NN Reports

Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jan 2021

TechTarget ComputerWeekly.com

Top 10 ASEAN IT stories of 2017
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this review of the top 10 Computer Weekly articles on IT in ASEAN, we look at what countries across the region are doing to drive adoption of emerging technologies such as artificial intelligence (AI) and the internet of things (IoT), raise their cyber security capabilities amid growing cyber threats, and draw more women into the IT industry.
Posted: 08 Feb 2021 | Published: 15 Jan 2018

TechTarget ComputerWeekly.com

2025 Technology Spending Intentions Study EMEA
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE: TechTarget and Enterprise Strategy Group are conducting a survey to better understand the current state of technology spending in organizations.We highly value your input and appreciate your time. With your commentary, we can improve our coverage of this subject for you and your peers.
Posted: 22 Aug 2024 | Published: 23 Aug 2024

TechTarget ComputerWeekly.com

2025 Technology Spending Intentions Study UKI
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE: TechTarget and Enterprise Strategy Group are conducting a survey to better understand the current state of technology spending in organizations.We highly value your input and appreciate your time. With your commentary, we can improve our coverage of this subject for you and your peers.
Posted: 22 Aug 2024 | Published: 23 Aug 2024

TechTarget ComputerWeekly.com

2025 Technology Spending Intentions Study APAC
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE: TechTarget and Enterprise Strategy Group are conducting a survey to better understand the current state of technology spending in organizations.We highly value your input and appreciate your time. With your commentary, we can improve our coverage of this subject for you and your peers.
Posted: 22 Aug 2024 | Published: 23 Aug 2024

TechTarget ComputerWeekly.com

Top 10 Australian IT stories of 2017
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to improve work productivity, upgrade its supercomputing infrastructure, harness the internet of things to improve business operations and realise its space ambitions.
Posted: 08 Feb 2021 | Published: 15 Jan 2018

TechTarget ComputerWeekly.com

Computer Weekly Innovation Awards APAC 2024 - Nomination form
sponsored by TechTarget ComputerWeekly.com
DATA SHEET: The Computer Weekly Innovation Awards APAC 2024 will once again shine the spotlight on digital transformation projects that have delivered business impact and/or solved problems using innovative approaches. All entries will be assessed by an independent panel of judges. Download your nomination form here.
Posted: 30 Nov 2023 | Published: 01 Dec 2023

TechTarget ComputerWeekly.com

10 realistic business use cases for ChatGPT
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the rapidly evolving landscape of AI and natural language processing, ChatGPT has emerged as a powerful tool with myriad potential applications. In a corporate context, it's crucial to determine the most pragmatic and pertinent applications for specific business needs. Consider these 10 business use cases.
Posted: 15 Nov 2023 | Published: 16 Nov 2023

TechTarget ComputerWeekly.com

Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE: Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008

Information Security Magazine

Classifying Domain Generation Algorithm (DGA) Domains With Machine Learning
sponsored by Sealing Technologies
WHITE PAPER: Domain generation algorithms (DGAs) can help threat actors evade detection by constantly moving between random domain names. So, how can your organization defend against that technique? Dig into this white paper to discover how SealingTech built a neural network model that detects malicious domains with 97% accuracy.
Posted: 25 Sep 2024 | Published: 30 Sep 2024

Sealing Technologies

Top 10 cyber crime stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

Annual Report On The State Of Application Security
sponsored by Veracode
ANALYST REPORT: In the current spectrum of cybersecurity, organizations are continuously trying to reduce their security debt, but what is just as important is to not introduce security flaws that can accumulate over the life of your applications, making them more vulnerable in the long run. Read on to learn more about the current state of application security.
Posted: 09 Jun 2023 | Published: 09 Jun 2023

TOPICS:  .NET
Veracode

Kanverse “Zero Touch” - AP Invoice Automation (APIA): Product Datasheet
sponsored by Kanverse.ai
PRODUCT OVERVIEW: Kanverse "Zero Touch" AP Invoice Automation streamlines document processing with AI-powered classification, data extraction, and validation. Access this white paper to learn how you can reduce errors, increase efficiency, and secure your AP workflows.
Posted: 24 Oct 2024 | Published: 25 Oct 2024

Kanverse.ai

Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Infosec culture: A former helicopter pilot's perspective
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 08 Feb 2021 | Published: 26 Mar 2018

TechTarget ComputerWeekly.com

Top 10 cyber security stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
Posted: 08 Feb 2021 | Published: 23 Dec 2019

TechTarget ComputerWeekly.com

The Future Of Retail Customer Service: Interactive And Unified
sponsored by Talkdesk
RESEARCH CONTENT: As economic pressures force consumers to be more money conscious, organizations recognize the stakes. In this Talkdesk Research Report, 303 global responses were collected among CX professionals employed by Retail and eCommerce organizations with more than 200 full-time employees. Read on to learn more.
Posted: 15 Jun 2024 | Published: 15 Jun 2024

TOPICS:  .NET
Talkdesk

Computer Weekly – 4 June 2019: GDPR one year on – is it working?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jun 2019

TechTarget ComputerWeekly.com

How Modern DCIM Helps Multi-Tenant Colocation Data Centers Be More Competitive
sponsored by Schneider Electric
WHITE PAPER: In this white paper, explore practical examples of how modern commercial DCIM software makes colocation data center operations more competitive by improving resiliency, security, environmental sustainability, transparency, and operational efficiency.
Posted: 21 Mar 2024 | Published: 21 Mar 2024

TOPICS:  .NET
Schneider Electric

How Modern DCIM Helps Multi-Tenant Colocation Data Centers Be More Competitive
sponsored by Schneider Electric
WHITE PAPER: In this white paper, discover practical examples of how modern commercial DCIM software can make colocation data center operations more competitive by improving resiliency, security, sustainability, transparency, and more.
Posted: 24 Feb 2024 | Published: 24 Feb 2024

TOPICS:  .NET
Schneider Electric

World Economic Forum Global Risks Report 2018
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
Posted: 08 Feb 2021 | Published: 17 Jan 2018

TechTarget ComputerWeekly.com

Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 08 Feb 2021 | Published: 21 Mar 2019

TechTarget ComputerWeekly.com

Kubernetes Patterns Reusable Elements For Designing Cloud Native Applications
sponsored by Red Hat
EBOOK: This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.
Posted: 16 Apr 2024 | Published: 16 Apr 2024

TOPICS:  .NET
Red Hat