ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: TechTarget ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • Transforming Project Management With The Right Tools And Ways Of Working

    Sponsored by: Atlassian

    Discover how to transform project management with the right tools and ways of working. Learn to set up projects for success, plan team work, manage ongoing tasks, and assess performance - all within a unified Atlassian work management platform. Read the full e-book to learn more.

  • Streamline Customer Service Experiences With Now Assist

    Sponsored by: ServiceNow and DXC

    Generative AI (GenAI) can streamline customer service, field operations, and app development. Access this guide to learn how Now Assist by ServiceNow can reduce manual effort, improve productivity, and enhance experiences for customers and employees.

  • Full visibility and real-time threat response: Helping retailers achieve proactive IT Security

    Sponsored by: Tanium

    Hackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.

  • Put AI To Work For People Leverage The Power of Artificial Intelligence to Transform Business

    Sponsored by: ServiceNow

    Discover how generative AI can transform your business processes. Learn to leverage AI for faster summarization, personalization, and better decision-making. Explore the benefits and best practices for implementing AI solutions. Read the full Analyst Report.

  • A Computer Weekly buyer's guide to data visualisation

    Sponsored by: TechTarget ComputerWeekly.com

    Data visualisation is proving its value throughout a period of economic uncertainty. In this 16-page buyer’s guide, Computer Weekly looks at the rise of embedded analytics, the advantages of real-time data and Siemens’ exploration of industrial metaverse use cases

  • A Computer Weekly buyer's guide to graph databases

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.

  • The Future of Financial Services: Part 2

    Sponsored by: TechTarget ComputerWeekly.com

    In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.

  • Computer Weekly – 19 July 2016

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

  • Focus: Securing for the future

    Sponsored by: TechTarget ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.