ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=30start=20start=10start=30"

  • Fit for a Secure Future

    Sponsored by: Vodafone

    This cybersecurity report details how you can become a Fit for the Future (FFTF) business; organizations that take a very different approach to security challenges, resulting in increased revenue, ESG commitment, and reduced impact from cybersecurity attacks. Explore the report here.

  • CW Europe: December 2016 - February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • Computer Weekly – 7 August 2018: How digital is driving golf to the connected course

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how one of the most traditional of sports, golf, is turning to technology to engage a new audience and build the connected course. Industry legend Stephanie 'Steve' Shirley discusses skills, diversity in tech and Brexit fears. And we assess four of the biggest cloud storage providers. Read the issue now.

  • Computer Weekly – 13 April 2021: The evolution of RPA

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at the future of robotic process automation (RPA). Google's legal victory against Oracle over the use of Java APIs has huge significance for software developers. And we find out how expectations of IT have grown as firms prepare for the post-Covid workplace. Read the issue now.

  • Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette

    Sponsored by: Cisco

    The 2024 "Cyber Threat Trends Report" by Cisco analyzes the threats crowding the cyber landscape, including information stealers, Trojans and ransomware. It also provides insights on how DNS security can help defend your organization against those growing threats. Read the 18-page report to unlock the full insights.

  • Human-Centric AI At Work: A Marketer’s Playbook For Powering Your Organization With AI

    Sponsored by: Asana

    Are you prepared to lead your company through the AI era? In this playbook, you’ll learn how to help your organization work smarter with AI and drive real results. If you don’t want to get left behind in the wake of this transformative technology, this playbook is for you. Download your copy now.

  • The Secrets To Unlocking The Value Of The Cloud

    Sponsored by: Virtusa

    Among challenging information technology (IT) projects, few are more intimidating than a full-fledged cloud transformation. Fortunately, with the help of some careful planning, proven best practices, and the latest tools, you can quickly realize the incredible benefits of the cloud. Read on to learn how you can make the most of your cloud journey.

  • The rise of edge computing

    Sponsored by: TechTarget ComputerWeekly.com

    The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture

  • Computer Weekly - 12 April 2022: Disney combines digital, data and creativity for ad opportunities

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.

  • Create A Strategy For Adopting Automation Across Your Company

    Sponsored by: Red Hat

    In this e-book, discover the secrets to adopting transformative automation as a long-term strategy, not just a tool.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.