ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Are you using the right tablet device?

    Sponsored by: ComputerWeekly.com

    Is your tablet device the right tablet device for your business? Participate in our Web Security Research Program to find out. Upon completion of the survey, you will get immediate access to Computer Weekly Buyer's Guide to Business Tablets, where CW reveals the ins-and-outs of the tablet devices on the market.

  • Challenges with Cloud Security?

    Sponsored by: ComputerWeekly.com

    Cloud information security is an issue. Download an exclusive copy of Encryption in the Cloud & see why industry experts say that cloud encryption is the key to making cloud computing more attractive for potential users that are concerned with data security. To access this resource, simply take our brief Cloud Security Survey!

  • Make Onboarding a Smooth Transition for New Hires and Your Staff

    Sponsored by: Perceptive Software

    Find out about one industry-leading vendor's onboarding solution that utilizes content management technology to automate and streamline the new employee onboarding process.

  • Automated Workflow Solutions Reduce Errors in Financial Services Institutions

    Sponsored by: Perceptive Software

    Find out how efficient, automated workflows can help your business drastically reduce opportunities for mistakes.

  • Banks Embrace Technology to Enhance the Customer Experience

    Sponsored by: Perceptive Software

    Learn how omnichannel technology – which is a combination of channels delivered in person and virtually to create a unified, seamless customer experience –can be utilized to enhance the customer experience.

  • Agile for Dummies

    Sponsored by: IBM

    Agile methods aren't just for cutting-edge development teams anymore, but if you're just jumping on the Agile train, it's likely you have a lot of questions. Fortunately, this e-book can help answer them, as Agile for Dummies offers a comprehensive look at Agile practices, tools, and projects.

  • Tackling the Challenges of ITSM

    Sponsored by: FrontRange Solutions Inc.

    Discover 4 major challenges that are associated with ITSM and how this FrontRange solution can tackle them effectively.

  • Centralizing HR Operations for Success

    Sponsored by: Perceptive Software

    Find out how one organization utilizes content management technology to establish and carry out best practices in their HR department, and learn how you can apply this information to your own organization.

  • What's Behind a Cyber Attack?

    Sponsored by: IBM

    This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.

  • Participate in our Customer Experience and Customer Relationship Management Research Program!

    Sponsored by: ComputerWeekly.com

    Access your copy of Improving the Customer Experience Through Technology to get an inside look at what CRM professionals are doing to maintain a single view of a customer's history and contact information & the importance of offering multiple communication points. Simply take our CEM & CRM survey to access your complimentary guide.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.