ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30"

  • 2021 UKI Salary Survey Results

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: We take a look at our 2021 Salary Survey results from over 300 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2021 and the current diversity landscape residing in the UK tech sector.

  • Computer Weekly – 20 March 2018: Where neuroscience meets technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.

  • The last mile to the individual customer: Sales and marketing software trends

    Sponsored by: TechTarget ComputerWeekly.com

    From this e-guide you will learn about such developments in sales and marketing enterprise software in 2018, with a view to 2019 – from Computer Weekly and from our specialist US TechTarget site SearchCRM.

  • Calculating ROI of DCIM Monitoring for Distributed IT Sites

    Sponsored by: Schneider Electric

    In this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.

  • Beyond Traditional GPO Moving Supply Chain from Transactional to Strategic

    Sponsored by: Advantus

    Read this paper to garner the value of a transformational—not transactional—healthcare supply chain approach, 4 ways to achieve long-term supplier value, and top supply chain trends.

  • What Is Application Security?

    Sponsored by: Veracode, Inc.

    According to a recent report, 76% of all software applications have some sort of a security flaw. Applications are often seen as products in and of themselves, but when they are given sensitive information, it is important that they also be secure. Access the full infosheet to learn more about the current state of application security.

  • Computer Weekly – 26 February 2019: Delving into viewer data at the BBC

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.

  • CW APAC, November 2022: Trend Watch: Artificial intelligence in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on the adoption of artificial intelligence (AI) in Asia-Pacific, Computer Weekly looks at what stands in the way of AI adoption, Dell's deep learning model and how AI can realise its potential in healthcare.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: TechTarget ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • Essential Guide: Securing hybrid IT infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.