ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20start=10"

  • Personal branding in the digital age: How to become a known expert, thrive and make a difference in a connected world

    Sponsored by: TechTarget ComputerWeekly.com

    This chapter from Francine Beleyi's book Personal branding in the digital age, explains the seven key pillars you need to build a successful personal brand.

  • Digital drive: The IT backbone behind Lewis Hamilton's British Grand Prix win

    Sponsored by: TechTarget ComputerWeekly.com

    Dive into the world of the Mercedes F1 IT team, where advanced data analytics, real-time telemetry, and state-of-the-art simulations come together to fine-tune every race detail. Uncover how this seamless blend of technology and teamwork gave Lewis Hamilton the edge he needed to triumph at Silverstone.

  • Computer Weekly – 23 May 2023: How to secure your software supply chain

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.

  • Computer Weekly – 24 October 2023: Brewing data insights at Heineken

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how brewing giant Heineken is building a data ecosystem to share insights and tap into AI capabilities. The UK is conducting an investigation into cloud supplier dominance – what will it mean for users? And we examine how generative AI could be used to improve customer experience. Read the issue now.

  • The Devsecops Guide To Managing Open-Source Risk

    Sponsored by: Contrast Security

    As open-source software adoption grows, so do associated risks. This e-book examines how to establish visibility, manage policies, automate controls, and prioritize remediations to securely leverage open source without impacting DevOps. Read the full e-book to learn more.

  • Computer Weekly – 5 June 2018: The bumpy ride to digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.

  • RSA Conference 2020 guide: Highlighting security's human element

    Sponsored by: TechTarget ComputerWeekly.com

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

  • Why Your Operating System Still Matters

    Sponsored by: Red Hat

    In this e-book, discover an extensive overview of why the operating system—and specifically the Linux operating system—still matters today and how it meets modern IT and business demands.

  • Computer Weekly – 23 October 2018: Where next for digital identity?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer's guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers. Read the issue now.

  • UCaaS Buyers’ Checklist

    Sponsored by: 8x8

    The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.