ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Windows 10: How the client operating system is evolving

    Sponsored by: TechTarget ComputerWeekly.com

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

  • Attacker Economics

    Sponsored by: SailPoint Technologies

    Threat actors target privileged access to infiltrate systems, exfiltrate data, and disrupt operations. This infographic outlines the attacker economics behind these tactics and how an identity-first security strategy can improve cyber resilience. Read the full infographic to assess your identity security posture.

  • Be The Agency Of Change In Public Services

    Sponsored by: Avanade

    In the face of tight budgets, many public service agencies are striving to reduce their cloud costs. To unlock guidance for accomplishing that mission, explore this 59-page leader’s guide.

  • A Computer Weekly buyer's guide to asset management for hybrid IT

    Sponsored by: Livingstone Group

    Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.

  • NetApp All-SAN Array Data Availability And Integrity With The NetApp ASA

    Sponsored by: Arrow NetApp

    The NetApp All-SAN Array delivers enterprise-class SAN availability, performance, and data protection. Read this full technical report now to discover the potential of its advanced features for your business.

  • MicroScope – May 2021: Exploring digital metamorphosis

    Sponsored by: MicroScope

    Digital transformation is the buzz phrase, but is it more a question of evolution? In this issue, experts weigh in on digitisation and its effect on the world of work. Also read about local broadband providers aiming to improve internet connection and productivity, and find out how to tackle sales in a post-pandemic landscape

  • CW APAC, June 2023 – Trend Watch: Artificial Intelligence

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses the world over are exploring ways to use artificial intelligence in their operations. In this handbook, Computer Weekly looks at the issue of ethics in AI, what lab-grown neurons could mean for the technology, how an Indian agritech is helping firms maximise crop yields, and how to find winning AI use cases. Read the issue now.

  • UCaaS Buyers’ Checklist

    Sponsored by: 8x8

    The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.

  • Royal Holloway: Protecting investors from cyber threats

    Sponsored by: TechTarget ComputerWeekly.com

    The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.

  • MicroScope: Steering IT in the right direction

    Sponsored by: MicroScope

    An issue looking at the timing of the ideal sales pitch and just what's happening with IoT and the channel.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.