ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Computer Weekly – 13 February 2024: Intelligent defence – the role of data in the military

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the role of data in tying together military operations across ground, air, sea and cyber. Has SAP finally convinced customers to migrate to cloud ERP? We assess the trends. And we talk to the CIO helping to set up the UK's fastest supercomputer. Read the issue now.

  • Guide to business continuity planning during COVID-19

    Sponsored by: TechTarget ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • How to achieve container security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

  • Build a Better Webinar Day of Execution

    Sponsored by: BrightTALK by TechTarget

    You've spent weeks preparing for your webinar and done most of the heavy lifting before your go-live day. Now it's show time! Ensuring everything goes smoothly during your webinar is key to delivering a positive and engaging audience experience. Browse this e-book to learn more.

  • Brought To You By: Servicenow Customer Operations Dummies

    Sponsored by: ServiceNow

    Customers want answers to their issues and requests yesterday. So, how can you empower your teams to deliver proactive service? Check out “Customer Operations for Dummies, 2nd ServiceNow Special Edition,” your guide for fueling seamless customer experiences.

  • Mapping and Reducing Scope 3 Emissions

    Sponsored by: GEP

    Today, procurement organizations face a handful of pressing sustainability issues, the most formidable of them being scope 3 emissions. So, how can companies best address these problems and build an effective, end-to-end emissions reduction framework? Browse this white paper to learn more.

  • Build Modern Applications on AWS eBook

    Sponsored by: AWS

    Take a look through this e-book to learn about building modern applications on AWS, and to see the success that working on AWS has delivered for businesses like Coca Cola.

  • 2024 State of Application Security Report

    Sponsored by: CrowdStrike

    8 of the top 10 data breaches of 2023 were related to application attack surfaces. This report synthesizes data collected from a survey of application security professionals to reflect the current state of application security, condensing the findings into 8 key takeaways. Download now to learn more.

  • Addressing Zero Trust for Government: The Role of Identity Security

    Sponsored by: Merlin International

    As governments adopt Zero Trust, identity security is critical. This white paper explores the role of identity security in a Zero Trust architecture, including five key principles and six focus areas to get started. Learn how the CyberArk Identity Security Platform can help you implement a successful Zero Trust strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.