ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • ESG Securing Hybrid Cloud Environments

    Sponsored by: Red Hat

    Hybrid cloud environments introduce complex security challenges as organizations migrate to the cloud. This Enterprise Strategy Group (ESG) white paper explores best practices for securing the full stack, automating security controls, and leveraging tools to improve security and compliance at scale. Read now to learn more.

  • Computer Weekly – 21 January 2020: How to avoid becoming the next Travelex

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the lessons learned from the ransomware attack on Travelex and how other firms can avoid the same fate. As Microsoft ends support for Windows 7, we examine the issues for the many remaining users of the operating system. And healthcare CIOs explain the tech challenges facing the NHS. Read the issue now.

  • MicroScope – March 2022: Taking the steady approach to becoming an MSP

    Sponsored by: MicroScope

    In this issue, take a closer look at the risks and pitfalls on the journey to becoming a manages services provider, read about expected ongoing change and consolidation in the year ahead, and discover what experts have to say on the skills and supply chain shortages

  • Computer Weekly – 26 February 2019: Delving into viewer data at the BBC

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.

  • Digital Pioneer in Machine Tool Manufacturing Leverages AWS for Seamless Operations

    Sponsored by: AllCloud

    Machine tool manufacturer Schwäbische Werkzeugmaschinen GmbH (SW) completed a mammoth migration project to AWS, enabling them to utilize optimized serverless apps and a seamless infrastructure as a service. Explore the details of the case study.

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Sponsored by: TechTarget ComputerWeekly.com

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

  • Computer Weekly – Dell Technologies aims for an intelligent, connected future

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.

  • CW APAC: Trend Watch: Cloud networking

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

  • The pandemic's  e-commerce boom

    Sponsored by: TechTarget ComputerWeekly.com

    The pandemic appears to have solidified e-commerce's ascendancy against the highstreet. Coronavirus has accelerated technology adoption in many sectors, and people have been forced to stay at home, increasing their online shopping habits in a bid to avoid visiting shops.

  • The CHRO guide to unleashing agility and bottom-line benefits

    Sponsored by: ServiceNow

    For today’s businesses, managing risk and building resilience in their HR operations has never been more important. To do so, many have turned to strengthening their employee productivity and development plans. However, many can find these methods daunting. Browse this guide to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.