ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ComputerWeekly.com

  • Computer Weekly – 28 April 2015: The National Trust's great IT renovation

    In this week's Computer Weekly, we talk to the CIO of the National Trust, Sarah Flannigan, about her £40m IT strategy to transform one of the UK's favourite charities. We examine best practice in how to set up applications on Amazon Web Services. And we talk to a UK challenger bank about how technology will shake up the sector. Read the issue now.

  • Computer Weekly – 21 April 2015: The future of Moore's Law at 50

    In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now.

  • Thingalytics

    Thingalytics by Dr John Bates is one of the most powerful books written to date about the internet of things (IoT), showing businesses how to take advantage of the fast big data that flows from the digital planet.

  • No more excuses: VDI is ready!

    There are a lot of reasons to avoid implementing VDI. Access this e-guide with advice from desktop virtualization expert Brian Madden who directly addresses concerns on storage, graphical experience and non-persistent desktops.

  • Computer Weekly – 14 April 2015: Taking stock of e-commerce systems

    In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now.

  • CW Europe – April 2015

    With the datacentre industry a major consumer of non-renewable energy, it continues to come under fire from environmental campaigners and users to clean up its act. In this issue of CW Europe,Computer Weekly datacentre editor Caroline Donnelly investigates energy-efficient Europe and how the technology industry is keeping the continent clean.

  • Event insight: Key takeaways from Cloud Expo Europe and Data Centre World

    This report looks at the key talking points from the recent Cloud Expo Europe and Data Centre World events.

  • Computer Weekly – 31 March 2015: What went wrong with the IT for farmers' rural payments?

    In this week's Computer Weekly, we examine the real reasons behind the failure of the government's rural payments digital service. We look at how Windows 10 Universal Apps will change the way IT teams manage PCs. And we hear from IT leaders about their experiences of bringing cloud computing into the mainstream. Read the issue now.

  • Staying the course as a CIO

    In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.

  • Computer Weekly buyer's guide to data science

    In this 10-page buyer's guide, Computer Weekly looks at how, with the open data movement taking hold and data analytics technology becoming increasingly sophisticated, data science is finding its use in a variety of fields.

  • Computer Weekly – 24 March 2015: Government backs tech in 2015 Budget

    In this week's Computer Weekly, chancellor George Osborne's 2015 Budget was the most technology friendly ever – we examine the key policy announcements. Sainsbury's CIO talks about the challenges of going digital. And we look at how virtual reality could be coming to a workplace near you, thanks to the latest developments. Read the issue now.

  • Cloud options investigated

    Arriva interim head of IT readiness Stuart Curley offers some tips on procuring cloud services in this PowerPoint presentation for Computer Weekly's CW500 club for senior IT leaders.

  • Tech Trends 2015

    Deloitte's sixth Annual Tech Trends Report reveals the top macro technology developments that will disrupt businesses in the next 18-24 months.

  • Big & Fast Data: The rise of insight-driven business

    This report from Capgemini and EMC, which surveyed more than 1,000 C-suite and senior decision makers around the world, looks at enterprise readiness for big data.

  • Computer Weekly – 17 March 2015: Smartwatches mean business

    In this week's Computer Weekly, we examine the potential enterprise uses of the Apple Watch, and find out what sort of apps might work for businesses. Our latest buyer's guide discusses the future of the desktop computer. And we look at how technology is being used to improve customer experience for big consumer-facing organisations.

  • Information security in the retail chain

    This article in our Royal Holloway Information Security Thesis Series looks at how automated distribution centres play a business-critical role in the retail supply chain, and any challenge to their continuous availability and the services they provide must be overcome.

  • Mitigating the cyber threat from malicious insiders

    This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.

  • Trends in packing and obfuscation

    This article in our Royal Holloway Information Security Thesis Series looks at how two modern malware methods fit into today's landscape of advanced persistent threat and cyber crime as a service, and what the security industry can do to defend against them.

  • Building trust in the security of RFID systems

    This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.

  • Verifying the integrity of open source Android apps

    This article in our Royal Holloway Information Security Thesis Series looks at how researchers can determine whether an app was built from its published source code.

  • Business risks of software vulnerabilities

    This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.

  • Clustering to counter Android malware

    This article in our Royal Holloway Information Security Thesis Series looks at how the rapid growth of new Android malware calls for automated tools to help malware analysts.

  • Combating Android app repackaging attacks

    This article in our Royal Holloway Information Security Thesis Series looks at how apps repackaged through reverse engineering pose a big security risk to the Android smartphone operating system.

  • Mac OS X persistent evidences for forensic purposes

    This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation.

  • Symbolic adversary modelling in smart transport ticketing

    This article in our Royal Holloway Information Security Thesis Series looks at possible extensions of a process algebra language used to support modelling of smart transport ticketing systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.