ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • CW ASEAN: Preparing for 5G

    Sponsored by: TechTarget ComputerWeekly.com

    As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.

  • Computer Weekly - 21 April 2020: Taking robot technology to a New World

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the technology team behind a project to recreate the voyage of the Mayflower using a fully autonomous ship. We look at how India's coronavirus lockdown is affecting UK companies that use offshore outsourcing. And we examine the challenges of making edge computing work. Read the issue now.

  • CW APAC: August 2023 – Expert advice on storage and backup

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on storage and backup in the Asia-Pacific region, Computer Weekly looks at why 3-2-1 backup is still relevant, how researchers are overcoming restraints found in typical DNA storage systems, Dell's latest offerings and the future of HDDs.

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

  • Understanding Gmail And Yahoo’s New Standards For Senders

    Sponsored by: Sinch

    Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.

  • Robinhood’s Sourcers Save 8-10 Hours/Week with Gem

    Sponsored by: GEM

    Robinhood's recruiting team saved 8-10 hours per week by using Gem's all-in-one recruiting platform. Gem streamlined their workflows, provided visibility into outreach performance, and enabled more strategic candidate engagement. Read the full case study to learn how Gem can benefit your recruiting team.

  • Get everyone involved in the diversity drive

    Sponsored by: TechTarget ComputerWeekly.com

    At a Computer Weekly diversity in tech event, more than 100 experts from the tech and employment sectors shared their ideas for improving diversity in the technology industry. Download the full report here.

  • Fujitsu Technology and Service Vision 2024

    Sponsored by: Fujitsu

    Download this e-book to find out what to do when your organization is at the AI and sustainability tipping point.

  • Practical Zero Trust Implementing Protections for High-Value Data

    Sponsored by: Zentera Systems Inc.

    This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.