ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • Computer Weekly – 11 February 2020: How the Post Office caused so much misery

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after a landmark legal victory against the Post Office over a faulty IT system, campaigner Alan Bates shares his 20-year story of trials and triumph. Oracle is under fire over its cloud sales practices – we examine the claims. And we look at the sustainability challenges for datacentres.

  • Navigating The Paths Of Risk The State of Exposure Management in 2024

    Sponsored by: XM Cyber

    In 2023, the XM Cyber Continuous Exposure Management (CEM) platform uncovered more than 40 million exposures. To access 7 key findings that these exposures illuminated, and to deepen your understanding of the state of exposure management in 2024, dig into this research report.

  • How to choose and use your new AI assistant

    Sponsored by: GEM

    This e-book offers practical guidance on evaluating AI sourcing products and best practices to drive optimal results. Learn how AI can help you find better talent faster, maximize productivity, and boost conversions. Read the full e-book to discover proven strategies.

  • Automate Google Cloud with Red Hat Ansible Automation Platform

    Sponsored by: Red Hat

    Explore how to automate Google Cloud with Red Hat Ansible Automation Platform. Learn about integrated billing, enterprise support, and cloud automation use cases like health checks and VPC management. Read on to see how Ansible can accelerate your organization's cloud automation and the benefits of hybrid cloud automation in general.

  • Computer Weekly – 27 November 2018: Software patching at scale – how to make it work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.

  • CW APAC: Tech career guide – women in IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on tech careers for women in the Asia-Pacific region, Computer Weekly looks at what can be done to attract more women into software development.

  • CIO Trends #7: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    How do you know the commercial software you bring into your organization is safe? With Industry analysts seeing a 300% to 1000% increase in attacks targeting the commercial software businesses, it represents the largest under-addressed attack surface. Download this White Paper to learn more.

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    Enterprises face growing risks and regulatory demands to secure third-party software. Spectra Assure's white paper details how its binary analysis identifies threats like malware and vulnerabilities in commercial software without source code. Discover risk management strategies by reading the full paper.

  • Artificial intelligence in ITSM: Finding the right tools for you

    Sponsored by: TechTarget ComputerWeekly.com

    AI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.