ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.

  • The long march of S/4 Hana

    Sponsored by: TechTarget ComputerWeekly.com

    S/4 Hana, the ERP system built on SAP's in-memory, columnar database Hana has been on a long march through the enterprise since its launch in February 2013. In this e-guide, we discuss the pros and cons of upgrading to S/4 Hana, what the future has in store for the system and how its users are feeling about C/4 Hana integration.

  • Computer Weekly – 28 April 2020: Is digital transformation in the public sector making progress?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we assess the progress of digital transformation across the public sector. IT contractors face a double-whammy from backdated tax payments and loans being recalled – we explore the growing scandal. And we assess the benefits of computational storage. Read the issue now.

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Sponsored by: TechTarget ComputerWeekly.com

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

  • Computer Weekly - 4 May 2021: How KFC put digital on the menu

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how fast-food chain KFC turned to digital to survive the pandemic. Our latest buyer's guide looks at technologies to improve office productivity for home workers. And we assess the growing problem of electronic waste and how to tackle it. Read the issue now.

  • SD-WAN: Accelerating network transformation in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.

  • SD-WAN: Accelerating network transformation in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.

  • Computer Weekly – 15 January 2019: NHS plans for a digital future

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the NHS Long-Term Plan and examine how it intends to transform UK healthcare for a digital age. We analyse the latest chip developments from Intel and AMD to see what will change in the datacentre in 2019. And we ask the experts if Amazon Web Services can continue its growth trajectory. Read the issue now.

  • Understanding IT Buyers’ Behaviors: Insights to improve sales and marketing performance

    Sponsored by: TechTarget

    A crowded market challenges the sales and marketing teams of IT solutions to stay competitive. By understanding IT buyer behaviors, teams can gain the edge that they need to set their organizations apart. Achieve that understanding by reviewing this TechTarget report, which answers questions like “Where do IT buyers conduct their research?”

  • How To Deploy A Password Policy

    Sponsored by: Specops Software

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.