ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30start=30"

  • Jargon Buster Guide to Post Quantum Cryptography

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

  • Secure Voting

    Sponsored by: TechTarget ComputerWeekly.com

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

  • Poland's Storage market on the rise

    Sponsored by: TechTarget ComputerWeekly.com

    Poland's storage market has been on a steady rise but what's the reason behind this? We investigate...

  • CW Benelux - August-October 2022: Belgium seeks top tech talent

    Sponsored by: TechTarget ComputerWeekly.com

    The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.

  • Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.

  • The generative AI advantage: A leader’s guide to using your data as a differentiator

    Sponsored by: AWS

    While general large language models can be used “out of the box” for some use cases, when you want to build generative AI applications that are unique to your business needs, your organization’s data is your strategic asset. Read on to uncover next steps for using data to create generative AI applications that know your customers deeply.

  • Computer Weekly - 23 February 2021: Computers in space - managing a datacentre on the ISS

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the International Space Station gets a datacentre upgrade, we look at the challenges of system maintenance in space. As nation states increase their cyber attacks, we assess the risk for businesses. And our latest buyer's guide looks at the colocation market. Read the issue now.

  • Essential Guide: How APAC firms can ride out the pandemic

    Sponsored by: TechTarget ComputerWeekly.com

    In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, and how they have responded from a technology perspective by driving initiatives spanning digital transformation, business continuity, cloud, cyber security and remote working.

  • Inbox Incursions Are More Than An Annoyance They Are A Security Risk

    Sponsored by: Checkpoint Software Technologies

    An inbox incursion occurs when phishing emails are available to the end user for any length of time, forcing the vendor to remediate them post-delivery. Download this white paper for a deeper look at inbox incursion and the role it plays in the broader topic of email security.

  • Navigating the Data Current Report

    Sponsored by: Cribl.io

    A year ago, the most popular sources were Splunk, Collection, and Office365. Today, the most popular sources are Splunk, System Sources, Metrics, REST, and Object Storage. Discover the fastest growing and most popular sources by company size. Download the Report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.