ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • Computer Weekly – 6 November 2018: After 10 years, Post Office IT system goes on trial

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 10 years after we revealed concerns over the Post Office accounting system, affected subpostmasters finally get their day in court. We look at how businesses are turning to wearable tech to help employees. And we analyse the key players in the market for object storage. Read the issue now.

  • Computer Weekly - 3 March 2020: What will points-based immigration mean for IT recruitment?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.

  • 2024 PKI and Post-Quantum Trends Study

    Sponsored by: Entrust, Inc.

    In this report, Ponemon Institute presents the findings based on a survey of 2,176 IT and IT security personnel who are involved in their organizations’ enterprise PKI, distilling the findings in order to provide you with essential guidance. Read now to learn more.

  • Computer Weekly – 7 November 2023: How ExxonMobil is leading with data

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the leader of ExxonMobil's data organisation, about the energy giant's strategy to establish enterprise-wide principles for the use of data. As the UK's Online Safety Act comes into force, we examine the tech sector's concerns over the laws around end-to-end encryption. Read the issue now.

  • White box networking use cases and how to get started

    Sponsored by: TechTarget ComputerWeekly.com

    Rising cloud costs have prompted organizations to consider white box switches to lower costs and simplify network management. In this article, learn more about white box networking and its main uses.

  • CW APAC: Buyer's Guide to human capital management

    Sponsored by: TechTarget ComputerWeekly.com

    In this buyer's guide, focused on human capital management (HCM) in the Asia-Pacific region, we look at the advantages of HCM software in recruitment, the importance of listening to staff and the considerations that should be made when using work algorithms.

  • SIEM, SOAR or both? Our security experts weigh in

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

  • Top 10 datacentre stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.

  • Threat Intelligence Report 2024

    Sponsored by: NOKIA

    The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.

  • A Compact Guide to Retrieval Augmented Generation (RAG)

    Sponsored by: DataBricks

    Discover how Retrieval Augmented Generation (RAG) can enhance large language models by providing relevant external information to improve accuracy and reduce hallucinations. Learn the key components and use cases of RAG with vector search. Read the full e-book to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.