ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • Ransomware Mitigation and Recovery

    Sponsored by: Pure Storage

    As the threat landscape continues to evolve, cybercriminals are becoming increasingly bold and sophisticated with ransom amounts surging. Simply put, there’s no time like the present to prioritize your ransomware threats, detection, and response efforts. Read on now to find out how you can help your organization stay ahead of hackers.

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.

  • 36 Ways (And Counting) Employee-Guided Payroll Frees HR

    Sponsored by: Paycom

    Employee-guided payroll eliminates 36+ tedious HR tasks by empowering workers to verify pay accuracy. A study shows this approach cuts payroll processing time by 90%. Read how single HR software and automation transform HR into strategic advisors, freeing them from data entry and error correction.

  • Technology industry at the cross-roads: Transforming quote-to-cash operations

    Sponsored by: TechTarget ComputerWeekly.com

    This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.

  • Optimize your cloud with Automation

    Sponsored by: Red Hat

    Leveraging automation for a strategic edge is now at your disposal with the Red Hat Ansible Automation Platform via Google Cloud Marketplace. IDC reports a 667% 5-year ROI and 10-month payback for Red Hat Ansible users. Discover how enterprise automation can drive better cloud results for your company in this solution overview.

  • Quantum computing in action

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.

  • The State of Marketing Collaboration

    Sponsored by: Asana

    Strategic collaboration is critical for marketing success in today's complex landscape. This report reveals insights on aligning goals, embracing data-driven practices, and harnessing AI to drive marketing innovation. Read the full report to unlock the power of collaboration and gain a competitive edge.

  • Discover the business benefits of Red Hat Enterprise Linux on Microsoft Azure

    Sponsored by: Red Hat

    In this e-book, you'll discover the benefits of running Red Hat Enterprise Linux on Microsoft Azure for a security-focused hybrid cloud environment. Read on now to learn how you can simplify migration, enhance security, and optimize costs during your cloud journey.

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.