ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart=20start=30start=10start=20start=30"

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • IR35 reforms: Confusion over who pays employers' NI leaves IT contractors out of pocket

    Sponsored by: TechTarget ComputerWeekly.com

    Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.

  • How to Manage Unwanted guests in Azure Active Directory

    Sponsored by: One Identity

    Guests in Azure Active Directory-controlled infrastructure need to be treated like the security threats they are. One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Read on to learn more.

  • CW APAC - November 2019: Expert advice on container security

    Sponsored by: TechTarget ComputerWeekly.com

    For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.

  • Data Modeling Guidebook

    Sponsored by: HighByte

    Digital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.

  • Contact Center-as-a-Service MetriRank 2023

    Sponsored by: 8x8

    In this analyst report, discover how the top-ranking CCaaS solutions stack up against the competition, and find out which solution is best for your enterprise.

  • MicroScope – March 2023: Steering the storage market

    Sponsored by: MicroScope

    In this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

  • Computer Weekly – 3 October 2017: Digitally preserving history

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how cloud technologies are helping Gibraltar to digitally preserve historic documents and safeguard its cultural heritage. We examine progress on the roll-out of the new NHS national network. And our latest buyer's guide looks at cloud-based ERP software. Read the issue now.

  • CW ASEAN: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.