ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Computer Weekly - 6 July 2021: Where to start with Windows 11

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.

  • IT Priorities 2020: Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    When Computer Weekly's IT priorities survey was carried out Covid-19 was not something IT leaders would consider when planning ahead. The results of the survey must be considered with this in mind. Discover here the results of Computer Weekly's IT priorities survey for 2020 in Middle East.

  • Computer Weekly - 25 May 2021: Making data an asset, not a threat

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the latest developments in the UK government's National Data Strategy and what it means for the economy. Our latest buyer's guide explains the emerging technologies around computational storage. And we look at the advances in customer experience management during the pandemic. Read the issue now.

  • Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.

  • IT Priorities 2020: Budgets rejigged to support 2021 recovery

    Sponsored by: TechTarget ComputerWeekly.com

    IT has been essential in helping organisations remain operational. IT chiefs are now considering the IT to drive a sustained business recovery.

  • Trust no one: Why zero trust security is taking the world by storm

    Sponsored by: TechTarget ComputerWeekly.com

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

  • Evaluating the Pillars of Responsible AI

    Sponsored by: Hitachi Pentaho

    As AI's role expands, responsible AI practices become increasingly crucial. This Enterprise Strategy Group research report covers key pillars like bias, fairness, and transparency, and how to align innovation with ethical AI development. Read on now to learn how you can build an effective, responsible AI strategy for your organization.

  • A Computer Weekly Buyer's Guide to Hyperautomation and Bots

    Sponsored by: TechTarget ComputerWeekly.com

    The advantages of bots are only multiplying for businesses across the globe. In this 15-page buyer's guide, Computer Weekly looks at how robotic process automation is evolving, the benefits it brings for coders and the ways artificial intelligence can enhance customer service.

  • 2023 Health System Sector Industry Trends

    Sponsored by: The Advisory Board

    In the wake of the worst financial year in recent memory, 2023 was a story of resilience for health systems. On top of that, the entrance of generative AI tools (some valuable, others not), along with value-based care, has encouraged caution when investing in hyped healthcare technology. Learn about these trends, and 7 others, in this report.

  • Email Security Buyer's Guide

    Sponsored by: Checkpoint Software Technologies

    Email is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.