ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • Digital experience focus broadens to encompass employees

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide to employee experience includes a podcast discussion about the evolution of employee experience management. Also, we explore how advanced companies are responding to skills shortages and millennial employee attitudes by listening harder to their workforces.

  • CW Nordics May 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.

  • CW Nordics - November 2019: Robots help social workers in Sweden

    Sponsored by: TechTarget ComputerWeekly.com

    Software robots are being used by more than 20 local authorities in Sweden to carry out repetitive tasks previously done manually, such as document and data checks, freeing up social workers to make life-changing decisions for the needy.

  • CW ASEAN: Preparing for 5G

    Sponsored by: TechTarget ComputerWeekly.com

    As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.

  • What to expect in the NSA's independent dispute resolution process

    Sponsored by: XtelligentMedia Healthcare

    The No Surprises Act's independent dispute resolution process provides a channel for payers and providers to negotiate payments without affecting patient spending.

  • The DevSecOps Playbook Practical Steps for Producing Secure Software

    Sponsored by: Veracode, Inc.

    What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.

  • The DevSecOps Playbook

    Sponsored by: Veracode

    This e-book offers a practical guide on implementing DevSecOps to integrate security into the software development lifecycle. Dig into the guide to learn how to establish a common security language, onboard applications with automated scans, define security policies, triage findings, and prevent flaws.

  • CW EMEA - January 2023: Protecting the privacy of schoolchildren

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.

  • CW Europe – September 2018: Costs stack up for Dutch government IT projects

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.

  • CW APAC: Expert Advice on data management

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.