ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20"

  • Computer Weekly - 29 November 2022: How to stop data retention from killing the planet

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.

  • Living Off The Land Attacks

    Sponsored by: CyberFOX

    Cybercriminals are using legitimate tools to infiltrate systems and steal data. Learn how privileged access management and blocklisting can reduce your attack surface and prevent "living off the land" attacks. Read the full e-book to discover practical ways to enhance your security.

  • A Computer Weekly buyer's guide to video conferencing and collaboration

    Sponsored by: TechTarget ComputerWeekly.com

    In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.

  • Digital Disruption Index – from experimentation to transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations are investing in digital technologies, including artificial intelligence, blockchain and augmented reality, but executives fear they lack skills to implement a digital strategy, Deloitte's Digital Disruption Index reveals.

  • CW Buyer's Guide to 5G mobile networking

    Sponsored by: TechTarget ComputerWeekly.com

    5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.

  • Are you waiting for AI to mature? 5 reasons why you can’t afford to wait

    Sponsored by: Hewlett Packard Enterprise

    According to a recent report, 31% of respondents report they are waiting for AI to mature before adopting the technology. This white paper presents 5 reasons why you can’t afford to wait for AI to mature. Read on to unlock all 5 and learn more.

  • CW APAC, May 2022: Trend Watch: Datacentres

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at the shift towards colocation facilities.

  • How open source is spurring digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    From Linux to Kubernetes, open source has been key to efforts by organisations across APAC to transform digitally. In this e-guide, read how Malaysia's AmBank is using open source to engineer its software from the ground-up, ANZ Bank's move to Red Hat OpenShift, and what suppliers are doing to support deployments of containerised applications.

  • The Case for Application Detection and Response (ADR)

    Sponsored by: Contrast Security

    This white paper explores the need for Application Detection and Response (ADR) to provide continuous protection and real-time visibility into application and API security. Learn how ADR can enhance your organization's security posture and fill the critical gaps left by traditional security measures. Read the full eBook.

  • Digital Industries Software Reimagine Smart Manufacturing And Supply Chains With Low Code

    Sponsored by: Siemens

    In this 11-page e-book, discover how low-code solutions can transform smart manufacturing and supply chains.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.