Search Results for "CW Special Reportstart=20start=30start=10start=20start=30"
-
Balancing Security and Agility
Sponsored by: FinThriveExplore effective strategies for healthcare cyber resilience that balance security and agility. Learn how to develop incident response plans, implement continuous monitoring, and partner with the right RCM vendor to enhance data protection and operational continuity. Read the full white paper.
-
Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.
-
Computer Weekly – 1 October 2019: The most influential women in UK technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: TechTarget ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.
-
New tech on the block: Planning for blockchain in the retail and consumer packaged goods industries
Sponsored by: TechTarget ComputerWeekly.comThis research from Deloitte identifies the areas with the biggest immediate opportunity for retail and consumer packaged goods (CPG) businesses looking to invest in blockchain technology.
-
Observability Forecast_2024
Sponsored by: New RelicThe 2024 Observability Forecast offers insights into observability's evolution, highlighting growth areas and how external forces influence adoption. With a 4x median ROI, observability provides business value by reducing downtime and outage costs. Read the report to see how observability enhances operational efficiency and business performance.
-
Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.
-
MicroScope - December 2021: Valuing the MSP
Sponsored by: MicroScopeIn this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.
-
Building an Identity Security Program
Sponsored by: CiscoThis e-book provides a blueprint for CISOs to build an effective identity security program. Learn about the four pillars of identity security, key business outcomes, and performance indicators to measure success. Download the e-book to secure your workforce identities and keep your organization safe.