ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • Ransomware Mitigation and Recovery

    Sponsored by: Pure Storage

    As the threat landscape continues to evolve, cybercriminals are becoming increasingly bold and sophisticated with ransom amounts surging. Simply put, there’s no time like the present to prioritize your ransomware threats, detection, and response efforts. Read on now to find out how you can help your organization stay ahead of hackers.

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.

  • Technology industry at the cross-roads: Transforming quote-to-cash operations

    Sponsored by: TechTarget ComputerWeekly.com

    This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.

  • The State of Marketing Collaboration

    Sponsored by: Asana

    Strategic collaboration is critical for marketing success in today's complex landscape. This report reveals insights on aligning goals, embracing data-driven practices, and harnessing AI to drive marketing innovation. Read the full report to unlock the power of collaboration and gain a competitive edge.

  • Optimize your cloud with Automation

    Sponsored by: Red Hat

    Leveraging automation for a strategic edge is now at your disposal with the Red Hat Ansible Automation Platform via Google Cloud Marketplace. IDC reports a 667% 5-year ROI and 10-month payback for Red Hat Ansible users. Discover how enterprise automation can drive better cloud results for your company in this solution overview.

  • Quantum computing in action

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • We Solved the Infrastructure Access Problem

    Sponsored by: StrongDM

    In this e-book, you’ll learn how several organizations, from growing startups to established enterprises, solved the access problem using StrongDM. Read now to access their case studies and see how you could follow in the footsteps of their success.

  • Private/Hybrid Cloud – Data Center Solutions

    Sponsored by: Morpheus Data

    The report analyzes the evolving private/hybrid cloud management and resiliency platform markets, highlighting key trends like AI/ML integration and cloud cost optimization. It provides insights into leading vendors and their capabilities to help enterprises make informed decisions. Read the full report to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.