ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart=20start=30start=10start=20start=30"

  • Balancing Security and Agility

    Sponsored by: FinThrive

    Explore effective strategies for healthcare cyber resilience that balance security and agility. Learn how to develop incident response plans, implement continuous monitoring, and partner with the right RCM vendor to enhance data protection and operational continuity. Read the full white paper.

  • Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

  • Royal Holloway: Testing antivirus efficacy in Linux

    Sponsored by: TechTarget ComputerWeekly.com

    Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.

  • Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.

  • New tech on the block: Planning for blockchain in the retail and consumer packaged goods industries

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Deloitte identifies the areas with the biggest immediate opportunity for retail and consumer packaged goods (CPG) businesses looking to invest in blockchain technology.

  • Observability Forecast_2024

    Sponsored by: New Relic

    The 2024 Observability Forecast offers insights into observability's evolution, highlighting growth areas and how external forces influence adoption. With a 4x median ROI, observability provides business value by reducing downtime and outage costs. Read the report to see how observability enhances operational efficiency and business performance.

  • Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.

  • MicroScope - December 2021: Valuing the MSP

    Sponsored by: MicroScope

    In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.

  • Building an Identity Security Program

    Sponsored by: Cisco

    This e-book provides a blueprint for CISOs to build an effective identity security program. Learn about the four pillars of identity security, key business outcomes, and performance indicators to measure success. Download the e-book to secure your workforce identities and keep your organization safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.