ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20start=10"

  • Computer Weekly - 5 April 2022: Police use of AI needs overhaul to prevent abuse

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a House of Lords inquiry calls for a rethink on how police forces use AI technologies – we examine the issues. Our new buyer's guide looks into edge datacentres. And the EU and US agree a new data protection deal to replace Privacy Shield, but will it stand up to scrutiny? Read the issue now.

  • Computer Weekly - 31 January 2023: How the cost-of-living crisis is affecting IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine what the cost-of-living crisis means for IT leaders and tech professionals. We analyse what you need to consider when reversing systems out of the cloud and back on-premise. And Very Group's CIO talks about the post-pandemic challenges facing online retailers. Read the issue now.

  • CW EMEA - June 2023: IT budgets buck trend

    Sponsored by: TechTarget ComputerWeekly.com

    Despite gloomy economic conditions worldwide, IT leaders in EMEA expect budgets to increase this year, according to TechTarget/Computer Weekly's IT Priorities survey. We also look at how health authorities in the UAE are modernising healthcare services, how Finland and Estonia are sharing expertise, and how the Dutch government is addressing bias.

  • Computer Weekly - 12 July 2022: The most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal the 50 most influential people in UK IT for 2022, and talk to the winner of the 12th annual UKtech50, National Cyber Security Centre CEO Lindy Cameron. Also, we take an in-depth look at the crisis in chip supply and what's needed to solve it. Read the issue now.

  • CW Middle East April-June 2020: Quarter of Middle East businesses have no women in IT

    Sponsored by: TechTarget ComputerWeekly.com

    The Middle East faces fierce competition for IT professionals with the right skills, so it is so worrying that the region's women are so underrepresented in the IT community. In fact over quarter of businesses in the Middle East have no women in their IT departments, according to Computer Weekly's Salary Survey.

  • Computer Weekly – 8 October 2019: Showcasing the potential of 5G

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.

  • Time to Value

    Sponsored by: Docusign, Inc.

    This research explores how IT decision-makers can accelerate and maximize the benefits of enterprise SaaS applications. It highlights the importance of time to value, discusses implementation factors, and provides case studies. Download the full white paper to learn how you can optimize time to value for your SaaS solutions.

  • Device Subscription Services

    Sponsored by: Unisys

    In this complete buyer's guide to device subscription services (DSS), you'll learn how DSS can transform your device management strategy by providing predictable costs, enhanced productivity, and improved employee experience. Download the full guide now to find out how you can revolutionize your approach to device management.

  • State of Application Security 2024

    Sponsored by: Cloudflare

    Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.

  • Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.