ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=30start=30start=30"

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    How do you know the commercial software you bring into your organization is safe? With Industry analysts seeing a 300% to 1000% increase in attacks targeting the commercial software businesses, it represents the largest under-addressed attack surface. Download this White Paper to learn more.

  • A Finance Leader's Guide to Automating Analytics

    Sponsored by: Alteryx

    In this e-book, O’Reilly, a trusted content creator, explores the evolving role of CFOs and how they can do more with less. Read on now to learn how analytics automation can transform finance from manual, error-prone processes to fully automated systems with full visibility.

  • Verizon ABM with Intent: Front Line Success at Scale

    Sponsored by: TechTarget

    Dive into this case study to examine how Verizon Business Group, a division within one of the world’s largest telecoms firms, for a strong example of how a team has implemented ABM concepts at scale to realize broad benefits across many business areas.

  • A Deep Dive into Shadow IT: Examples, Risks, and Solutions

    Sponsored by: Auvik Networks, Inc.

    Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.

  • A Computer Weekly buyer's guide to financial analytics for planning

    Sponsored by: TechTarget ComputerWeekly.com

    The current economic climate provides a strong reason for firms to turn to the advantages of software. In this 14-page buyer's guide, Computer Weekly looks at the role of datasets in accounting, how technology is helping finance departments control budgets and the importance of integrating automation into business processes.

  • MicroScope – March 2022: Taking the steady approach to becoming an MSP

    Sponsored by: MicroScope

    In this issue, take a closer look at the risks and pitfalls on the journey to becoming a manages services provider, read about expected ongoing change and consolidation in the year ahead, and discover what experts have to say on the skills and supply chain shortages

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • CW EMEA - November 2023: Let the data flow

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA ezine, we find out about Heineken's mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform. Read the issue now.

  • From fraud detection to protection

    Sponsored by: Teleperformance

    Any company that stores sensitive information is at risk for fraud. Whether it’s financial or personal data, if you have it, there is a good chance someone is trying to get at it. This problem is compounded even more with remote work and the rise of AI. All of this means it’s time to rethink your fraud prevention posture. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.