ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • CW ASEAN November 2016

    Sponsored by: TechTarget Security

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

  • Fintech: Meet ten financial services disruptors - Part One

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we meet ten up-and-coming financial services disruptors and discuss what the driving force behind their success is. These were interviews published on the Computer Weekly blog: Fintech Makes the World go Around.

  • Fintech: Meet ten financial services disruptors - Part One

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we meet ten up-and-coming financial services disruptors. This series of interviews were originally published on the Computer Weekly blog: Fintech Makes the World go Around.

  • CW ANZ: Australian firms connect people in new ways

    Sponsored by: TechTarget ComputerWeekly.com

    Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.

  • Secure remote access: More vital than ever thanks to Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

  • How your Cloud footprint comes to life with multiple instances

    Sponsored by: Atlassian

    While operating in cloud offers many benefits, finding a balance between customization and control while navigating business complexity and security and compliance requirements can be difficult. In this e-book, discover how to tackle these challenges as you scale with 4 common customer adaptations of the multi-instance model.

  • Inside MLC Life Insurance's cloud journey

    Sponsored by: TechTarget ComputerWeekly.com

    When MLC decided to move all its infrastructure, applications and services to the public cloud, its journey was more about people than technology. Learn how MLC overcame these people-related challenges in its move to cloud, improved its security posture and reduced infrastructure spending.

  • CW ANZ: Gearing up for 5G

    Sponsored by: TechTarget ComputerWeekly.com

    The potential benefits of 5G are certainly promising in Australia, which is seen as a test bed for 5G services with the country's dense cities and wide open spaces. In this edition of CW ANZ, we look at how Australia is ushering in 5G services and the industries that will get the most out of the technology. Read the issue now.

  • Don’t drown in data debt; champion your Data First culture

    Sponsored by: Syniti

    Modern enterprises are struggling with data debt, as over 40% of data is unusable. This creates lost opportunity cost. To harness data's full power, enterprises must champion a "Data First" culture, address data quality, and partner with specialized data providers. Download this report to learn how you can reduce your data debt.

  • Digital drive: The IT backbone behind Lewis Hamilton's British Grand Prix win

    Sponsored by: TechTarget ComputerWeekly.com

    Dive into the world of the Mercedes F1 IT team, where advanced data analytics, real-time telemetry, and state-of-the-art simulations come together to fine-tune every race detail. Uncover how this seamless blend of technology and teamwork gave Lewis Hamilton the edge he needed to triumph at Silverstone.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.