ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20start=10"

  • Multi-Factor Authentication Deployment Guide

    Sponsored by: Okta

    Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.

  • Passkeys Primer

    Sponsored by: Okta

    Synced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.

  • NVMe flash storage 101

    Sponsored by: TechTarget ComputerWeekly.com

    Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.

  • Infrastructure to Support Adapting Technologies in Hybrid Workspaces

    Sponsored by: Panduit

    Read through this white paper for a deep dive into the key technologies and applications that infrastructure needs to support in the hybrid office of today — and tomorrow.

  • Preparing for S/4Hana upgrade

    Sponsored by: TechTarget ComputerWeekly.com

    S/4Hana offers organisations many benefits in terms of speed and the ability to run the latest, cloud-ready platform. But the upgrade can be costly. This E-Guide looks at how IT decision makers can get ready for S/4Hana upgrade projects, while keeping their existing ECC systems running, and the upgrade options available to them.

  • Preparing for S/4Hana upgrade

    Sponsored by: Livingstone Group

    S/4Hana offers organisations many benefits in terms of speed and the ability to run the latest, cloud-ready platform. But the upgrade can be costly. This E-Guide looks at how IT decision makers can get ready for S/4Hana upgrade projects, while keeping their existing ECC systems running, and the upgrade options available to them.

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    Sponsored by: TechTarget ComputerWeekly.com

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

  • 2024 ANZ CX Intelligence Report

    Sponsored by: ServiceNow

    Australia and New Zealand have a customer service problem – the nations are stuck on hold. Wait times have increased for the third year running – with more than 107 million hours spent on hold, up 11% from last year. To make problems worse, customers' expectations have risen to an all-time high, making it even harder for organisations to keep up.

  • Computer Weekly – 23 May 2023: How to secure your software supply chain

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.

  • Fast Close. Faster Insights.

    Sponsored by: Sage Intacct (North America)

    Explore how finance leaders can automate the financial close to save time and boost strategic impact. Access this report to discover insights from a global survey on the people, processes, and technology driving faster, more accurate closes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.