ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Memory corruption attacks

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.

  • The Future of the Service Desk Management

    Sponsored by: FrontRange Solutions Inc.

    In this video, discover where we will be in 5 years in terms of modern service desk management. Watch now to learn why customers are going to demand an efficient solution in service desk management.

  • Sharing knowledge to tackle online banking fraud

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

  • Mobilize your Corporate Content and Apps

    Sponsored by: IBM

    This white paper explores how organizations can embrace, plan, and deploy a comprehensive mobile strategy that harnesses the power of mobility with secure access to business resources.

  • Case Study: Gigaset Innovates in the New World of BI and CPM

    Sponsored by: Board International

    This case study features Gigaset Communications, one of the largest manufacturers of cordless telephones worldwide, and its ambitious cost savings program that was set up to replace its planning and reporting systems used for sales, turnover and margin planning.

  • Secure, sync and share content on your mobile device - BYOD

    Sponsored by: Acronis

    This video explains some of the challenges of the BYOD trend and highlights a solution that allows organizations to deliver optimal access, sync and share capabilities without sacrificing security.

  • Integrated Talent Management

    Sponsored by: ComputerWeekly.com

    This Independent analyst perspective into the integrated talent management systems market from Elearnity assesses the leading talent management suppliers.

  • Embracing Secure BYOD. What you need to know

    Sponsored by: Acronis

    This white paper highlights the challenges that come with the BYOD trend. It also describes a solution that delivers a secure approach to BYOD without sacrificing end-user experience.

  • White Paper: Developing More Effective Enterprise Mobile Programs

    Sponsored by: IBM

    This practical "how-to" guide will help your business create an effective and sustainable mobile enterprise program in four steps.

  • Case Study SAIT Polytechnic

    Sponsored by: FrontRange Solutions Inc.

    This white paper introduces a solution that streamlines and automates student and staff support across different teams and service desks.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.