ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30start=30"

  • Personal branding in the digital age: How to become a known expert, thrive and make a difference in a connected world

    Sponsored by: TechTarget ComputerWeekly.com

    This chapter from Francine Beleyi's book Personal branding in the digital age, explains the seven key pillars you need to build a successful personal brand.

  • Best practices for remote data backups

    Sponsored by: TechTarget ComputerWeekly.com

    This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.

  • Datacentre design and facilities: What you need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the latest thinking and trends around datacentre design, while shining a light on the differing approaches organisations take to ensure their server farms remain up and running, and can withstand all the compute demands expected of them.

  • The Cloud Influence on GRC

    Sponsored by: TechTarget Security

    Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.

  • From patchwork to platform

    Sponsored by: Red Hat

    As the complexity of modern infrastructure escalates, IT organizations need an automation strategy. Given the intricate relationships that exist among these complex environments, a unified automation platform is required. Read on to learn about key considerations you should make to ensure you find the platform best fit for your organization.

  • The Evolution of AI in Cybersecurity: Breaking the Cycle of Reactionary Cybersecurity

    Sponsored by: Deep Instinct

    While security teams strive to combat new threats as fast as they can, as long as their approach is reactionary, hackers will always have the upper hand. This white paper examines how the adoption of AI and ML presents an opportunity to overcome reactionary approaches and achieve proactive anti-malware security. Read on to learn more.

  • Computer Weekly – 25 June 2019: Saving bees with the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how internet of things technologies and "smart hives" are helping bee conservation. We examine Facebook's new digital currency, Libra, and analyse its pros and cons. And we look at how IT leaders are rising to the challenge of delivering ethics and sustainability in tech. Read the issue now.

  • Computer Weekly – 16 May 2023: Microsoft and Google go into battle for enterprise AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as developments in generative AI accelerate, Microsoft and Google have each unveiled plans around enterprise applications. Nobody doubts the importance of digital transformation – but experts say it won't work without cultural change as well. Read the issue now.

  • 3 key uses cases for Programmable Voice

    Sponsored by: Sinch

    Explore how programmable voice can enhance customer experiences, localization, and user privacy. Learn about key use cases like text-to-speech for multilingual support, number masking for privacy, and in-app calling to improve last-mile delivery. Read the e-book to discover how programmable voice can benefit your business.

  • Demise of Dead-End Demand

    Sponsored by: BrightTALK by TechTarget

    While classic demand gen funnels and SDR follow-ups can help marketing teams benchmark performance, many have begun to struggle with certain breakpoints. These issues can lead to dead-end demand, and unfortunately, many organizations struggle to combat this with modern B2B buying. Access this guide to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.