ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ComputerWeekly.com

  • Reconsidering PKI and its Place in your Enterprise Encryption Strategy

    Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.

  • Business-driven application release automation

    DevOps is growing in popularity, however organisations need well designed and implemented DevOps strategies if they are to benefit the business, say analysts Clive Longbottom and Bernt Ostergaard.

  • The secure use of cloud-based services

    Attitudes to cloud-based services vary, but over time there has been increasing uptake as the benefits are recognised by more and more businesses. Those in the vanguard recognise that there is ground work to do; certain security measures must be put in place to enable safe use of cloud-based platforms and applications.

  • Evidence of the Effects of Healthcare IT on Healthcare Outcomes

    This study by HIMSS Analytics highlights, for the first time, a correlation between the maturity of IT within NHS hospitals and improvements to patient outcomes.

  • Data Breach Readiness 2.0

    Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.

  • Weak links – Strengthening the information supply chain

    Analysts Bob Tarzey and Rob Bamforth argues the case for a systematic approach to securing the information supply chain.

  • Computer Weekly – 1 September 2015: Wearable Technology Proves its Worth on the Front Line

    In this week's Computer Weekly, we look at business applications for wearable technology. With hands-free police and military pilot projects already under way, wearable technology is set to make its mark in the enterprise in the near future.

  • Computer Weekly – 25 August 2015: Coping with a crisis

    In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.

  • A Computer Weekly buyer's guide to log management

    In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.

  • CW Nordics – August 2015 Edition

    5G technology from Ericsson could soon be used to improve communication and remote control operations in the mines of Sweden. A project designed to improve productivity and safety in traditionally dangerous environments is being run by Ericsson, ABB, Boliden, SICS Swedish ICT and Volvo Construction Equipment.

  • Insider Threat Report 2015

    This survey of 500 cyber security professionals offers insight into the state of insider threats and solutions to prevent them.

  • Beyond Nine to Five

    In this extract from his book, Ade McCormack offers guidance to enable you to move forward in your career with the minimum of anxiety as digital technology fundamentally changes the nature of work.

  • Computer Weekly – 18 August 2015: Will digital government remain on course?

    In this week's Computer Weekly, the UK government's digital chief has announced his shock departure, but what will it mean for the future of digital public services? Dell went back to a private company two years ago – has it proved to be a successful move? And our latest buyer's guide looks at big data appliances. Read the issue now.

  • Sensible one page thoughts – Teamwork essentials

    Ludo Houdenaert, an independent management consultant, has distilled more than 30 years of experience into a series of inspirational articles.

  • The BPO profession in 2015

    Business process outsourcing (BPO) services are becoming a crucial element of a hybrid operating environment that frequently involves in-house shared services, offshore in-house centres, and other service provider delivery teams in adjacent areas, this analyst report from HfS Research reveals.

  • Workplace Technology Insight 2015

    This research report from ADP looks at the lessons for multinational businesses as technology improves productivity of the workforce and changes the world of work.

  • Threat intelligence sharing and the government's role

    This survey for Alien Vault paints a picture of how threat intelligence is obtained, utilised and shared, and seeks out views as to the role the government and law enforcement has to play to help better protect enterprises from threats.

  • Surviving the expenses nightmare

    This short paper will look at the top ten issues employees struggle with when it comes to that all important end of year final demand for expenses from the finance department, and explores how an on-line expenses management system could alleviate these issues.

  • Financing IT change

    Companies that are embarking on big IT strategies have to seek out robust stable partners with the commitment to offer finance packages that will underpin and support the strategy to completion, argue analysts Rob Bamford and Clive Longbottom.

  • Getting to know you

    The pressing need to effectively engage with outsiders has turned identity and access management (IAM) into a business priority, say analysts Bob Tarzey and Rob Bamford.

  • Computer Weekly – 11 August 2015: Data unlocks personalised customer service

    In this week's Computer Weekly, we examine how companies are starting to use big data analytics to deliver more personalised customer services. We talk to the government's IT procurement chief about improving public sector tech purchasing. And Volvo's CIO tells us how connected cars will reshape the automotive sector. Read the issue now.

  • Computer Weekly – 4 August 2015: Cyber risks hit the road

    In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.

  • CW Europe – August 2015

    This issue of CW Europe investigates the different cultural attitudes towards data management ethics.

  • CW Buyer's Guide: DevOps

    Computer Weekly looks at how combining development and operations teams can cut time and raise quality; how DevOps done well can lead to a continuous loop where teams plan, code, build, test, release, deploy, operate and monitor – then repeat; and the steps the enterprise should take in adopting a DevOps approach.

  • Cloud Storage Research

    Some organisations may not want to deal with housing, running and maintaining an in-house cloud storage infrastructure. If this is the case, they can contract with a cloud storage service provider for the equipment used to support cloud operations. Take our short survey and share your thoughts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.