ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • Improving Health by Addressing Social Needs: A Sustainable Path Forward

    Sponsored by: ZeOmega

    ZeOmega and the Center for Open Data Enterprise (CODE) have collaborated to create a powerful white paper addressing challenges related to Health-Related Social Needs (HRSN) interventions. Download it now to learn about opportunities to apply funding to address social needs.

  • Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.

  • Full visibility and real-time threat response: Helping retailers achieve proactive IT Security

    Sponsored by: Tanium

    Hackers are targeting blind spots and vulnerabilities in the complex, multi-tooled IT systems that retailers depend on. And rather than physical goods, threat actors are stealing valuable data. Discover how adopting a converged endpoint management solution with full visibility of assets can help retailers mitigate and prevent data breaches.

  • Ai In Talent Acquisition: Key Trends Shaping The Future In Financial Services

    Sponsored by: Oleeo

    This white paper explores the opportunities and challenges of AI adoption in talent acquisition for financial services firms. It also discusses top priorities like quality of hire and diversity, as well as obstacles like burnout and budget constraints. Learn how AI can transform TA by reading the full white paper.

  • Where Does Marketing Stop And Advertising Begin?

    Sponsored by: SAS

    As data deprecation nears, brands must double down on first-party data strategies, use customer understanding and enterprise decisioning, and embrace data-driven omnichannel customer journey activation. Learn how to navigate the new world of tech in this white paper.

  • Leaders in IT

    Sponsored by: TechTarget ComputerWeekly.com

    This PDF gives you an insight into the daily lives of IT leaders and the challenges they face on a day to day basics. With technology constantly changing, they are expected to be on top of this and ensure that the workforce is up to date with the latest applications.

  • Inbox Incursions Are More Than An Annoyance They Are A Security Risk

    Sponsored by: Checkpoint Software Technologies

    An inbox incursion occurs when phishing emails are available to the end user for any length of time, forcing the vendor to remediate them post-delivery. Download this white paper for a deeper look at inbox incursion and the role it plays in the broader topic of email security.

  • The journey to digital healthcare

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at how the NHS shared care records projects are progressing, and the European Commission's plans to share health data across borders. We also look at how one NHS trust has created a social media platform to help mental health service users, and examine Scotland's digital health and care strategy.

  • Anti-Fraud Technology Benchmarking Report 2024

    Sponsored by: SAS

    With fraudsters constantly looking for new ways to exploit technological change and human error to attack organisations, technology has become a crucial component of a successful anti-fraud program in 2024. Access this research content now to learn where you can improve upon your anti-fraud initiatives this year.

  • UCaaS Buyers’ Checklist

    Sponsored by: 8x8

    The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.