Research Library

Powered by

All Research Sponsored

  • Computer Weekly – 13 October 2015: Europe's data privacy shake-up

    In this week's Computer Weekly, after the European Court of Justice ruled the Safe Harbour agreement invalid, we assess the implications for transatlantic data protection. We find out why DVLA has brought its IT back in-house after a 13-year outsourcing deal. And we look at the role of IT in cutting costs in the NHS. Read the issue now.

  • Computer Weekly – 6 October 2015: What's on your desktop?

    In this week's Computer Weekly, Microsoft has released Office 2016 and is urging customers to migrate to Windows 10 – but is a desktop upgrade worth the hassle? We report from the Dreamforce conference on the latest products from

  • CW Europe – October 2015

    Cloud computing has huge benefits to businesses and individual. The ability to deliver services to any location that has an internet connection and a suitable device empowers people.

  • Computer Weekly – 29 September 2015: Keeping app pirates at bay

    In this week's Computer Weekly, we look at how digital piracy is affecting app developers – and what they can do about it. The man behind the controversial NHS project has quit – what will it mean for the troubled programme? And we find out how digital disruption is affecting the insurance market. Read the issue now.

  • Retail Revolution

    This PowerReviews study, based on a survey of 1,000 people in the UK, and a similar number in the US, explores the impact of technology on shopping behaviour and outlines what retailers need to consider to meet these changing demands.

  • Fixing the cracks: Reinventing loyalty programs for the digital age

    This global report by Capgemini Consulting reveals that loyalty programmes have not evolved with the digital age and are failing to engage consumers. It also offers strategies to improve customer engagement.

  • Mastering multi-channel journeys – making engagement pay

    This research from Oxygen8 assesses how businesses communicate with customers and how those customers want businesses to communicate with them, and offers advice on how to achieve it.

  • Secunia Vulnerability Review

    The absolute number of IT security vulnerabilities detected in Secunia's 2015 annual vulnerability survey reached 15,435, discovered in 3,870 applications from 500 suppliers.

  • WAN Speak Musings – Volume V

    Clive Longbottom and Bernt Ostergaard look at wide-area networks (WANs) from every angle in this continuing series.

  • WAN Speak Musings – Volume IV

    Analysts Clive Longbottom and Bernt Ostergaard look at the practicalities of wide-area networks (WANs) in this continuing series.

  • Computer Weekly – 22 September 2015: How cloud technology helps kittens

    In this week's Computer Weekly, we talk to the CIO at the UK's leading animal charity, the RSPCA, about how her cloud-first strategy is helping animal welfare. Microsoft is ending support for older version of Internet Explorer – we assess the implications. And we ask the experts about the best practice in mobile security. Read the issue now.

  • A Computer Weekly buyer's guide to networking technology advances

    In this 11-page buyer's guide, Computer Weekly looks at some examples of these technologies, as well as what some of the more established suppliers are doing to re-invent the network.

  • Mobile Consumer 2015

    Britain's mobile phone owners look at their devices nearly 1.1 billion times a day, the equivalent of 400 billion times a year, according to research from Deloitte.

  • Computer Weekly – 15 September 2015: Opening Doors to Open Source

    This expert guide examines the growing open source software movement, as well as emerging best practices in next-generation service management. Read this resource to also find out how organizations should be preparing for the forthcoming changes to EU data protection laws.

  • CW Buyer's Guide: SaaS Management

    Computer Weekly looks at how organisations should evolve their SaaS selection criteria to focus on newer metrics that are better indicators of supplier performance; the number of compliance issues that come with SaaS; and how CIOs believe SaaS providers must better meet their needs in terms of simplicity and flexibility.

  • CW Europe: CW Awards winners case studies

    Find out the winners of the Computer Weekly European User Awards 2015. The awards aim to shine a light on businesses across Europe that have excelled in their approach to using technology.

  • Reconsidering PKI and its Place in your Enterprise Encryption Strategy

    Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.

  • Business-driven application release automation

    DevOps is growing in popularity, however organisations need well designed and implemented DevOps strategies if they are to benefit the business, say analysts Clive Longbottom and Bernt Ostergaard.

  • The secure use of cloud-based services

    Attitudes to cloud-based services vary, but over time there has been increasing uptake as the benefits are recognised by more and more businesses. Those in the vanguard recognise that there is ground work to do; certain security measures must be put in place to enable safe use of cloud-based platforms and applications.

  • Evidence of the Effects of Healthcare IT on Healthcare Outcomes

    This study by HIMSS Analytics highlights, for the first time, a correlation between the maturity of IT within NHS hospitals and improvements to patient outcomes.

  • Data Breach Readiness 2.0

    Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.

  • Weak links – Strengthening the information supply chain

    Analysts Bob Tarzey and Rob Bamforth argues the case for a systematic approach to securing the information supply chain.

  • Computer Weekly – 1 September 2015: Wearable Technology Proves its Worth on the Front Line

    In this week's Computer Weekly, we look at business applications for wearable technology. With hands-free police and military pilot projects already under way, wearable technology is set to make its mark in the enterprise in the near future.

  • Computer Weekly – 25 August 2015: Coping with a crisis

    In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.

  • A Computer Weekly buyer's guide to log management

    In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.