ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • The Modern IT Professional’s Guide To Shadow IT

    Sponsored by: Auvik Networks, Inc.

    Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.

  • How SMEs Can Break Free of AD’s Limitations Without Ditching AD

    Sponsored by: JumpCloud

    Discover how SMEs can modernize Active Directory without ripping and replacing it. This e-book explores the limitations of AD and Azure AD, and how to integrate a cloud-based directory platform to gain flexibility, security, and the freedom to adapt. Read the full e-book to learn more.

  • Oracle cloud applications exhibit pragmatic adoption curve

    Sponsored by: TechTarget ComputerWeekly.com

    Oracle prides itself on the full suite of the business applications it offers in the cloud, arguably ahead of its closest rival, SAP – which has prioritised building on its in-memory database Hana over the cloud per se, though its S/4 Hana ERP system is increasingly delivered over the cloud, too.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • 7 trends shaping the future of tax

    Sponsored by: SAS

    This e-book explores 7 key trends shaping the future of tax, including the explosion in data sharing, use of AI against tax agencies, and the need to get tax right the first time. Inside, you’ll discover how tax agencies can leverage data and analytics to tackle these challenges and more. Read the full report now to learn more.

  • PBCS vs. EPBCS: A Comprehensive Comparison

    Sponsored by: US Analytics

    Oracle’s Planning and Budgeting Cloud Service (PBCS) and Enterprise Planning and Budgeting Cloud Service (EPBCS): is one a better fit for your organization? How are these two tools the same? How are they different? Before you go any further, review this guide to compare your options.

  • A Computer Weekly buyer's guide to the future of collaboration

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses are using collaborative software to operate in revolutionary new ways. In this 13-page buyer's guide, Computer Weekly looks at its potential negatives, the improved agility it provides and assesses Chromebooks as collaboration clients

  • Storage Capacity 101 to Post-Grad in a Flash

    Sponsored by: TechTarget ComputerWeekly.com

    In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.

  • Jargon Buster Guide to Voice over IP (VoIP)

    Sponsored by: TechTarget ComputerWeekly.com

    In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Sponsored by: TechTarget ComputerWeekly.com

    Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.