Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"
-
The rise and rise of SD-WAN in post Covid-19
Sponsored by: TechTarget ComputerWeekly.comSo much has been up in the air in the wake of the onset of Covid-19 and the lockdowns and stay-at-home orders issued by various governments around the world. But there has been one thing that is pretty fixed: the rise and rise of software-defined wide area networks (SD-WANs).
-
CRM enters maturity as customer experience custodian
Sponsored by: TechTarget ComputerWeekly.comCRM has a long lineage in enterprise software, starting with salesforce automation in the 1990s, Siebel being a big player back in the mists of time. These days, engaging with customers through every conceivable channel, and doing so by way of the cloud are the novelties of CRM.
-
A guide to developing cloud applications using PaaS
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at the management and development tools that are required to build, deploy and operate cloud-native applications at scale.
-
Computer Weekly - 1 December 2020: How retailers are using technology to survive
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with high-street retailers struggling to survive, we look at how technology can keep stores relevant. Everyone is focusing on flash storage, but hard disk drives are still an essential part of the IT toolkit. And we examine the latest developments in the ongoing Post Office Horizon IT scandal. Read the issue now.
-
IT Project: Migration to cloud
Sponsored by: TechTarget ComputerWeekly.comThe benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.
-
5 Ways To Drive Innovation At The Edge
Sponsored by: Dell Technologies and IntelBy processing and analyzing this data securely near its source, the edge reveals near real-time insights that can help organizations optimize processes and maximize potential. Edge solutions are already helping us build the cities of tomorrow, improve patient care in our hospitals, and much more. These transformations are gaining momentum.
-
Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
-
Computer Weekly – 19 June 2018: Microsoft becomes devoted to open source developers
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after Microsoft's recent acquisition of GitHub, we examine the software giant's tools for embracing open source developers. Also, secretary of state for digital, culture, media and sport Matt Hancock talks about growing the UK digital economy and supporting the tech sector. Read the issue now.
-
Who should get the technology vote in the UK General Election?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.
-
Decentralising datacentres: The new challenges of security at the edge
Sponsored by: TechTarget ComputerWeekly.comIn September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.