ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.

  • Computer Weekly – 13 September 2022: Source responsibly: Tech sector efforts to root out forced labour are failing

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we analyse the technology industry's failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management. Read the issue now.

  • Volkswagen Slovakia Implements Progress Flowmon to Provide IT Teams Insight to its Complex Infrastructure

    Sponsored by: Progress Software Corporation

    With approximately 11,000 employees, Volkswagen Slovakia is one of the largest employers in Slovakia. Also large is the company’s IT infrastructure, which is made up of its IT and OT departments that monitor 100,000 IP addresses and more. To learn how Volkswagen Slovakia manages such a complex IT environment, dig into this case study.

  • Computer Weekly buyer's guide to fintech

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly weighs up thecompetition from tech-based challenger banks, the importanceof customer experience and the value of leaving conventionalbanking in the past.

  • Pioneering Texas School District Improves Its Cybersecurity Posture with the Fortinet Security Fabric

    Sponsored by: Fortinet, Inc.

    Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.

  • Computer Weekly: Data Danger

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

  • Artificial Intelligence: A Key Tool For Increasing Staffing Efficiency And Reducing Costs

    Sponsored by: AMN Healthcare

    This white paper serves as your gateway to understanding how AI can be your ally in overcoming workforce challenges. Download your copy today and begin your journey toward a brighter, AI-enhanced future in healthcare workforce management.

  • End-to-end automation: Now on Google Cloud

    Sponsored by: Red Hat

    Discover how Google Cloud's Ansible Automation Platform can accelerate your hybrid cloud initiatives. Learn about the benefits of end-to-end IT automation, including reduced downtime, improved efficiency, and increased innovation. Read the infographic to see how you can get started with Ansible Automation Platform on Google Cloud.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • State of Application Security 2024

    Sponsored by: Cloudflare

    Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.