ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • CW Benelux ezine February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

  • The great IAM - time to modernise?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?

  • CW Innovation Awards: How DBS is transforming credit processes

    Sponsored by: TechTarget ComputerWeekly.com

    In this case study, learn how DBS Bank's credit architecture programme has digitised and reimagined credit processes through a unified platform that has improved the productivity and efficiency of its credit teams.

  • Zscaler ThreatLabz State of Encrypted Attacks Report

    Sponsored by: Zscaler

    Encrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.

  • Computer Weekly - 15 September 2020: How data has helped in the fight against coronavirus

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Office for National Statistics about the important role data plays in the battle against Covid-19. We also look at the speedy deployment of the Scottish contact-tracing app and report on a discussion about the UK government's delayed response to its digital identity consultation. Read the issue now.

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • Catalyst For Change: How Technology Leaders Can Be Key Allies For Customer And Employee Experience Initiatives

    Sponsored by: ServiceNow

    Discover in this e-book how your IT team can help your organization deliver a cohesive and accelerated customer experience.

  • Customer-Centric Growth in a Shapeshifting Cybersecurity Market

    Sponsored by: TechTarget

    Cybersecurity vendors that have found success while weathering the many changes occurring across the landscape have one thing in common: they put their customers at the center of everything they do. Download this e-book to gain insights to help you take advantage of the market.

  • Object storage: A great fit for large, unstructured data sets

    Sponsored by: TechTarget ComputerWeekly.com

    Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.

  • Microsoft Azure Red Hat OpenShift Provides More Value And Support To Cloud-First Organizations

    Sponsored by: Red Hat

    Azure Red Hat OpenShift provides a comprehensive container application platform that reduces infrastructure management effort by 50% and development time by 65%. Download this full Forrester Total Economic Impact report to learn how this managed service can increase your organization's cloud agility and innovation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.