiency, resiliency and security have, for many years, been the driving forces behind the way that operators have approached building their datacentres. In this e-guide, we take a look at how the need for energy efficiency and sustainability is altering the way operators approach their datacentre builds and designs.

TechTarget ComputerWeekly.com

How Van Horn Improves Employee Training By 20%
“Amaze Our Customers”: This is Van Horn Automotive Group’s philosophy. To continue fulfilling that mission, Van Horn set out to transform its communications system. This case study maps out the journey, breaking down how, in addition to modernizing its communications, Van Horn improved its onboarding training. Read on for more details.

T-Mobile for Business

Computer Weekly – 6 August 2019: Using tech to boost staff morale
In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.

TechTarget ComputerWeekly.com

How MicroBilt Corporation Harnesses MDR to Reduce Risk and Ensure Regulatory Compliance
MicroBilt, a credit data and risk management solutions firm, turned to CyberMaxx's managed detection and response (MDR) services to enhance security, ensure regulatory compliance and reduce risk. Learn how this partnership enabled MicroBilt to strengthen its security posture in this case study.

CyberMaxx

Why Open Source Artificial Intelligence Platforms Help Enterprise Business Transformation
Open source AI platforms can help enterprises accelerate AI/ML adoption and overcome challenges like lack of MLOps tools. Learn how an open hybrid AI/ML platform like Red Hat OpenShift AI can enable flexibility, portability, and faster time to value. Read the full analyst report.

TOPICS: .NET
Red Hat