ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "restructuring"

  • CIO keeps Network Rail on track for £1bn transformation

    Sponsored by: ComputerWeekly.com

    Network Rail’s CIO, Susan Cooklin, says her biggest challenge is increasing the business literacy of her IT staff. She said the rail company faces a period of restructuring and budget pressures.

  • IT as a driver of M&A success

    Sponsored by: ComputerWeekly.com

    IT considerations are not given adequate attention or rigour in the due diligence prior to mergers and acquisitions, this report from Ernst & Young reveals.

  • Kurt Marko Explains 3 Methods of Application Modernization

    Sponsored by: TechTarget

    In our 2017 Guide to Application Modernization, consultant Kurt Marko helps you figure out which method fits best, whether it's restructuring with PaaS or redesigning with APIs. Participate in our Application Modernization Research Program to unlock this guide.

  • Case Study: Siemens Restructures Architecture with Flash Storage

    Sponsored by: Nimble Storage

    In this video, witness how Siemens restructured their architecture with flash storage and enabled their enterprise to conduct deeper software integration, accelerate iterations on software testing, and entertain software automation environments. See how you can lift your current storage limitations with flash.

  • Case Study: Protecting Privileged Accounts for a Global Manufacturer

    Sponsored by: Thycotic

    Identity and access management is one of the easiest and most effective ways that organizations can prevent catastrophic data breaches. In this case study, learn how one manufacturing company restructured their outdated access and password management strategy to meet compliance requirements and mitigate data breaches, theft, and loss.

  • CW Special Report on CSC

    Sponsored by: ComputerWeekly.com

    This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.

  • Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection

    Sponsored by: Webroot

    This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.

  • ISG Outsourcing Index (EMEA)

    Sponsored by: ComputerWeekly.com

    The ISG Outsourcing Index provides a quarterly review of the latest sourcing industry data and trends.

  • Computer Weekly Special Report: Fujitsu

    Sponsored by: ComputerWeekly.com

    This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.

  • Gartner: Five Roles for Government in Cloud Computing

    Sponsored by: ComputerWeekly.com

    As a consequence of tightening budgets and increasing uncertainties, government organizations are looking at how to leverage cloud computing as a model to ensure greater flexibility, lower costs, more-rapid provisioning and greater focus on areas that are more domain-specific.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.