ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30start=30"

  • Computer Weekly – 10 April 2018: Technology is a lifesaver for NHS Blood and Transplant

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CDO of the NHS's blood and transplant agency about how digital transformation is proving to be a real lifesaver. Our latest buyer's guide examines the state of public cloud. And we find out how Ireland is gaining a Brexit dividend to boost its tech sector. Read the issue now.

  • Endpoint security: Hybrid work changes the game

    Sponsored by: TechTarget ComputerWeekly.com

    A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not.  In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.

  • AI in the UK: The only way is ethics

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we explore how enterprises must confront the ethical implications of AI use as they increasingly roll out technology that has the potential to reshape how humans interact with machines. We also shed a little light on the use of AI within politics - specifically through the controversial Brexit campaign.

  • AI in the UK: The only way is ethics

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we explore how enterprises must confront the ethical implications of AI use as they increasingly roll out technology that has the potential to reshape how humans interact with machines. We also shed a little light on the use of AI within politics - specifically through the controversial Brexit campaign.

  • Deployment Approaches to SAP S/4HANA

    Sponsored by: Lemongrass

    In this analyst report, discover the essential technologies industry leaders are using for their SAP S/4HANA deployments, and learn the top strategies SAPinsiders are using for their deployment initiatives.

  • Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.

  • A Roadmap to Digital Resilience for the Enterprise

    Sponsored by: Splunk

    Most organizations experience around 10 days of unplanned downtime per year. That’s a lot of lost revenue and damaged reputation. At a time when organizations are no longer indistinguishable from the digital systems they rely on, digital resilience is truly enterprise resilience. Download your complimentary copy of the report to learn more.

  • Amplifying Your Webinar Reach with Social Media

    Sponsored by: BrightTALK by TechTarget

    Access Amplifying Your Webinar Reach with Social Media for tips on how to effectively utilize social content before, during, and after your webinar to create a scalable social media promotion plan that improves the ROI of your webinar programs.

  • Securing DevOps

    Sponsored by: Veracode, Inc.

    Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.

  • Protect Passwords, Don’t Just Manage Them

    Sponsored by: CyberArk

    When 921 password attacks occur per second, it’s time to treat everyday employees’ credentials like the true operational risk they are. In this whitepaper, CyberArk Chief Information Officer Omer Grossman provides a CIO’s perspective on password-related risks keeping security leaders up at night.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.