ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • IT Project: Migration to cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.

  • MicroScope – July 2021: Life on the edge

    Sponsored by: MicroScope

    With opportunities around edge computing on the up, we ask experts to weigh in on how the channel can approach using the tech to its advantage. Also discover how to encourage employees to take cyber security lessons seriously, and how collaboration is key to growth this year

  • Computer Weekly - 1 December 2020: How retailers are using technology to survive

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with high-street retailers struggling to survive, we look at how technology can keep stores relevant. Everyone is focusing on flash storage, but hard disk drives are still an essential part of the IT toolkit. And we examine the latest developments in the ongoing Post Office Horizon IT scandal. Read the issue now.

  • Computer Weekly – 28 February 2017: Navigating software licences

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after SAP won a court case against a major customer, Diageo, over software charges, we look at what this means for users. We talk to the IT consultancy that recruits only autistic IT professionals. And we look at the CIO's big challenges for the year. Read the issue now..

  • From Patchwork To Platform

    Sponsored by: Red Hat

    This e-book examines the differences between upstream Ansible and Red Hat Ansible Automation Platform, a hardened and supported enterprise solution. Learn how the platform can enhance security, scalability, and ROI for your organization's automation needs. Read the full e-book to discover the benefits of enterprise-grade automation.

  • Verizon ABM with Intent: Front Line Success at Scale

    Sponsored by: TechTarget

    Dive into this case study to examine how Verizon Business Group, a division within one of the world’s largest telecoms firms, for a strong example of how a team has implemented ABM concepts at scale to realize broad benefits across many business areas.

  • Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.

  • Computer Weekly – 3 May 2022: A prescription for digital accessibility at Boots

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer's guide examines communications as a service. And we talk to Trainline's CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now.

  • Discover the business benefits of Red Hat Enterprise Linux on Microsoft Azure

    Sponsored by: Red Hat

    In this e-book, you'll discover the benefits of running Red Hat Enterprise Linux on Microsoft Azure for a security-focused hybrid cloud environment. Read on now to learn how you can simplify migration, enhance security, and optimize costs during your cloud journey.

  • 2024 API Security & Management Report

    Sponsored by: Cloudflare

    Access this analyst report for a valuable benchmark for your organization to holistically assess the health of your API endpoint management, and new ways your API security strategy can incorporate data to manage visibility, performance, and risks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.