ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30start=30"

  • Technology industry at the cross-roads: Transforming quote-to-cash operations

    Sponsored by: TechTarget ComputerWeekly.com

    This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.

  • Computer Weekly – 22 November 2016: IT spreads innovation at Unilever

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how consumer goods giant Unilever has changed its thinking about IT to support a global digital transformation. The UK boss of Hewlett Packard Enterprise assesses progress after the first year since HP split in two. And we examine how software development is changing in the enterprise. Read the issue now.

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • Computer Weekly - 8 February 2022: Exploring the metaverse

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.

  • A Computer Weekly buyer's guide to on-site, off-site and cloud-based disaster recovery

    Sponsored by: TechTarget ComputerWeekly.com

    With businesses becoming increasingly dependent on data to function, being able to recover quickly from an IT systems failure is critical. In this 14-page buyer's guide, Computer Weekly looks at the various options available when implementing disaster recovery.

  • CW ANZ: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

  • BLOCKED! Seven Pillars of Ironclad Endpoint Security

    Sponsored by: Palo Alto Networks

    Discover 7 pillars that compose ironclad endpoint security in this e-book by Palo Alto Networks.

  • Improving Data Quality in the Age of Generative AI

    Sponsored by: Alteryx

    Generative AI can revolutionize your business. But it relies on one crucial element: high-quality data. This playbook from Alteryx and Databricks, “Improving Data Quality in the Age of Generative AI”, will give you strategies to overcome data quality challenges for your generative AI initiatives. Read on now to learn more.

  • Critical Scalability: Trend Micro Security Predictions for 2024

    Sponsored by: Trend Micro

    To review security predictions for 2024 – which concern generative AI, machine learning models and much more – tap into this 19-page research report by Trend Micro.

  • CW Nordics - August-October 2022: Norway struggles to keep up with demand for tech specialists

    Sponsored by: TechTarget ComputerWeekly.com

    The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.