ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • Optimising content management workflows with AI

    Sponsored by: TechTarget ComputerWeekly.com

    This e-handbook explores how a pantheon of AI technologies -- from machine learning and natural language processing to image recognition and video search -- promises to revolutionise content management workflows and personalise customer experiences. Some words of caution, however. These are early days for AI-infused content management.

  • MicroScope – January 2022: Squaring up to ransomware

    Sponsored by: MicroScope

    In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    Sponsored by: TechTarget ComputerWeekly.com

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

  • How To Identify And Develop High-Potential Employees With HR Tech

    Sponsored by: Sage

    Discover how to identify and develop high-potential employees using HR tech. Learn 6 essential steps to find and empower your organization's future stars. Download this e-book to unlock insights and build a successful high-potential program.

  • UK police unlawfully processing over a million people's data on Microsoft 365

    Sponsored by: TechTarget ComputerWeekly.com

    The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.

  • Toughening up web and mobile application security

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

  • Computer Weekly – 15 December 2020: How security will be different after Covid-19

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.

  • A Guide to Writing Great B2B Email Copy

    Sponsored by: TechTarget

    Learn how to write effective B2B email copy that resonates with your target audience. This TechTarget guide covers best practices for crafting compelling subject lines, email body copy, and calls-to-action. Read the full white paper to enhance your email marketing strategy.

  • The Total Economic Impact™ Of ServiceNow Field Service Management

    Sponsored by: ServiceNow

    Discover in this Forrester Consulting Total Economic Impact analyst report the potential return on investment (ROI) your organization may realize by deploying ServiceNow FSM, and how you may see an increase of up to 16% in your field service efficiency rate.

  • Computer Weekly - 9 August 2022: Eurotunnel's digital journey for the realities of post-Covid travel

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the travel industry was devastated by the pandemic, but we find out how Eurotunnel is turning to digital to better engage customers in the post-Covid world. We examine the impact of the economic slowdown on the tech giants. And we explain all you need to know about data gravity. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.