Advance AI Data Security and Collaboration in Healthcare
By: Intel View more from Intel >>
Download this next:
Computer Weekly – 25 July 2023: Getting comfortable with data
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, we talk to “Data Bob” – the head of IT at furniture retailer DFS – about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the widespread breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.
These are also closely related to: "Advance AI Data Security and Collaboration in Healthcare"
-
America's Amphetamine Problem, Beyond the Pharmaceutical Supply Chain
By: XtelligentMedia Healthcare
Type: eGuide
Drugs used to treat ADHD have been lacking for months now, leading to problems with access to prescription amphetamines and creating questions about the cause of the massive shortage.
Download the article to know more.
-
CW ANZ, November 2018: Exploring blockchain
By: TechTarget ComputerWeekly.com
Type: Ezine
Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Also in this issue:
Australia’s healthcare sector reports most data breaches for second time
In the first full quarter since Australia’s mandatory breach disclosure scheme came into effect, the highest number of data breaches came from healthcare providers, amid controversy over the national health record system.
Australian government digital agency trials Microsoft secure cloud service
Digital Transformation Agency employees will have access to Exchange Online, SharePoint, Skype for Business and several Azure services via Microsoft Office 365.
New Zealand ready to conduct national cyber security exercise after year delay
The country has begun testing the cyber resilience of its critical national infrastructure this month, bringing together multiple agencies to protect assets of national significance.
Find more content like what you just read:
-
Cutting the cord to leverage third-party support
By: Spinnaker Support
Type: White Paper
As companies look to leverage third-party support providers for solutions like Oracle, agreeing that they can help restore higher quality service (including reducing the cost of maintenance fees by at least 50%), many can be unsure of what provider is best fit for them. Access this white paper to learn more.
-
Examining the Healthcare Industry's Potential for Confidential Computing
By: XtelligentMedia Healthcare
Type: eGuide
Confidential computing will become key to protecting patient data as healthcare organizations seek to leverage cloud computing environments.
-
CW Middle East Oct to Dec 2016
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.
-
Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
-
Computer Weekly – 7 June 2022: Using technology to reinvent shopping
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.
-
Computer Weekly - 2 February 2021: Business intelligence helps ambulance service's pandemic response
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how one ambulance service is using business intelligence tools to join up datasets to improve its response to the Covid-19 pandemic. Our latest buyer's guide examines video conferencing and collaboration. And we look at the benefits of real-time streaming data analytics. Read the issue now.
-
CW Nordics November 2016
By: TechTarget ComputerWeekly.com
Type: Ezine
This quarter, we look at the impact of Nokia layoffs on Finland, and in particular the city of Espoo which is home to both Nokia and Microsoft's Finnish headquarters. We also look at how Denmark's Bang & Olufsen is taking control of sales data with cloud-based software.
-
The Cycle of Healthcare Data: Creation, Gathering, and Handling
By: XtelligentMedia Healthcare
Type: eGuide
Understanding data generation, collection, and processing can guide stakeholders looking to tackle various data analytics projects in healthcare.
-
Empowering enterprises with AI: Entering the era of choice
By: Dell Technologies & AMD
Type: White Paper
This white paper explores how Dell and AMD are democratizing AI by making it more accessible to enterprises. It highlights how their solutions can enable real-time AI workflows, ensure data security, and scale cost-effectively. Read the full paper now to learn how you can leverage AI to transform your business.
-
Computer Weekly – 18 July 2023: Soaring ahead with data at Rolls-Royce
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how aerospace giant Rolls-Royce uses data to improve its competitive advantage. We examine the benefits and best practices in software-defined storage. And we analyse calls for a review of laws around the use of computer evidence prompted by the Post Office IT scandal. Read the issue now.
-
Computer Weekly – 12 November 2024: Innovating with weather data at the Met Office
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how the Met Office is using its vast stores of weather data to create innovative new products. Our latest buyer's guide looks into identity and access management systems. And we examine the geopolitical threats that could curb the openness of open source. Read the issue now.
-
CW EMEA: Investing in the future
By: TechTarget ComputerWeekly.com
Type: Ezine
There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.
-
Combat threats with an in-depth security stance that begins with Dell PowerEdge servers, powered by Intel® Xeon® Scalable processors.
By: Dell Technologies and Intel
Type: White Paper
As data is accessed across devices, on-premises and in the cloud, high-impact data breaches continue to mount. To maintain a more secure environment, businesses must be more comprehensive in their approach. Access this white paper now to learn how.
-
10 Properties Of Secure Medical Systems
By: Wind River
Type: eBook
This white paper outlines 10 key security principles for designing secure medical systems, including data encryption, secure boot, hardware partitioning, and input validation. Implementing these principles can help protect against cyberattacks and safeguard patient health. Read the full white paper to learn more.
-
Google Cloud virtual machine instances powered by AMD
By: Google Cloud & AMD
Type: Product Overview
Google Cloud virtual machine instances powered by AMD are designed to provide competitive performance and a range of options to help customers optimize their workloads for cost-efficiency. Download this overview to unlock 5 Reasons Why AMD Epyc Processors matter for Google Cloud.
-
Innovation Awards APAC 2023 - Healthcare: Zuellig Pharma
By: TechTarget ComputerWeekly.com
Type: eGuide
Zuellig Pharma saw the lack of advanced analytics and trusted data platforms in the healthcare sector and built an offering to plug the gaps and help pharmaceutical companies enhance customer engagement. The platform has already helped one organisation better understand user behaviour and gain customer loyalty.
-
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
By: TechTarget ComputerWeekly.com
Type: Research Content
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
-
Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.
-
Jargon Buster Guide to Post Quantum Cryptography
By: TechTarget ComputerWeekly.com
Type: eGuide
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
-
3 principles for equitable AI use in healthcare
By: The Advisory Board
Type: eBook
This market insights report examines 3 principles for the equitable use of AI in healthcare: avoiding bias in model design, emphasizing equitable access and trust in deployment, and embedding affordability in model financing. Read the full report to learn how healthcare organizations and vendors can promote health equity with AI.
-
Confidential VMs - a security breakthrough for medical device software
By: Google Cloud & AMD
Type: Blog
Discover in this blog post how a Confidential Virtual Machine, a type of N2D Compute Engine VM running on processors using AMD’ Secure Encrypted Virtualization, can help healthcare organizations keep sensitive code and confidential data secure during processing, no matter where healthcare devices may be.
-
How AI is Impacting Healthcare
By: XtelligentMedia Healthcare
Type: eGuide
President Biden's executive order focuses on the importance of secure and reliable Artificial Intelligence (AI) in various sectors, including healthcare.
-
Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
-
What edge computing looks like in 2024
By: Red Hat and Intel
Type: White Paper
This paper describes how Red Hat and Intel combine leading microprocessor hardware and open source software to address edge computing challenges. Read the paper here.
-
Trusted AI practices for secure and reliable business operations
By: OpenText
Type: White Paper
Explore how trusted AI practices can help organizations harness the full potential of AI while mitigating cybersecurity risks. Learn about enhancing trust through data security, access control, and application security measures. Download the white paper to discover strategies for future-proofing your AI investments.
-
Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.
-
Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
-
Computer Weekly - 26 April 2022: The latest salary trends for IT professionals
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the results of our annual salary survey show pay returning to pre-pandemic levels and work-life balance a growing consideration. As sustainability becomes a critical issue, we look at how datacentres can meet emissions targets. And we find out how IT leaders can help protect children online. Read the issue now.
-
Understanding FedRAMP cloud security requirements and options
By: Cisco
Type: Gartner Research Report
SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.
-
Navigating the Ethical Considerations of AI in Behavioral Health
By: Kipu Health
Type: eBook
As AI transforms healthcare, ethical considerations are critical to ensure patient privacy, fairness, transparency, and appropriate usage. This e-book explores a framework for implementing ethical AI in behavioral health, covering key principles and best practices. Read the full e-book to learn how to harness the power of AI responsibly.
-
FStech & Red Hat Research Report AI In Financial Services: Trends, Strategies And Challenges
By: Red Hat
Type: Research Content
AI is transforming financial services, with applications in areas like trading, cybersecurity, and risk analysis. This research report explores AI adoption trends, challenges, and use cases. Read on now to learn how your organization can leverage AI to drive innovation and sustainability.
-
Analyst report: Security goals & decision-making tips
By: ARG, Inc.
Type: Analyst Report
Inside ARG’s “Cybersecurity Market Insights & Decision Guide,” you can discover three goals on which to focus in order to minimize the impact of a cybersecurity incident.
-
CW Europe – December 2017
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
-
Cloud computing storage key management
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
Apple device security for beginners
By: JAMF
Type: White Paper
A cyberattack or an accidental malware download can mean the difference between a productive day and all work grinding to a halt. At the heart of these security concerns is the employee device, and this white paper outlines a guide to Apple Device Security for beginners so that you can prevent a security incident. Read on to learn more.
-
The fast-changing, symbiotic evolution of HPC and AI
By: Dell Technologies and Intel
Type: Research Content
Enterprises are at a crossroads—a juncture where High Performance Computing (HPC) and Artificial Intelligence (AI) intersect. This convergence isn’t mere happenstance; it’s a strategic imperative. Access this research content now to learn why.
-
Increasing healthcare efficiency with utilization management
By: XSOLIS
Type: White Paper
There is a black hole of administrative spending and waste in utilization management (UM) that should be improved, but for which traditional solutions have not proven to be effective. It’s time for healthcare organizations to try a new strategy. Read on to learn about the quantified benefits of an AI-driven UM platform.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
By: TechTarget ComputerWeekly.com
Type: eGuide
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Cybersecurity ABCs: EDR, XDR, and MDR Explained
By: Adlumin
Type: eGuide
This e-book explores how AI enhances cybersecurity by quickly analyzing data, detecting anomalies, and automating processes. Learn how AI can improve threat detection, triage, investigation, and response to strengthen your security posture. Read the full e-book to discover the benefits of AI-powered cybersecurity.
-
Computer Weekly - 14 December 2021: The rules for a safer internet
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
-
How to get the best value from Office 365
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.
-
CW Europe - March-May 2020: Experts examine Dutch government’s IT problems
By: TechTarget ComputerWeekly.com
Type: Ezine
Technology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.
-
Create a production-ready AI environment in 6 steps
By: Red Hat
Type: eBook
In this e-book, you’ll discover how you can leverage the transformative power of artificial intelligence (AI), machine learning (ML), and deep learning (DL) to make the most of your data. Read on to learn how you can overcome the most troublesome deployment challenges and build a production-ready AI/ML environment.
-
Top considerations for building a production-ready AI/ML environment
By: Red Hat
Type: eBook
Artificial intelligence and machine learning (AI/ML) technologies employ data to deliver business insights, automate tasks, and advance system capabilities. This e-book shows how organizations across industries are using Red Hat technologies to build AI/ML solutions that deliver real business value.
-
How to deliver business value with AI/ML
By: Red Hat
Type: eBook
Download this e-book to learn the 6 essential steps to building a production-ready AI/ML environment.
-
The state of edge computing in higher education 2023
By: Schneider Electric
Type: Research Content
Access this research content to learn why higher ed institutions expect edge computing to be key for success moving forward – from creating a competitive advantage to bridging the digital divide for students and enhancing the student experience.
-
CISSP Exam Guide Chapter 1 sample download
By: McGraw Hill
Type: White Paper
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.