ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Endpoint security: Hybrid work changes the game

    Sponsored by: TechTarget ComputerWeekly.com

    A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not.  In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.

  • Unlocking Efficiency Through Digital Transformation

    Sponsored by: TeamViewer

    Now that your business has entered the digital transformation era, there is no going back. To succeed, you need resources that reinforce employee value. To unlock greater employee efficiency, there are three key improvement paths: Adoption, flexibility and support. Discover how TeamViewer Tensor helps you with all three in this eBook.

  • Computer Weekly – 27 November 2018: Software patching at scale – how to make it work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.

  • Computer Weekly – 10 March 2020: Is technology innovation broken?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, despite its reputation for fresh thinking the tech sector is stuck in old ways that prevent true innovation – an expert explains why. Our buyer's guide examines how networking is affected by the growth of cloud-native applications. And we look at the key tech-related compliance issues for SMEs. Read the issue now.

  • Three Steps to Authentic Connections in B2B

    Sponsored by: BrightTALK by TechTarget

    In today’s B2B marketplace, buyers no longer fall prey to one-size-fits-all marketing campaigns and pushy sales calls. Authenticity is key—and webinars and videos are key to achieving the human touch. They're also consistently ranked as the top performing content marketing tactics. Explore the 3 steps to authentic connections in B2B here.

  • A Computer Weekly Buyer's Guide to Microsoft Office 365

    Sponsored by: TechTarget ComputerWeekly.com

    Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.

  • Building an Analytics Campaign's Struggles and Successes

    Sponsored by: NEC Corporation of America

    In this expert e-guide, learn about some of the major issues facing modern analytics. Read about the initial struggle of launching an operational analytics program, and how integration with cloud solutions can help alleviate these pains. In addition, read about a travel-booking company's success story of BI cloud integration.

  • A Computer Weekly E-Guide on Wired and Wireless LAN

    Sponsored by: TechTarget ComputerWeekly.com

    When looking the way in which the Covid-19 pandemic has changed business life, a number of key areas have come to the fore: SD WAN, SASE and in particular digital transformation are key examples of that. Yet very little of the discourse includes something that is still really at the heart of the vast majority of firms: The local area network (LAN).

  • Forrester Collaborative Work Management

    Sponsored by: Atlassian

    Tap into the findings of 155 collaboration leaders in this analyst report, and discover how collaboration tools enable innovation in a post-pandemic world.

  • 2024 Top Global Security Trends

    Sponsored by: Brivo

    This report presents the findings of Brivo’s recent security study, which gathers data from 850 security professionals across 8 countries. Download the report now to unlock the study’s key findings, including 3 key trends influencing the state of cybersecurity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.