ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30start=30"

  • Top 10 end-user computing stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    IT has been looking at how desktop computing can enable employees to become more productive by using new forms of collaboration and enterprise social media platforms. Here are Computer Weekly's top 10 end-user computing stories of 2019.

  • Third-Party Software Support: It's About Time

    Sponsored by: Spinnaker Support

    For many organizations, it can be difficult to optimize their IT operations on their own. However, when these companies attempt to strategize new ways to make these processes more efficient, it ends up costing them. So, how can you get around this? Access this infographic to learn more.

  • 5 Essential Steps to Enhancing Interactions with Conversational AI

    Sponsored by: Boost.ai

    This eBook outlines 5 essential steps to successfully automating customer relationships with conversational AI. Learn how to identify use cases, select the right technology, and implement a winning strategy. Read the full white paper to transform your customer experience with AI.

  • IT Priorities 2020: APAC

    Sponsored by: TechTarget ComputerWeekly.com

    The Asia-Pacific (APAC) region remains a hotbed for digital transformation initiatives amid the economic uncertainty and ongoing coronavirus outbreak. In this guide to IT Priorities in 2020, find out what 593 APAC IT professionals revealed about their digital transformation efforts and key areas of spending for the coming year.

  • CW APAC: Expert Advice on data management

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: TechTarget ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • Computer Weekly – 30 July 2024: CrowdStrike blue screen bug serves a stark warning

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we analyse the lessons from the global IT outage caused by the blue screen bug in CrowdStrike security software. We talk to the data chief of Barilla, the €4bn pasta maker, about the benefits of asking, "So what?" And we find out how Finland is taking a lead on quantum computing. Read the issue now.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • Businesses find it difficult to gain business value from GenAI

    Sponsored by: XtelligentMedia Healthcare

    Enterprises chase an impractical immediate payback from GenAI and miss opportunities to use less expensive machine learning to solve problems, experts say.

  • Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.